If you made any changes in Pure these will be visible here soon.

Research Output 1995 2019

  • 2193 Citations
  • 22 h-Index
  • 116 Conference contribution
  • 93 Article
  • 3 Paper
  • 1 Editorial
Filter
Conference contribution
2016
1 Citation (Scopus)

Detection and Response of Identity Theft within a Company Utilizing Location Information

Cho, Y. & Lee, S., 2016 Apr 19, 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7456790

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Access control
Authentication
Cryptography
Accidents
1 Citation (Scopus)

Digital Forensics Technology Management Platform

Jeon, S. & Lee, S., 2016 Apr 19, 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7456793

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital devices
Crime
Accidents
Digital forensics
Processing

Hard-core user and bot user classification using game character's growth types

Lee, S., Kang, S. W. & Kim, H. K., 2016 Jan 13, Annual Workshop on Network and Systems Support for Games. IEEE Computer Society, Vol. 2016-January. 7383000

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
2015
2 Citations (Scopus)

Analysis of the HIKVISION DVR file system

Han, J., Jeong, D. & Lee, S., 2015, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. Springer Verlag, Vol. 157. p. 189-199 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 157).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hard disk storage
Digital forensics
9 Citations (Scopus)

A statistical-based anomaly detection method for connected cars in internet of things environment

Han, M. L., Lee, S., Kang, A. R., Kang, S., Park, J. K. & Kim, H. K., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9502. p. 89-97 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9502).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Anomaly Detection
Railroad cars
Attack
Thing
2014

A research for partition restoration techniques

Namgung, J., Hong, I. Y., Park, J., Lee, C. & Lee, S., 2014 Jan 1, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 276 LNEE. p. 315-322 8 p. (Lecture Notes in Electrical Engineering; vol. 276 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Restoration
Recovery
2012
2 Citations (Scopus)

Analysis framework to detect artifacts of portable web browser

Choi, J. H., Lee, K. G., Park, J., Lee, C. & Lee, S., 2012 Sep 13, Lecture Notes in Electrical Engineering. Vol. 180 LNEE. p. 207-214 8 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Computer operating systems
Websites
Computer systems

Analysis of smartphone-based location information

Kim, D., Bang, J. & Lee, S., 2012 Jan 1, Lecture Notes in Electrical Engineering. Vol. 114 LNEE. p. 43-53 11 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Global positioning system
Digital forensics

An efficient method of extracting strings from unfixed-form data

Jeon, S., Park, J., Lee, K. G. & Lee, S., 2012 Oct 9, Lecture Notes in Electrical Engineering. VOL. 1 ed. Vol. 164 LNEE. p. 425-434 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Websites
Digital forensics
1 Citation (Scopus)

A study for classification of web browser log and timeline visualization

Oh, J., Son, N., Lee, S. & Lee, K. H., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Springer Verlag, Vol. 7690 LNCS. p. 192-207 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital Forensics
Web browsers
Cache
Visualization
Data Classification
17 Citations (Scopus)

Forensic analysis of android phone using Ext4 file system journal log

Kim, D., Park, J., Lee, K. G. & Lee, S., 2012 Oct 9, Lecture Notes in Electrical Engineering. VOL. 1 ed. Vol. 164 LNEE. p. 435-446 12 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault tolerance
Digital forensics
Linux
3 Citations (Scopus)

Methodology for digital forensic investigation of iCloud

Lee, J., Chung, H., Lee, C. & Lee, S., 2012 Sep 13, Lecture Notes in Electrical Engineering. Vol. 180 LNEE. p. 197-206 10 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Industry
Digital forensics

Methodology for digital investigation of illegal sharing using BitTorrent

Park, S., Chung, H., Lee, C. & Lee, S., 2012 Sep 13, Lecture Notes in Electrical Engineering. Vol. 180 LNEE. p. 187-195 9 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis

Silhouette: Volume shadow copy analyzer

Bang, J. & Lee, S., 2012 Oct 9, Lecture Notes in Electrical Engineering. VOL. 1 ed. Vol. 164 LNEE. p. 721-730 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata
Recovery
2011
15 Citations (Scopus)

Advanced evidence collection and analysis of web browser activity

Oh, J., Lee, S. & Lee, S., 2011 Dec 1, DFRWS 2011 Annual Conference.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Internet
Crime
Application programs

Forensic analysis of residual information in adobe PDF files

Chung, H., Park, J. & Lee, S., 2011 Jul 14, Communications in Computer and Information Science. PART 2 ed. Vol. 185 CCIS. p. 100-109 10 p. (Communications in Computer and Information Science; vol. 185 CCIS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Industry
Digital forensics
2 Citations (Scopus)

Forensic investigation method and tool based on the user behaviour analysis

Son, N. & Lee, S., 2011 Dec 1, Proceedings of the 9th Australian Digital Forensics Conference. p. 125-133 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital devices
Smartphones
1 Citation (Scopus)

Recovery techniques for deleted email items in digital forensic context

Jeong, C., Lee, K. G. & Lee, S., 2011 Jul 14, Communications in Computer and Information Science. PART 2 ed. Vol. 185 CCIS. p. 115-122 8 p. (Communications in Computer and Information Science; vol. 185 CCIS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Recovery
Industry
Digital forensics
Communication
7 Citations (Scopus)

Sensitive privacy data acquisition in the iPhone for digital forensic analysis

Jung, J., Jeong, C., Byun, K. & Lee, S., 2011 Jul 14, Communications in Computer and Information Science. Vol. 186 CCIS. p. 172-186 15 p. (Communications in Computer and Information Science; vol. 186 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Data acquisition
Digital forensics
6 Citations (Scopus)

The method of database server detection and investigation in the enterprise environment

Son, N., Lee, K. G., Jeon, S., Chung, H., Lee, S. & Lee, C., 2011 Jul 14, Communications in Computer and Information Science. Vol. 186 CCIS. p. 164-171 8 p. (Communications in Computer and Information Science; vol. 186 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Industry
2010
4 Citations (Scopus)

Forensic artifacts left by virtual disk encryption tools

Lim, S., Park, J., Lim, K. S., Lee, C. & Lee, S., 2010 Oct 28, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563320

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Mountings
Authentication
Experiments
2 Citations (Scopus)

Image enhancement for reducing LCD backlight power based on human visual characteristics

Lee, S., Lee, H. & Sull, S., 2010 Dec 1, Proceedings - 2010 Digital Image Computing: Techniques and Applications, DICTA 2010. p. 132-136 5 p. 5692553

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image enhancement
Liquid crystal displays
Image quality
Light sources
Luminance

Integrated e-mail analysis tool design for digital criminal investigation

Jeong, C., Lee, K. G., Yoo, B. & Lee, S., 2010 Oct 28, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563315

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Electronic mail

Notarization and archive system of web postings for litigation

Kim, A., Kim, Y., Lim, S. & Lee, S., 2010 Oct 28, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563316

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
World Wide Web
Authentication
Computer program listings
Websites
2 Citations (Scopus)

Secure USB bypassing tool

Bang, J., Yoo, B. & Lee, S., 2010 Dec 1, DFRWS 2010 Annual Conference.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Controllers
Flash memory
Industry

Study on a carving method for deleted NTFS compressed files

Yoo, B., Park, J., Bang, J. & Lee, S., 2010 Oct 28, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563317

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital forensics
2009
2 Citations (Scopus)

Analysis of connection information for database server detection

Han, J., Lee, K. G., Choi, J., Lim, K. S. & Lee, S., 2009 Dec 1, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404207

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Industry
4 Citations (Scopus)

Analysis of time information for digital investigation

Bang, J., Yoo, B., Kim, J. & Lee, S., 2009 Dec 1, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1858-1864 7 p. 5331448

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer systems
Digital forensics

Analysis of window Transactional NTFS(TxF) and Transactional Registry(TxR) in the digital forensic perspective

Yoo, B., Bang, J., Lim, K. S. & Lee, S., 2009 Dec 1, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404233

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital forensics
4 Citations (Scopus)

Applying a stepwise forensic approach to incident response and computer usage analysis

Lim, K. S., Lee, S. B. & Lee, S., 2009 Dec 1, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404204

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Identification (control systems)
2 Citations (Scopus)

A stepwise methodology for tracing computer usage

Lee, S., Bang, J., Lim, K., Kim, J. & Lee, S., 2009 Dec 1, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1852-1857 6 p. 5331447

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Imaging techniques
Web browsers
Crime
Metadata
Digital forensics
3 Citations (Scopus)

Database forensic investigation based on table relationship analysis techniques

Lee, D., Choi, J. & Lee, S., 2009 Dec 1, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404235

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blueprints
Industry
Reverse engineering
Logistics
Personnel
1 Citation (Scopus)

Data leak analysis in a corporate environment

Lee, S., Lee, K., Savoldi, A. & Lee, S., 2009 Dec 1, 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. p. 38-43 6 p. 5412531

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hard disk storage
Random access storage
Computer systems
Imaging techniques
Data storage equipment
13 Citations (Scopus)

Detecting similar files based on hash and statistical analysis for digital forensic investigation

Seo, K., Lim, K., Choi, J., Chang, K. & Lee, S., 2009 Dec 1, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404198

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistical methods
Digital forensics
4 Citations (Scopus)

Evidence investigation methodologies for detecting financial fraud based on forensic accounting

Choi, J., Choi, K. & Lee, S., 2009 Dec 1, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404202

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Servers
Transparency
Data acquisition
Computer systems

Model for digital business forensics

Ahn, J. & Lee, S., 2009 Dec 1, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404231

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Law enforcement
Industry
Marketing
Internet
Digital forensics
5 Citations (Scopus)

Online removal of ocular artifacts from single channel EEG for ubiquitous healthcare applications

Shin, H., Kim, H., Lee, S. & Kang, J., 2009 Dec 1, Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009. 5405708

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electroencephalography
Sensors
Data handling
Data acquisition
Signal to noise ratio
8 Citations (Scopus)

Packed PE file detection for malware forensics

Han, S., Lee, K. & Lee, S., 2009 Dec 1, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404211

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Accidents
Viruses
Cryptography
Statistics
5 Citations (Scopus)

Research about extracting and analyzing accounting data of company to detect financial fraud

Kimin, S., Jaemin, C., Yong-seok, C., Dong-chan, L. & Lee, S., 2009 Oct 22, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 200-202 3 p. 5137302

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Enterprise resource planning
2008
5 Citations (Scopus)

A methodology for forensic analysis of embedded systems

Lim, K. S. & Lee, S., 2008 Dec 1, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. Vol. 2. p. 283-286 4 p. 4734223

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Personal digital assistants
Navigation systems
Computer systems
Railroad cars
2 Citations (Scopus)

Data hiding in windows executable files

Shin, D., Kim, Y., Byun, K. & Lee, S., 2008 Dec 1, Proceedings of the 6th Australian Digital Forensics Conference. p. 153-159 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Windows operating system
Crime

Design and implementation of a tool for System Restore Point analysis

Yun, S. M., Savoldi, A., Gubian, P., Kim, Y., Lee, S. & Lee, S., 2008 Oct 22, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 542-546 5 p. 4604116

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Data structures
Computer systems
4 Citations (Scopus)

Design and implementation of a tool to detect accounting frauds

Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J. I., 2008 Oct 22, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Taxation
Transparency

Detection of hidden information in forensic tools

Kim, Y., Bang, J., Lee, S. & Lim, J. I., 2008 Sep 15, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer forensics
Testing
Hidden information
Crime
Law enforcement

Extended OCBP Scheme for MIPv6 over IEEE 802.16e Networks

Park, H. S., Yun, S., Kim, B. H., Lee, D. C., Yi, O. & Lee, S., 2008 Nov 17, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 732-738 7 p. 4622915

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
3 Citations (Scopus)

Extraction of residual information in the microsoft powerpoint file from the viewpoint of digital forensics considering PerCom environment

Park, J., Park, B., Lee, S., Hong, S. & Park, J. H., 2008 Aug 15, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 584-589 6 p. 4517460

Research output: Chapter in Book/Report/Conference proceedingConference contribution

electronics
examiner
Digital forensics
6 Citations (Scopus)

Live forensic analysis of a compromised linux system using LECT (Linux Evidence Collection Tool)

Choi, J., Savoldi, A., Gubian, P., Lee, S. & Lee, S., 2008 Sep 15, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 231-236 6 p. 4511568

Research output: Chapter in Book/Report/Conference proceedingConference contribution

evidence
Computer forensics
business service
Computer operating systems
Linux
3 Citations (Scopus)

Methodologies for detecting covert database

Lee, K. G., Savoldi, A., Gubian, P., Lim, K. S., Lee, S. & Lee, S., 2008 Oct 22, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 538-541 4 p. 4604115

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Computer forensics
Health insurance
Industry
Enterprise resource planning

Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

Lee, C., Kim, J., Hong, S., Lee, S., Sung, J. & Lee, H. M., 2008 Nov 28, Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. p. 199-206 8 p. 4654086

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

The design of framework for detecting an insider's leak of confidential information

Baek, E., Kim, Y., Sung, J. & Lee, S., 2008 Jan 21, e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop. Association for Computing Machinery, Inc, 1363236

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Electronic mail
Profitability
Personnel