• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1995 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • Activity-based access control model to hospital information

    Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Activity-based security scheme for ubiquitous environments

    Hung, L. X., Hassan, J., Riaz, A. S., Raazi, S. M. K., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y., Fernandes, M., Kim, M. & Zhung, Y., 2008, 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008. p. 475-481 7 p. 4745102. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Activity-oriented access control for ubiquitous environments

    Hung, L. X., Shaikh, R. A., Jameel, H., Raazi, S. M. K. R., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. 4784990. (2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A digital forensic framework for automated user activity reconstruction

    Kang, J., Lee, S. & Lee, H., 2013, Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Proceedings. p. 263-277 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7863 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

    Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A location-aware key predistribution scheme for distributed wireless sensor networks

    Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A password stretching method using user specific salts

    Lee, C. & Lee, H., 2007, 16th International World Wide Web Conference, WWW2007. p. 1215-1216 2 p. (16th International World Wide Web Conference, WWW2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A privacy preserving access control scheme using anonymous identification for ubiquitous environments

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H. J., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 482-487 6 p. 4296887. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A simple congestion-resilient link adaptation algorithm for IEEE 802.11 WLANs

    Kim, H., Yun, S., Lee, H., Kang, I. & Choi, K. Y., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151441. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • A trust-based approach to control privacy exposure in Ubiquitous Computing environments

    Giang, P. D., Hung, L. X., Shaikh, R. A., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, 2007 IEEE International Conference on Pervasive Services, ICPS. p. 149-152 4 p. 4283905. (2007 IEEE International Conference on Pervasive Services, ICPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Automated source code instrumentation for verifying potential vulnerabilities

    Li, H., Oh, J., Oh, H. & Lee, H., 2016, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 471. p. 211-226 16 p. (IFIP Advances in Information and Communication Technology; vol. 471).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • BARI: A distributed key management approach for wireless body area networks

    Raazi, S. M. K. U. R., Lee, S., Lee, Y. K. & Lee, H., 2009, CIS 2009 - 2009 International Conference on Computational Intelligence and Security. p. 324-329 6 p. 5376103. (CIS 2009 - 2009 International Conference on Computational Intelligence and Security; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • BASE: An incrementally deployable mechanism for viable IP spoofing prevention

    Lee, H., Kwon, M., Hasker, G. & Perrig, A., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 20-31 12 p. (Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • Bayesian memory-based reputation system

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2007 Aug 27, MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications. Association for Computing Machinery, Inc, 1385300. (MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • BinGraph: Discovering mutant malware using hierarchical semantic signatures

    Kwon, J. & Lee, H., 2012, Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012. p. 104-111 8 p. 6461015. (Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • BotGAD: Detecting botnets by capturing group activities in network traffic

    Choi, H., Lee, H. & Kim, H., 2009, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09. 1621893. (Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    76 Citations (Scopus)
  • Botnet detection by monitoring group activities in DNS traffic

    Choi, H., Lee, H., Lee, H. & Kim, H., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 715-720 6 p. 4385169. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    183 Citations (Scopus)
  • Carving secure Wi-Fi zones with defensive jamming

    Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 53-54 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Cascade damage estimation model for internet attacks

    Lee, T., In, H. P., Im, E. G. & Lee, H., 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. Springer Verlag, p. 163-164 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Code graph for malware detection

    Kyoochang, J. & Heejo, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472801. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Contextual risk-based access control

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings of The 2007 International Conference on Security and Management, SAM'07. p. 406-412 7 p. (Proceedings of The 2007 International Conference on Security and Management, SAM'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Cyber threat trend analysis model using HMM

    Kim, D. H., Lee, T., Jung, S. O. D., In, H. P. & Lee, H. J., 2007, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security. p. 177-182 6 p. 4299771. (Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • Cyber weather forecasting: Forecasting unknown Internet worms using randomness analysis

    Park, H., Jung, S. O. D., Lee, H. & In, H. P., 2012, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings. p. 376-387 12 p. (IFIP Advances in Information and Communication Technology; vol. 376 AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Detecting metamorphic malwares using code graphs

    Lee, J., Jeong, K. & Lee, H., 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. p. 1970-1977 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    71 Citations (Scopus)
  • Detecting more SIP attacks on VoIP services by combining rule matching and state transition models

    Seo, D., Lee, H. & Nuwere, E., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 397-411 15 p. (IFIP International Federation for Information Processing; vol. 278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Detecting unknown worms using randomness check

    Park, H. & Lee, H., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 775-784 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detection of cache pollution attacks using randomness checks

    Park, H., Widjaja, I. & Lee, H., 2012, 2012 IEEE International Conference on Communications, ICC 2012. p. 1096-1100 5 p. 6363885. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Distinguishing between FE and DDoS using randomness check

    Park, H., Li, P., Gao, D., Lee, H. & Deng, R. H., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • DroidGraph: Discovering Android malware by analyzing semantic behavior

    Kwon, J., Jeong, J., Lee, J. & Lee, H., 2014 Dec 23, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 498-499 2 p. 6997523. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Dynamic classification of packing algorithms for inspecting executables using entropy analysis

    Bat-Erdene, M., Kim, T., Li, H. & Lee, H., 2013, Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013. IEEE Computer Society, p. 19-26 8 p. 6703681. (Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Dynamic multimedia scheduling against Motion based DoS attacks

    Choo, E., Lee, H. & Lee, W. Y., 2009, 2009 International Conference on Information Networking, ICOIN 2009. 4897288. (2009 International Conference on Information Networking, ICOIN 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Dynamic surveillance: A case study with Enron email data set

    Do, H., Choi, P. & Lee, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8267 LNCS. p. 81-99 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8267 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Energy-aware QoS adjustment of multimedia tasks with uncertain execution time

    Lee, W. Y., Lee, H. & Kim, H., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 4 ed. Springer Verlag, p. 709-712 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4490 LNCS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Energy-efficient and fault-tolerant positioning of multiple base stations

    Kim, S., Ko, J., Yoon, J. & Lee, H., 2008, Information Networking: Towards Ubiquitous Networking and Services - International Conference, ICOIN 2007, Revised Selected Papers. Springer Verlag, p. 584-593 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5200 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores

    Lee, W. Y., Ko, Y. W., Lee, H. & Kim, H., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 273-277 5 p. (ACM International Conference Proceeding Series; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Enforcing access control using risk assessment

    Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks. p. 419-424 6 p. 4115226. (Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    42 Citations (Scopus)
  • Enhancing the Reliability of IoT Data Marketplaces through Security Validation of IoT Devices

    Na, Y., Joo, Y., Lee, H., Zhao, X., Sajan, K. K., Ramachandran, G. & Krishnamachari, B., 2020 May, Proceedings - 16th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2020. Institute of Electrical and Electronics Engineers Inc., p. 265-272 8 p. 9183447. (Proceedings - 16th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • FassKey: A secure and convenient authentication system

    Milburn, J. & Lee, H., 2016 Jun 30, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 489-495 7 p. 7502490. (IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Filtering out unfair recommendations for trust model in ubiquitous environments

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2006, Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Bagchi, A. & Atluri, V. (eds.). Springer Verlag, p. 357-360 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Flooding DDoS mitigation and traffic management with software defined networking

    Kalliola, A., Lee, K., Lee, H. & Aura, T., 2015 Nov 20, 2015 IEEE 4th International Conference on Cloud Networking, CloudNet 2015. Institute of Electrical and Electronics Engineers Inc., p. 248-254 7 p. 7335317

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Citations (Scopus)
  • Flow traffic classification with support vector machine by using payload length

    Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Generic unpacking using entropy analysis

    Jeong, G., Choo, E., Lee, J., Bat-Erdene, M. & Lee, H., 2010, Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010. p. 98-105 8 p. 5665789. (Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Citations (Scopus)
  • Hidden bot detection by tracing non-human generated traffic at the zombie host

    Kwon, J., Lee, J. & Lee, H., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 343-361 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • HoneyID: Unveiling hidden spywares by generating bogus events

    Han, J., Kwon, J. & Lee, H., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 669-673 5 p. (IFIP International Federation for Information Processing; vol. 278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Human identification through image evaluation using secret predicates

    Jameel, H., Shaikh, R. A., Lee, H. & Lee, S., 2007, Topics in Cryptology: CT-RSA 2007 - The Cryptographers Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Springer Verlag, p. 67-84 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4377 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Image-feature based human identification protocols on limited display devices

    Jameel, H., Shaikh, R. A., Hung, L. X., Wei, Y. W., Raazi, S. M. K. U. R., Canh, N. T., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 211-224 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Improving resiliency of network topology with enhanced evolving strategies

    Kim, S., Lee, H. & Lee, W. Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 149 1 p. 4019940. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Improving VoIP call capacity of multi-hop wireless networks through self-controlled frame aggregation

    Yun, S., Kim, H., Lee, H. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2181-2185 5 p. 4109716. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Lightweight resource management for DDoS traffic isolation in a cloud environment

    Mubarok, I., Lee, K., Lee, S. & Lee, H., 2014, IFIP Advances in Information and Communication Technology. Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Kalam, A. A. E. & Sans, T. (eds.). Springer New York LLC, p. 44-51 8 p. (IFIP Advances in Information and Communication Technology; vol. 428).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Multiple-objective metric for placing multiple base stations in wireless sensor networks

    Kim, S., Ko, J. G., Yoon, J. & Lee, H., 2007, 2007 2nd International Symposium on Wireless Pervasive Computing. p. 627-631 5 p. 4147138. (2007 2nd International Symposium on Wireless Pervasive Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)