• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1995 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2008

    Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

    Shaikh, R. A., Jameel, H., D'Auriol, B. J., Lee, S., Song, Y. J. & Lee, H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2038-2043 6 p. 4709287. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Unified rate limiting in broadband access networks for defeating Internet worms and DDoS attacks

    Park, K., Seo, D., Yoo, J., Lee, H. & Kim, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 176-187 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    Activity-based access control model to hospital information

    Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

    Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A location-aware key predistribution scheme for distributed wireless sensor networks

    Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A password stretching method using user specific salts

    Lee, C. & Lee, H., 2007, 16th International World Wide Web Conference, WWW2007. p. 1215-1216 2 p. (16th International World Wide Web Conference, WWW2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A privacy preserving access control scheme using anonymous identification for ubiquitous environments

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H. J., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 482-487 6 p. 4296887. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A trust-based approach to control privacy exposure in Ubiquitous Computing environments

    Giang, P. D., Hung, L. X., Shaikh, R. A., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, 2007 IEEE International Conference on Pervasive Services, ICPS. p. 149-152 4 p. 4283905. (2007 IEEE International Conference on Pervasive Services, ICPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • BASE: An incrementally deployable mechanism for viable IP spoofing prevention

    Lee, H., Kwon, M., Hasker, G. & Perrig, A., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 20-31 12 p. (Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • Bayesian memory-based reputation system

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2007 Aug 27, MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications. Association for Computing Machinery, Inc, 1385300. (MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Botnet detection by monitoring group activities in DNS traffic

    Choi, H., Lee, H., Lee, H. & Kim, H., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 715-720 6 p. 4385169. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    183 Citations (Scopus)
  • Contextual risk-based access control

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings of The 2007 International Conference on Security and Management, SAM'07. p. 406-412 7 p. (Proceedings of The 2007 International Conference on Security and Management, SAM'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Cyber threat trend analysis model using HMM

    Kim, D. H., Lee, T., Jung, S. O. D., In, H. P. & Lee, H. J., 2007, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security. p. 177-182 6 p. 4299771. (Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • Energy-aware QoS adjustment of multimedia tasks with uncertain execution time

    Lee, W. Y., Lee, H. & Kim, H., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 4 ed. Springer Verlag, p. 709-712 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4490 LNCS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Enforcing access control using risk assessment

    Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks. p. 419-424 6 p. 4115226. (Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    42 Citations (Scopus)
  • Human identification through image evaluation using secret predicates

    Jameel, H., Shaikh, R. A., Lee, H. & Lee, S., 2007, Topics in Cryptology: CT-RSA 2007 - The Cryptographers Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Springer Verlag, p. 67-84 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4377 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Multiple-objective metric for placing multiple base stations in wireless sensor networks

    Kim, S., Ko, J. G., Yoon, J. & Lee, H., 2007, 2007 2nd International Symposium on Wireless Pervasive Computing. p. 627-631 5 p. 4147138. (2007 2nd International Symposium on Wireless Pervasive Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • SRMT: A lightweight encryption scheme for secure real-time multimedia transmission

    Choo, E., Lee, J., Lee, H. & Nam, G., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. IEEE Computer Society, p. 60-65 6 p. 4197250. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Transmission time-based mechanism to detect wormhole attacks

    Van Phuong, T., Canh, N. T., Lee, Y. K., Lee, S. & Lee, H., 2007, Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007. p. 172-178 7 p. 4414457. (Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks

    Van Tran, P., Hung, L. X., Lee, Y. K., Lee, S. & Lee, H., 2007, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007. p. 593-598 6 p. 4199210. (2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)
  • Using reputation system in ubiquitous healthcare

    Weiwei, Y., Donghai, G., Sungyoung, L. & Heejo, L., 2007, HEALTHCOM 2007: Ubiquitous Health in Aging Societies - 2007 9th International Conference on e-Health Networking, Application and Services. p. 182-186 5 p. 4265820. (HEALTHCOM 2007: Ubiquitous Health in Aging Societies - 2007 9th International Conference on e-Health Networking, Application and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • 2006

    A simple congestion-resilient link adaptation algorithm for IEEE 802.11 WLANs

    Kim, H., Yun, S., Lee, H., Kang, I. & Choi, K. Y., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151441. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Cascade damage estimation model for internet attacks

    Lee, T., In, H. P., Im, E. G. & Lee, H., 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. Springer Verlag, p. 163-164 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Detecting unknown worms using randomness check

    Park, H. & Lee, H., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 775-784 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Filtering out unfair recommendations for trust model in ubiquitous environments

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2006, Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Bagchi, A. & Atluri, V. (eds.). Springer Verlag, p. 357-360 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Improving resiliency of network topology with enhanced evolving strategies

    Kim, S., Lee, H. & Lee, W. Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 149 1 p. 4019940. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Improving VoIP call capacity of multi-hop wireless networks through self-controlled frame aggregation

    Yun, S., Kim, H., Lee, H. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2181-2185 5 p. 4109716. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • One touch logon: Replacing multiple passwords with single fingerprint recognition

    Park, B., Hong, S., Oh, J., Lee, H. & Won, Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 163 1 p. 4019947. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

    Kim, H., Lee, H., Shin, S. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2241-2246 6 p. 4109728. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2005

    PCAV: Internet attack visualization on parallel coordinates

    Choi, H. & Lee, H., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 454-466 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • 2000

    Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization

    Lee, H., Kim, J., Hong, S. J. & Lee, S., 2000, Proceedings of the 2000 ACM Symposium on Applied Computing, SAC 2000. p. 641-648 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)