If you made any changes in Pure these will be visible here soon.

Research Output 1995 2019

  • 2194 Citations
  • 22 h-Index
  • 116 Conference contribution
  • 93 Article
  • 3 Paper
  • 1 Editorial
2019

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts

Jeong, D. & Lee, S., 2019 Jun 1, In : Digital Investigation. 29, p. 21-27 7 p.

Research output: Contribution to journalArticle

Firmware
Copying
Computer operating systems
Artifacts
artifact
2018
Servers
Intrusion detection
Experiments
Botnet
2017
27 Citations (Scopus)

Alexa, Can i Trust You?

Chung, H., Iorga, M., Voas, J. & Lee, S., 2017, Computer, 50, 9, p. 100-104 5 p.

Research output: Contribution to specialist publicationArticle

Ecosystems
Testing
2 Citations (Scopus)

A method and tool to recover data deleted from a MongoDB

Yoon, J. & Lee, S., 2017 Jan 1, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

Information Storage and Retrieval
Research
Recovery
Servers
Engines
3 Citations (Scopus)

Digital forensic approaches for Amazon Alexa ecosystem

Chung, H., Park, J. & Lee, S., 2017 Jan 1, p. S15-S25.

Research output: Contribution to conferencePaper

Open Access
Ecosystems
Web browsers
Mobile devices
Digital forensics
Internet of things
29 Citations (Scopus)

Digital forensic approaches for Amazon Alexa ecosystem

Chung, H., Park, J. & Lee, S., 2017 Aug 1, In : Digital Investigation. 22, p. S15-S25

Research output: Contribution to journalArticle

assistant
Ecosystems
Ecosystem
Equipment and Supplies
artifact
1 Citation (Scopus)

Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices

Kim, D., Lee, Y. & Lee, S., 2017 Dec 1, (Accepted/In press) In : Journal of Supercomputing. p. 1-15 15 p.

Research output: Contribution to journalArticle

Crime
Mobile devices
User Behavior
Mobile Devices
Repository
2 Citations (Scopus)

Study on the tracking revision history of MS Word files for forensic investigation

Jeong, D. & Lee, S., 2017 Jan 1, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

Metadata
Thymidine Monophosphate
History
history
Research Personnel
2016
2 Citations (Scopus)

An enhanced security framework for reliable Android operating system

Park, J. H., Kim, D., Park, J. S. & Lee, S., 2016 Apr 1, In : Security and Communication Networks. 9, 6, p. 528-534 7 p.

Research output: Contribution to journalArticle

Computer operating systems
Websites
Computer systems
Malware
1 Citation (Scopus)

A study of user relationships in smartphone forensics

Choi, J. & Lee, S., 2016 Jun 25, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-13 13 p.

Research output: Contribution to journalArticle

Smartphones
Experiments
3 Citations (Scopus)

A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems

Seo, J. W. & Lee, S., 2016 Dec 1, In : SpringerPlus. 5, 1, 1878.

Research output: Contribution to journalArticle

Servers
Malware

A study on the integrity and authentication of weather observation data using Identity Based Encryption

Seo, J. W. & Lee, S., 2016 Dec 1, In : SpringerPlus. 5, 1, 1225.

Research output: Contribution to journalArticle

Authentication
Cryptography
National security
Warships
Terrorism
1 Citation (Scopus)

Detection and Response of Identity Theft within a Company Utilizing Location Information

Cho, Y. & Lee, S., 2016 Apr 19, 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7456790

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Access control
Authentication
Cryptography
Accidents
1 Citation (Scopus)

Digital Forensics Technology Management Platform

Jeon, S. & Lee, S., 2016 Apr 19, 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7456793

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital devices
Crime
Accidents
Digital forensics
Processing
11 Citations (Scopus)

Forensic investigation framework for the document store NoSQL DBMS: MongoDB as a case study

Yoon, J., Jeong, D., Kang, C. H. & Lee, S., 2016 Jun 1, In : Digital Investigation. 17, p. 53-65 13 p.

Research output: Contribution to journalArticle

Crime
Mobile Applications
Information Storage and Retrieval
Internet
offense

Hard-core user and bot user classification using game character's growth types

Lee, S., Kang, S. W. & Kim, H. K., 2016 Jan 13, Annual Workshop on Network and Systems Support for Games. IEEE Computer Society, Vol. 2016-January. 7383000

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry

Message from the Workshop Chairs FSP 2016 Workshop

Lee, S., Seo, J. & Son, K., 2016 Apr 19, In : Unknown Journal. p. xi 7456766.

Research output: Contribution to journalEditorial

Recovery method of deleted records and tables from ESE database

Kim, J., Park, A. & Lee, S., 2016 Jan 1, p. S118-S124.

Research output: Contribution to conferencePaper

Open Access
Engines
Recovery
Web browsers
Application programming interfaces (API)
Data storage equipment
5 Citations (Scopus)

Recovery method of deleted records and tables from ESE database

Kim, J., Park, A. & Lee, S., 2016 Aug 7, In : Digital Investigation. 18, p. S118-S124

Research output: Contribution to journalArticle

Databases
Engines
Recovery
data storage
Web Browser
2015
2 Citations (Scopus)

Analysis of the HIKVISION DVR file system

Han, J., Jeong, D. & Lee, S., 2015, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. Springer Verlag, Vol. 157. p. 189-199 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 157).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hard disk storage
Digital forensics
9 Citations (Scopus)

A statistical-based anomaly detection method for connected cars in internet of things environment

Han, M. L., Lee, S., Kang, A. R., Kang, S., Park, J. K. & Kim, H. K., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9502. p. 89-97 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9502).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Anomaly Detection
Railroad cars
Attack
Thing
5 Citations (Scopus)

Investigation methodology of a virtual desktop infrastructure for IoT

Jeong, D., Park, J., Lee, S. & Kang, C., 2015, In : Journal of Applied Mathematics. 2015, 689870.

Research output: Contribution to journalArticle

Internet of Things
Cloud computing
Infrastructure
Methodology
Servers

Message from FSP 2015 workshop chairs: FSP 2015 workshop

Lee, S. & Seo, J., 2015 Apr 3, In : Unknown Journal. p. xvi 7079549.

Research output: Contribution to journalArticle

2014
4 Citations (Scopus)

Advanced protocol to prevent man-in-the-middle attack in SCADA system

Oh, S., Chung, H., Lee, S. & Lee, K. H., 2014 Jan 1, In : International Journal of Security and its Applications. 8, 2, p. 1-8 8 p.

Research output: Contribution to journalArticle

SCADA systems
Gas pipelines
Power transmission
Water treatment
Disasters

An on-site digital investigation methodology for data leak case

Lee, S., Lee, K., Park, J. H. & Lee, S., 2014 Jan 1, In : Security and Communication Networks. 7, 12, p. 2616-2626 11 p.

Research output: Contribution to journalArticle

Digital forensics

A research for partition restoration techniques

Namgung, J., Hong, I. Y., Park, J., Lee, C. & Lee, S., 2014 Jan 1, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 276 LNEE. p. 315-322 8 p. (Lecture Notes in Electrical Engineering; vol. 276 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Restoration
Recovery
5 Citations (Scopus)

Data fragment forensics for embedded DVR systems

Park, J. & Lee, S., 2014 Jan 1, In : Digital Investigation. 11, 3, p. 187-200 14 p.

Research output: Contribution to journalArticle

Multimedia
video
Embedded systems
Digital forensics
fragmentation
1 Citation (Scopus)

Practical electromagnetic disturbance analysis on commercial contactless smartcards

Ji, J., Han, D. G., Jung, S., Lee, S. & Moon, J., 2014 Jan 1, In : International Journal of Distributed Sensor Networks. 2014, 142610.

Research output: Contribution to journalArticle

Smart cards
Access control
Cryptography
Control systems
Costs
3 Citations (Scopus)

Structure and application of IconCache.db files for digital forensics

Lee, C. Y. & Lee, S., 2014 Jan 1, In : Digital Investigation. 11, 2, p. 102-110 9 p.

Research output: Contribution to journalArticle

Artifacts
artifact
cyhalothrin
Digital forensics
time
4 Citations (Scopus)

Test-driven forensic analysis of satellite automotive navigation systems

Lim, K. S., Lee, C., Park, J. H. & Lee, S., 2014 Jan 1, In : Journal of Intelligent Manufacturing. 25, 2, p. 329-338 10 p.

Research output: Contribution to journalArticle

Navigation systems
Satellites
Navigation
Crime
Global positioning system
2013
9 Citations (Scopus)

A new triage model conforming to the needs of selective search and seizure of electronic evidence

Hong, I., Yu, H., Lee, S. & Lee, K. H., 2013 Sep 1, In : Digital Investigation. 10, 2, p. 175-192 18 p.

Research output: Contribution to journalArticle

seizure
Triage
Law enforcement
Law Enforcement
law enforcement
4 Citations (Scopus)

A study of user data integrity during acquisition of android devices

Son, N., Lee, Y., Kim, D., James, J. I., Lee, S. & Lee, K. H., 2013 Jan 1, p. S3-S11.

Research output: Contribution to conferencePaper

Open Access
Data acquisition
Recovery
Smartphones
Digital forensics
28 Citations (Scopus)

A study of user data integrity during acquisition of Android devices

Son, N., Lee, Y., Kim, D., James, J. I., Lee, S. & Lee, K. H., 2013 Aug 1, In : Digital Investigation. 10, SUPPL.

Research output: Contribution to journalArticle

integrity
Equipment and Supplies
Data acquisition
data acquisition
Recovery
1 Citation (Scopus)

Damaged backup data recovery method for Windows mobile

Bang, J., Lee, C., Lee, S. & Lee, K. H., 2013 Apr 22, In : Journal of Supercomputing. 66, 2, p. 875-887 13 p.

Research output: Contribution to journalArticle

Recovery
Windows operating system
Grid computing
Cloud computing
Metadata
4 Citations (Scopus)

Methodology and implementation for tracking the file sharers using BitTorrent

Park, S., Chung, H., Lee, C., Lee, S. & Lee, K. H., 2013 Dec 10, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-16 16 p.

Research output: Contribution to journalArticle

Servers

On-site investigation methodology for incident response in Windows environments

Lee, K., Lee, C. & Lee, S., 2013 May 1, In : Computers and Mathematics with Applications. 65, 9, p. 1413-1420 8 p.

Research output: Contribution to journalArticle

Personal computers
Servers
Display devices
Attack
Path
2012
2 Citations (Scopus)

Analysis framework to detect artifacts of portable web browser

Choi, J. H., Lee, K. G., Park, J., Lee, C. & Lee, S., 2012 Sep 13, Lecture Notes in Electrical Engineering. Vol. 180 LNEE. p. 207-214 8 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Computer operating systems
Websites
Computer systems

Analysis of smartphone-based location information

Kim, D., Bang, J. & Lee, S., 2012 Jan 1, Lecture Notes in Electrical Engineering. Vol. 114 LNEE. p. 43-53 11 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Global positioning system
Digital forensics

An efficient method of extracting strings from unfixed-form data

Jeon, S., Park, J., Lee, K. G. & Lee, S., 2012 Oct 9, Lecture Notes in Electrical Engineering. VOL. 1 ed. Vol. 164 LNEE. p. 425-434 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Websites
Digital forensics
34 Citations (Scopus)

A recovery method of deleted record for SQLite database

Jeon, S., Bang, J., Byun, K. & Lee, S., 2012 Aug 1, In : Personal and Ubiquitous Computing. 16, 6, p. 707-715 9 p.

Research output: Contribution to journalArticle

Recovery
Smartphones
Application programs
Information management
Availability
5 Citations (Scopus)

A research on the investigation method of digital forensics for a VMware Workstation's virtual machine

Lim, S., Yoo, B., Park, J., Byun, K. & Lee, S., 2012 Jan 1, In : Mathematical and Computer Modelling. 55, 1-2, p. 151-160 10 p.

Research output: Contribution to journalArticle

Digital Forensics
Computer workstations
Virtual Machine
Recovery
Virtualization
1 Citation (Scopus)

A study for classification of web browser log and timeline visualization

Oh, J., Son, N., Lee, S. & Lee, K. H., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Springer Verlag, Vol. 7690 LNCS. p. 192-207 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital Forensics
Web browsers
Cache
Visualization
Data Classification
13 Citations (Scopus)

A study on multimedia file carving method

Yoo, B., Park, J., Lim, S., Bang, J. & Lee, S., 2012 Nov 1, In : Multimedia Tools and Applications. 61, 1, p. 243-261 19 p.

Research output: Contribution to journalArticle

Recovery
Data compression
Digital forensics
7 Citations (Scopus)

Detection of zombie PCs based on email spam analysis

Jeong, H. C., Kim, H. K., Lee, S. & Kim, E., 2012 May 25, In : KSII Transactions on Internet and Information Systems. 6, 5, p. 1445-1446 2 p.

Research output: Contribution to journalArticle

Electronic mail
Spamming
Pollution
Computer crime
Botnet
120 Citations (Scopus)

Digital forensic investigation of cloud storage services

Chung, H., Park, J., Lee, S. & Kang, C., 2012 Nov 1, In : Digital Investigation. 9, 2, p. 81-95 15 p.

Research output: Contribution to journalArticle

Smartphones
Cloud computing
Digital devices
Internet
popularity
17 Citations (Scopus)

Forensic analysis of android phone using Ext4 file system journal log

Kim, D., Park, J., Lee, K. G. & Lee, S., 2012 Oct 9, Lecture Notes in Electrical Engineering. VOL. 1 ed. Vol. 164 LNEE. p. 435-446 12 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault tolerance
Digital forensics
Linux
11 Citations (Scopus)

Forensic analysis techniques for fragmented flash memory pages in smartphones

Park, J., Chung, H. & Lee, S., 2012 Nov 1, In : Digital Investigation. 9, 2, p. 109-118 10 p.

Research output: Contribution to journalArticle

Flash memory
Smartphones
data acquisition
systems analysis
data analysis
3 Citations (Scopus)

Methodology for digital forensic investigation of iCloud

Lee, J., Chung, H., Lee, C. & Lee, S., 2012 Sep 13, Lecture Notes in Electrical Engineering. Vol. 180 LNEE. p. 197-206 10 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Industry
Digital forensics

Methodology for digital investigation of illegal sharing using BitTorrent

Park, S., Chung, H., Lee, C. & Lee, S., 2012 Sep 13, Lecture Notes in Electrical Engineering. Vol. 180 LNEE. p. 187-195 9 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
8 Citations (Scopus)

On-the-spot digital investigation by means of LDFS: Live Data Forensic System

Lim, K. S., Savoldi, A., Lee, C. & Lee, S., 2012 Jan 1, In : Mathematical and Computer Modelling. 55, 1-2, p. 223-240 18 p.

Research output: Contribution to journalArticle

Web browsers
Crime
File System
Metadata
Instant