• 3133 Citations
  • 23 h-Index
19952019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2019

Extraction of creation-time for recovered files on windows FAT32 file system

Lee, W. Y., Kim, K. H. & Lee, H., 2019 Dec 1, In : Applied Sciences (Switzerland). 9, 24, 5522.

Research output: Contribution to journalArticle

Open Access
2 Citations (Scopus)
2018

Software systems at risk: An empirical study of cloned vulnerabilities in practice

Kim, S. & Lee, H., 2018 Jan 1, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2017

Entropy analysis to classify unknown packing algorithms for malware detection

Bat-Erdene, M., Park, H., Li, H., Lee, H. & Choi, M-S., 2017 Jun 1, In : International Journal of Information Security. 16, 3, p. 227-248 22 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Packer detection for multi-layer executables using entropy analysis

Bat-Erdene, M., Kim, T., Park, H. & Lee, H., 2017 Mar 16, In : Entropy. 19, 3, 125.

Research output: Contribution to journalArticle

10 Citations (Scopus)
2016

Broken integrity detection of video files in video event data recorders

Lee, C., Lee, J., Pyo, Y. & Lee, H., 2016 Aug 31, In : KSII Transactions on Internet and Information Systems. 10, 8, p. 3943-3957 15 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Coordination of anti-spoofing mechanisms in partial deployments

An, H., Lee, H. & Perrig, A., 2016 Dec 1, In : Journal of Communications and Networks. 18, 6, p. 948-961 14 p., 000129.

Research output: Contribution to journalArticle

Detecting violations of security requirements for vulnerability discovery in source code

Li, H., Oh, J. & Lee, H., 2016 Sep 1, In : IEICE Transactions on Information and Systems. E99D, 9, p. 2385-2389 5 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Integrity verification of the ordered data structures in manipulated video content

Song, J., Lee, K., Lee, W. Y. & Lee, H., 2016 Sep 1, In : Digital Investigation. 18, p. 1-7 7 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

PsyBoG: A scalable botnet detection method for large-scale DNS traffic

Kwon, J., Lee, J., Lee, H. & Perrig, A., 2016 Mar 14, In : Computer Networks. 97, p. 48-73 26 p.

Research output: Contribution to journalArticle

52 Citations (Scopus)
2015

A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control

Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2015 Nov 1, In : Wireless Networks. 21, 8, p. 2631-2647 17 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

An incrementally deployable anti-spoofing mechanism for software-defined networks

Kwon, J., Seo, D., Kwon, M., Lee, H., Perrig, A. & Kim, H., 2015 Jun 15, In : Computer Communications. 64, p. 1-20 20 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

CLORIFI: Software vulnerability discovery using code clone verification

Li, H., Kwon, H., Kwon, J. & Lee, H., 2015, (Accepted/In press) In : Concurrency Computation Practice and Experience.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11(4), 224-233]

Lee, W. Y., Kwon, H. & Lee, H., 2015, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Integrity verification scheme of video contents in surveillance cameras for digital forensic investigations

Lee, S., Song, J. E., Lee, W. Y., Ko, Y. W. & Lee, H., 2015 Jan 1, In : IEICE Transactions on Information and Systems. E98D, 1, p. 95-97 3 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Introduction to the Issue on Signal and Information Processing for Privacy

Trappe, W., Sankar, L., Poovendran, R., Lee, H. & Capkun, S., 2015 Oct 1, In : IEEE Journal on Selected Topics in Signal Processing. 9, 7, p. 1173-1175 3 p., 7265126.

Research output: Contribution to journalArticle

PA-DHK: Polarity analysis for discovering hidden knowledge

Kim, J. D., Son, J., Peter In, H., Hwang, S. H., Lee, H. & Baik, D. K., 2015, In : Scientia Iranica. 22, 6, p. 2198-2208 11 p.

Research output: Contribution to journalArticle

2014

A scalable approach for vulnerability discovery based on security patches

Li, H., Kwon, H., Kwon, J. & Lee, H., 2014, In : Communications in Computer and Information Science. 490, p. 109-122 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection

Seo, I., Lee, H. & Han, S. C., 2014 Jan 1, In : Computers and Security. 46, p. 141-153 13 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

GMAD: Graph-based malware activity detection by DNS traffic analysis

Lee, J. & Lee, H., 2014 Aug 1, In : Computer Communications. 49, p. 33-47 15 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

Screening smartphone applications using malware family signatures

Lee, J., Lee, S. & Lee, H., 2014 Nov 1, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

18 Citations (Scopus)
2013

APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks

Seo, D., Lee, H. & Perrig, A., 2013, In : Computers and Security. 39, PART B, p. 366-385 20 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree

Seo, D., Lee, H. & Nuwere, E., 2013 Mar 1, In : Computer Communications. 36, 5, p. 562-574 13 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)
2012

Cyber-physical security of a smart grid infrastructure

Mo, Y., Kim, T. H. J., Brancik, K., Dickinson, D., Lee, H., Perrig, A. & Sinopoli, B., 2012 Jan, In : Proceedings of the IEEE. 100, 1, p. 195-209 15 p., 6016202.

Research output: Contribution to journalArticle

609 Citations (Scopus)

Identifying botnets by capturing group activities in DNS traffic

Choi, H. & Lee, H., 2012 Jan 12, In : Computer Networks. 56, 1, p. 20-33 14 p.

Research output: Contribution to journalArticle

82 Citations (Scopus)
2011

Minimum-energy semi-static scheduling of a periodic real-time task on DVFS-enabled multi-core processors

Lee, W. Y., Kim, H. & Lee, H., 2011 Dec, In : IEICE Transactions on Information and Systems. E94-D, 12, p. 2389-2392 4 p.

Research output: Contribution to journalArticle

2010

Abnormal policy detection and correction using overlapping transition

Kim, S. & Lee, H., 2010, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1053-1061 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Achieving network level privacy in wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2010 Mar, In : Sensors. 10, 3, p. 1447-1472 26 p.

Research output: Contribution to journalArticle

35 Citations (Scopus)

Activity-oriented access control to ubiquitous hospital information and services

Le, X. H., Lee, S., Lee, Y. K., Lee, H., Khalid, M. & Sankar, R., 2010 Aug 15, In : Information Sciences. 180, 16, p. 2979-2990 12 p.

Research output: Contribution to journalArticle

32 Citations (Scopus)

BARI+: A biometric based distributed key management approach for wireless body area networks

Muhammad, K. U. R. R. S., Lee, H., Lee, S. & Lee, Y. K., 2010 Apr, In : Sensors. 10, 4, p. 3911-3933 23 p.

Research output: Contribution to journalArticle

34 Citations (Scopus)

Classifying rules by in-out traffic direction to avoid security policy anomaly

Kim, S. & Lee, H., 2010 Aug 27, In : KSII Transactions on Internet and Information Systems. 4, 4, p. 671-690 20 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Enhancing resiliency of networks: Evolving strategy vs. multihoming

Lee, W. Y., Kim, S., Lee, H. & Kim, H., 2010, In : IEICE Transactions on Communications. E93-B, 1, p. 174-177 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

MUQAMI+: A scalable and locally distributed key management scheme for clustered sensor networks

Syed, M. K. U. R. R., Lee, H., Lee, S. & Lee, Y. K., 2010 Feb, In : Annales des Telecommunications/Annals of Telecommunications. 65, 1-2, p. 101-116 16 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)
2009

An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography

Le, X. H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., Han, M., Lee, Y. K. & Lee, H., 2009 Dec, In : Journal of Communications and Networks. 11, 6, p. 599-606 8 p.

Research output: Contribution to journalArticle

38 Citations (Scopus)

Fast detection and visualization of network attacks on parallel coordinates

Choi, H., Lee, H. & Kim, H., 2009 Jul, In : Computers and Security. 28, 5, p. 276-288 13 p.

Research output: Contribution to journalArticle

59 Citations (Scopus)

Group-based trust management scheme for clustered wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2009, In : IEEE Transactions on Parallel and Distributed Systems. 20, 11, p. 1698-1712 15 p.

Research output: Contribution to journalArticle

245 Citations (Scopus)

Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2009 Jun, In : Sensors. 9, 8, p. 5989-6007 19 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Is early warning of an imminent worm epidemic possible?

Park, H., Kim, H. & Lee, H., 2009, In : IEEE Network. 23, 5, p. 14-20 7 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
3 Citations (Scopus)

Reducing payload inspection cost using rule classification for fast attack signature matching

Kim, S. & Lee, H., 2009, In : IEICE Transactions on Information and Systems. E92-D, 10, p. 1971-1978 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

SCODE: A secure coordination-based data dissemination tomobile sinks in sensor networks

Hung, L., Lee, S., Lee, Y. K. & Lee, H., 2009, In : IEICE Transactions on Communications. E92-B, 1, p. 131-142 12 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2008

A connection management protocol for stateful inspection firewalls in multi-homed networks

Kim, J. H., Lee, H. & Bahk, S., 2008 Dec, In : Journal of Communications and Networks. 10, 4, p. 455-464 10 p.

Research output: Contribution to journalArticle

An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge

Hung, L. X., Canh, N. T., Lee, S., Lee, Y. K. & Lee, H., 2008 Dec, In : Sensors. 8, 12, p. 7753-7782 30 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2007
20 Citations (Scopus)

Boosting VoIP capacity of wireless mesh networks through lazy frame aggregation

Kim, H., Yun, S. & Lee, H., 2007 May, In : IEICE Transactions on Communications. E90-B, 5, p. 1283-1285 3 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Detecting Unknown Worms Using Randomness Check

Park, H., Lee, H. & Kim, H., 2007 Apr, In : IEICE Transactions on Communications. E90-B, 4, p. 894-903 10 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Error bound of collision probability estimation in non-saturated IEEE 802.11 WLANs

Kim, H., Yoon, J. & Lee, H., 2007 Jul, In : IEICE Transactions on Communications. E90-B, 7, p. 1884-1885 2 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Evaluation of authentication interworking methods among multiple WLAN service providers

Lee, W. Y. & Lee, H., 2007 May, In : International Journal of Communication Systems. 20, 5, p. 515-531 17 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

Kim, H., Lee, H. & Shin, S., 2007 Feb, In : IEICE Transactions on Communications. E90-B, 2, p. 412-416 5 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2006

Energy-efficient scheduling for multiprocessors

Lee, W. Y. & Lee, H., 2006, In : Electronics Letters. 42, 21, p. 1200-1201 2 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Optimal scheduling for real-time parallel tasks

Lee, W. Y. & Lee, H., 2006 Jun, In : IEICE Transactions on Information and Systems. E89-D, 6, p. 1962-1966 5 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)