If you made any changes in Pure these will be visible here soon.

Research Output

  • 2985 Citations
  • 23 h-Index
  • 84 Conference contribution
  • 57 Article
  • 3 Chapter
  • 1 Conference article
Filter
Article
2019

Extraction of creation-time for recovered files on windows FAT32 file system

Lee, W. Y., Kim, K. H. & Lee, H., 2019 Dec 1, In : Applied Sciences (Switzerland). 9, 24, 5522.

Research output: Contribution to journalArticle

Open Access
2018

Software systems at risk: An empirical study of cloned vulnerabilities in practice

Kim, S. & Lee, H., 2018 Jan 1, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

5 Citations (Scopus)
2017

Entropy analysis to classify unknown packing algorithms for malware detection

Bat-Erdene, M., Park, H., Li, H., Lee, H. & Choi, M-S., 2017 Jun 1, In : International Journal of Information Security. 16, 3, p. 227-248 22 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Packer detection for multi-layer executables using entropy analysis

Bat-Erdene, M., Kim, T., Park, H. & Lee, H., 2017 Mar 16, In : Entropy. 19, 3, 125.

Research output: Contribution to journalArticle

10 Citations (Scopus)
2016

Broken integrity detection of video files in video event data recorders

Lee, C., Lee, J., Pyo, Y. & Lee, H., 2016 Aug 31, In : KSII Transactions on Internet and Information Systems. 10, 8, p. 3943-3957 15 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Coordination of anti-spoofing mechanisms in partial deployments

An, H., Lee, H. & Perrig, A., 2016 Dec 1, In : Journal of Communications and Networks. 18, 6, p. 948-961 14 p., 000129.

Research output: Contribution to journalArticle

Detecting violations of security requirements for vulnerability discovery in source code

Li, H., Oh, J. & Lee, H., 2016 Sep 1, In : IEICE Transactions on Information and Systems. E99D, 9, p. 2385-2389 5 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Integrity verification of the ordered data structures in manipulated video content

Song, J., Lee, K., Lee, W. Y. & Lee, H., 2016 Sep 1, In : Digital Investigation. 18, p. 1-7 7 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

PsyBoG: A scalable botnet detection method for large-scale DNS traffic

Kwon, J., Lee, J., Lee, H. & Perrig, A., 2016 Mar 14, In : Computer Networks. 97, p. 48-73 26 p.

Research output: Contribution to journalArticle

45 Citations (Scopus)
2015

A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control

Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2015 Nov 1, In : Wireless Networks. 21, 8, p. 2631-2647 17 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

An incrementally deployable anti-spoofing mechanism for software-defined networks

Kwon, J., Seo, D., Kwon, M., Lee, H., Perrig, A. & Kim, H., 2015 Jun 15, In : Computer Communications. 64, p. 1-20 20 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)

CLORIFI: Software vulnerability discovery using code clone verification

Li, H., Kwon, H., Kwon, J. & Lee, H., 2015, (Accepted/In press) In : Concurrency Computation Practice and Experience.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11(4), 224-233]

Lee, W. Y., Kwon, H. & Lee, H., 2015, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Integrity verification scheme of video contents in surveillance cameras for digital forensic investigations

Lee, S., Song, J. E., Lee, W. Y., Ko, Y. W. & Lee, H., 2015 Jan 1, In : IEICE Transactions on Information and Systems. E98D, 1, p. 95-97 3 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Introduction to the Issue on Signal and Information Processing for Privacy

Trappe, W., Sankar, L., Poovendran, R., Lee, H. & Capkun, S., 2015 Oct 1, In : IEEE Journal on Selected Topics in Signal Processing. 9, 7, p. 1173-1175 3 p., 7265126.

Research output: Contribution to journalArticle

2014

A scalable approach for vulnerability discovery based on security patches

Li, H., Kwon, H., Kwon, J. & Lee, H., 2014 Jan 1, In : Communications in Computer and Information Science. 490, p. 109-122 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection

Seo, I., Lee, H. & Han, S. C., 2014 Jan 1, In : Computers and Security. 46, p. 141-153 13 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

GMAD: Graph-based malware activity detection by DNS traffic analysis

Lee, J. & Lee, H., 2014 Aug 1, In : Computer Communications. 49, p. 33-47 15 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

Preface

Kim, Y., Lee, H. & Perrig, A., 2014 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8267 LNCS

Research output: Contribution to journalArticle

Screening smartphone applications using malware family signatures

Lee, J., Lee, S. & Lee, H., 2014 Nov 1, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

14 Citations (Scopus)
2013

APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks

Seo, D., Lee, H. & Perrig, A., 2013 Oct 16, In : Computers and Security. 39, PART B, p. 366-385 20 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree

Seo, D., Lee, H. & Nuwere, E., 2013 Mar 1, In : Computer Communications. 36, 5, p. 562-574 13 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)
2012

Cyber-physical security of a smart grid infrastructure

Mo, Y., Kim, T. H. J., Brancik, K., Dickinson, D., Lee, H., Perrig, A. & Sinopoli, B., 2012 Jan, In : Proceedings of the IEEE. 100, 1, p. 195-209 15 p., 6016202.

Research output: Contribution to journalArticle

561 Citations (Scopus)

Identifying botnets by capturing group activities in DNS traffic

Choi, H. & Lee, H., 2012 Jan 12, In : Computer Networks. 56, 1, p. 20-33 14 p.

Research output: Contribution to journalArticle

78 Citations (Scopus)
2011

Minimum-energy semi-static scheduling of a periodic real-time task on DVFS-enabled multi-core processors

Lee, W. Y., Kim, H. & Lee, H., 2011 Dec, In : IEICE Transactions on Information and Systems. E94-D, 12, p. 2389-2392 4 p.

Research output: Contribution to journalArticle

2010

Abnormal policy detection and correction using overlapping transition

Kim, S. & Lee, H., 2010 Jan 1, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1053-1061 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Achieving network level privacy in wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2010 Mar 1, In : Sensors. 10, 3, p. 1447-1472 26 p.

Research output: Contribution to journalArticle

34 Citations (Scopus)

Activity-oriented access control to ubiquitous hospital information and services

Le, X. H., Lee, S., Lee, Y. K., Lee, H., Khalid, M. & Sankar, R., 2010 Aug 15, In : Information Sciences. 180, 16, p. 2979-2990 12 p.

Research output: Contribution to journalArticle

30 Citations (Scopus)

BARI+: A biometric based distributed key management approach for wireless body area networks

Muhammad, K. U. R. R. S., Lee, H., Lee, S. & Lee, Y. K., 2010 Apr 1, In : Sensors. 10, 4, p. 3911-3933 23 p.

Research output: Contribution to journalArticle

33 Citations (Scopus)

Classifying rules by in-out traffic direction to avoid security policy anomaly

Kim, S. & Lee, H., 2010 Aug 27, In : KSII Transactions on Internet and Information Systems. 4, 4, p. 671-690 20 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Enhancing resiliency of networks: Evolving strategy vs. multihoming

Lee, W. Y., Kim, S., Lee, H. & Kim, H., 2010 Apr 12, In : IEICE Transactions on Communications. E93-B, 1, p. 174-177 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

MUQAMI+: A scalable and locally distributed key management scheme for clustered sensor networks

Syed, M. K. U. R. R., Lee, H., Lee, S. & Lee, Y. K., 2010 Feb 1, In : Annales des Telecommunications/Annals of Telecommunications. 65, 1-2, p. 101-116 16 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)
2009

An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography

Le, X. H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., Han, M., Lee, Y. K. & Lee, H., 2009 Dec 1, In : Journal of Communications and Networks. 11, 6, p. 599-606 8 p.

Research output: Contribution to journalArticle

37 Citations (Scopus)

Fast detection and visualization of network attacks on parallel coordinates

Choi, H., Lee, H. & Kim, H., 2009 Jul 1, In : Computers and Security. 28, 5, p. 276-288 13 p.

Research output: Contribution to journalArticle

58 Citations (Scopus)

Group-based trust management scheme for clustered wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2009 Aug 21, In : IEEE Transactions on Parallel and Distributed Systems. 20, 11, p. 1698-1712 15 p.

Research output: Contribution to journalArticle

233 Citations (Scopus)

Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2009 Jun 1, In : Sensors. 9, 8, p. 5989-6007 19 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Is early warning of an imminent worm epidemic possible?

Park, H., Kim, H. & Lee, H., 2009 Oct 22, In : IEEE Network. 23, 5, p. 14-20 7 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
3 Citations (Scopus)

Reducing payload inspection cost using rule classification for fast attack signature matching

Kim, S. & Lee, H., 2009 Jan 1, In : IEICE Transactions on Information and Systems. E92-D, 10, p. 1971-1978 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

SCODE: A secure coordination-based data dissemination tomobile sinks in sensor networks

Hung, L., Lee, S., Lee, Y. K. & Lee, H., 2009 Dec 1, In : IEICE Transactions on Communications. E92-B, 1, p. 131-142 12 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Secure wireless networking

Perrig, A., Trappe, W., Gligor, V., Poovendran, R. & Lee, H., 2009 Dec 1, In : Journal of Communications and Networks. 11, 6, p. 533-537 5 p.

Research output: Contribution to journalArticle

2008

A connection management protocol for stateful inspection firewalls in multi-homed networks

Kim, J. H., Lee, H. & Bahk, S., 2008 Dec, In : Journal of Communications and Networks. 10, 4, p. 455-464 10 p.

Research output: Contribution to journalArticle

An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge

Hung, L. X., Canh, N. T., Lee, S., Lee, Y. K. & Lee, H., 2008 Dec 1, In : Sensors. 8, 12, p. 7753-7782 30 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2007
20 Citations (Scopus)

Boosting VoIP capacity of wireless mesh networks through lazy frame aggregation

Kim, H., Yun, S. & Lee, H., 2007 May 1, In : IEICE Transactions on Communications. E90-B, 5, p. 1283-1285 3 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Detecting Unknown Worms Using Randomness Check

Park, H., Lee, H. & Kim, H., 2007 Apr 1, In : IEICE Transactions on Communications. E90-B, 4, p. 894-903 10 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Error bound of collision probability estimation in non-saturated IEEE 802.11 WLANs

Kim, H., Yoon, J. & Lee, H., 2007 Jul, In : IEICE Transactions on Communications. E90-B, 7, p. 1884-1885 2 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Evaluation of authentication interworking methods among multiple WLAN service providers

Lee, W. Y. & Lee, H., 2007 May 1, In : International Journal of Communication Systems. 20, 5, p. 515-531 17 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

Kim, H., Lee, H. & Shin, S., 2007 Feb, In : IEICE Transactions on Communications. E90-B, 2, p. 412-416 5 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)