• 2249 Citations
  • 22 h-Index
19952020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

Reassembling Linux-based Hybrid RAID

Choi, J. H., Park, J. & Lee, S., 2020 May 1, In : Journal of Forensic Sciences. 65, 3, p. 966-973 8 p.

Research output: Contribution to journalArticle

2019

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts

Jeong, D. & Lee, S., 2019 Jun 1, In : Digital Investigation. 29, p. 21-27 7 p.

Research output: Contribution to journalArticle

2018
2017

Alexa, Can i Trust You?

Chung, H., Iorga, M., Voas, J. & Lee, S., 2017, Computer, 50, 9, p. 100-104 5 p.

Research output: Contribution to specialist publicationArticle

32 Citations (Scopus)

A method and tool to recover data deleted from a MongoDB

Yoon, J. & Lee, S., 2017 Jan 1, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Digital forensic approaches for Amazon Alexa ecosystem

Chung, H., Park, J. & Lee, S., 2017 Jan 1, p. S15-S25.

Research output: Contribution to conferencePaper

Open Access
3 Citations (Scopus)

Digital forensic approaches for Amazon Alexa ecosystem

Chung, H., Park, J. & Lee, S., 2017 Aug 1, In : Digital Investigation. 22, p. S15-S25

Research output: Contribution to journalArticle

30 Citations (Scopus)

Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices

Kim, D., Lee, Y. & Lee, S., 2017 Dec 1, (Accepted/In press) In : Journal of Supercomputing. p. 1-15 15 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Study on the tracking revision history of MS Word files for forensic investigation

Jeong, D. & Lee, S., 2017 Jan 1, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2016

An enhanced security framework for reliable Android operating system

Park, J. H., Kim, D., Park, J. S. & Lee, S., 2016 Apr 1, In : Security and Communication Networks. 9, 6, p. 528-534 7 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A study of user relationships in smartphone forensics

Choi, J. & Lee, S., 2016 Jun 25, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-13 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems

Seo, J. W. & Lee, S., 2016 Dec 1, In : SpringerPlus. 5, 1, 1878.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A study on the integrity and authentication of weather observation data using Identity Based Encryption

Seo, J. W. & Lee, S., 2016 Dec 1, In : SpringerPlus. 5, 1, 1225.

Research output: Contribution to journalArticle

Detection and Response of Identity Theft within a Company Utilizing Location Information

Cho, Y. & Lee, S., 2016 Apr 19, 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7456790

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Digital Forensics Technology Management Platform

Jeon, S. & Lee, S., 2016 Apr 19, 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7456793

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Forensic investigation framework for the document store NoSQL DBMS: MongoDB as a case study

Yoon, J., Jeong, D., Kang, C. H. & Lee, S., 2016 Jun 1, In : Digital Investigation. 17, p. 53-65 13 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Hard-core user and bot user classification using game character's growth types

Lee, S., Kang, S. W. & Kim, H. K., 2016 Jan 13, Annual Workshop on Network and Systems Support for Games. IEEE Computer Society, Vol. 2016-January. 7383000

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Message from the Workshop Chairs FSP 2016 Workshop

Lee, S., Seo, J. & Son, K., 2016 Apr 19, In : Unknown Journal. p. xi 7456766.

Research output: Contribution to journalEditorial

Recovery method of deleted records and tables from ESE database

Kim, J., Park, A. & Lee, S., 2016 Jan 1, p. S118-S124.

Research output: Contribution to conferencePaper

Open Access

Recovery method of deleted records and tables from ESE database

Kim, J., Park, A. & Lee, S., 2016 Aug 7, In : Digital Investigation. 18, p. S118-S124

Research output: Contribution to journalArticle

7 Citations (Scopus)
2015

Analysis of the HIKVISION DVR file system

Han, J., Jeong, D. & Lee, S., 2015, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. Springer Verlag, Vol. 157. p. 189-199 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 157).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A statistical-based anomaly detection method for connected cars in internet of things environment

Han, M. L., Lee, S., Kang, A. R., Kang, S., Park, J. K. & Kim, H. K., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9502. p. 89-97 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9502).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Investigation methodology of a virtual desktop infrastructure for IoT

Jeong, D., Park, J., Lee, S. & Kang, C., 2015, In : Journal of Applied Mathematics. 2015, 689870.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Message from FSP 2015 workshop chairs: FSP 2015 workshop

Lee, S. & Seo, J., 2015 Apr 3, In : Unknown Journal. p. xvi 7079549.

Research output: Contribution to journalArticle

2014

Advanced protocol to prevent man-in-the-middle attack in SCADA system

Oh, S., Chung, H., Lee, S. & Lee, K., 2014, In : International Journal of Security and its Applications. 8, 2, p. 1-8 8 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

An on-site digital investigation methodology for data leak case

Lee, S., Lee, K., Park, J. H. & Lee, S., 2014 Jan 1, In : Security and Communication Networks. 7, 12, p. 2616-2626 11 p.

Research output: Contribution to journalArticle

A research for partition restoration techniques

Namgung, J., Hong, I. Y., Park, J., Lee, C. & Lee, S., 2014 Jan 1, Future Information Technology, FutureTech 2013. Springer Verlag, p. 315-322 8 p. (Lecture Notes in Electrical Engineering; vol. 276 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data fragment forensics for embedded DVR systems

Park, J. & Lee, S., 2014 Jan 1, In : Digital Investigation. 11, 3, p. 187-200 14 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Practical electromagnetic disturbance analysis on commercial contactless smartcards

Ji, J., Han, D. G., Jung, S., Lee, S. & Moon, J., 2014 Jan 1, In : International Journal of Distributed Sensor Networks. 2014, 142610.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Structure and application of IconCache.db files for digital forensics

Lee, C. Y. & Lee, S., 2014 Jan 1, In : Digital Investigation. 11, 2, p. 102-110 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Test-driven forensic analysis of satellite automotive navigation systems

Lim, K. S., Lee, C., Park, J. H. & Lee, S., 2014 Jan 1, In : Journal of Intelligent Manufacturing. 25, 2, p. 329-338 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)
2013

A new triage model conforming to the needs of selective search and seizure of electronic evidence

Hong, I., Yu, H., Lee, S. & Lee, K. H., 2013 Sep 1, In : Digital Investigation. 10, 2, p. 175-192 18 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

A study of user data integrity during acquisition of android devices

Son, N., Lee, Y., Kim, D., James, J. I., Lee, S. & Lee, K. H., 2013 Jan 1, p. S3-S11.

Research output: Contribution to conferencePaper

Open Access
4 Citations (Scopus)

A study of user data integrity during acquisition of Android devices

Son, N., Lee, Y., Kim, D., James, J. I., Lee, S. & Lee, K. H., 2013 Aug 1, In : Digital Investigation. 10, SUPPL.

Research output: Contribution to journalArticle

28 Citations (Scopus)

Damaged backup data recovery method for Windows mobile

Bang, J., Lee, C., Lee, S. & Lee, K., 2013 Apr 22, In : Journal of Supercomputing. 66, 2, p. 875-887 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Methodology and implementation for tracking the file sharers using BitTorrent

Park, S., Chung, H., Lee, C., Lee, S. & Lee, K. H., 2013 Dec 10, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-16 16 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

On-site investigation methodology for incident response in Windows environments

Lee, K., Lee, C. & Lee, S., 2013 May 1, In : Computers and Mathematics with Applications. 65, 9, p. 1413-1420 8 p.

Research output: Contribution to journalArticle

2012

Analysis framework to detect artifacts of portable web browser

Choi, J. H., Lee, K. G., Park, J., Lee, C. & Lee, S., 2012 Sep 13, Lecture Notes in Electrical Engineering. Vol. 180 LNEE. p. 207-214 8 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Analysis of smartphone-based location information

Kim, D., Bang, J. & Lee, S., 2012 Jan 1, Lecture Notes in Electrical Engineering. Vol. 114 LNEE. p. 43-53 11 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An efficient method of extracting strings from unfixed-form data

Jeon, S., Park, J., Lee, K. G. & Lee, S., 2012 Oct 9, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 425-434 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A recovery method of deleted record for SQLite database

Jeon, S., Bang, J., Byun, K. & Lee, S., 2012 Aug 1, In : Personal and Ubiquitous Computing. 16, 6, p. 707-715 9 p.

Research output: Contribution to journalArticle

35 Citations (Scopus)

A research on the investigation method of digital forensics for a VMware Workstation's virtual machine

Lim, S., Yoo, B., Park, J., Byun, K. D. & Lee, S., 2012 Jan 1, In : Mathematical and Computer Modelling. 55, 1-2, p. 151-160 10 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

A study for classification of web browser log and timeline visualization

Oh, J., Son, N., Lee, S. & Lee, K. H., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Springer Verlag, Vol. 7690 LNCS. p. 192-207 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A study on multimedia file carving method

Yoo, B., Park, J., Lim, S., Bang, J. & Lee, S., 2012 Nov 1, In : Multimedia Tools and Applications. 61, 1, p. 243-261 19 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Detection of zombie PCs based on email spam analysis

Jeong, H. C., Kim, H. K., Lee, S. & Kim, E., 2012 May 25, In : KSII Transactions on Internet and Information Systems. 6, 5, p. 1445-1446 2 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Digital forensic investigation of cloud storage services

Chung, H., Park, J., Lee, S. & Kang, C., 2012 Nov 1, In : Digital Investigation. 9, 2, p. 81-95 15 p.

Research output: Contribution to journalArticle

123 Citations (Scopus)

Forensic analysis of android phone using Ext4 file system journal log

Kim, D., Park, J., Lee, K. G. & Lee, S., 2012 Oct 9, Lecture Notes in Electrical Engineering. VOL. 1 ed. Vol. 164 LNEE. p. 435-446 12 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Forensic analysis techniques for fragmented flash memory pages in smartphones

Park, J., Chung, H. & Lee, S., 2012 Nov, In : Digital Investigation. 9, 2, p. 109-118 10 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Methodology for digital forensic investigation of iCloud

Lee, J., Chung, H., Lee, C. & Lee, S., 2012 Sep 13, Lecture Notes in Electrical Engineering. Vol. 180 LNEE. p. 197-206 10 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Methodology for digital investigation of illegal sharing using BitTorrent

Park, S., Chung, H., Lee, C. & Lee, S., 2012 Sep 13, Lecture Notes in Electrical Engineering. Vol. 180 LNEE. p. 187-195 9 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution