Filter
Conference contribution

Search results

  • 2011

    Proactive detection of botnets with intended forceful infections from multiple malware collecting channels

    Moon, Y. H. & Kim, H. K., 2011, Future Information Technology - 6th International Conference, FutureTech 2011, Proceedings. PART 1 ed. p. 29-36 8 p. (Communications in Computer and Information Science; vol. 184 CCIS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Recovery techniques for deleted email items in digital forensic context

    Jeong, C., Lee, K. G. & Lee, S., 2011, Future Information Technology - 6th International Conference, FutureTech 2011, Proceedings. PART 2 ed. p. 115-122 8 p. (Communications in Computer and Information Science; vol. 185 CCIS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Self-similarity based lightweight intrusion detection method for cloud computing

    Kwon, H., Kim, T., Yu, S. J. & Kim, H. K., 2011, Intelligent Information and Database Systems - Third International Conference, ACIIDS 2011, Proceedings. PART 2 ed. p. 353-362 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6592 LNAI, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Citations (Scopus)
  • Sensitive privacy data acquisition in the iPhone for digital forensic analysis

    Jung, J., Jeong, C., Byun, K. & Lee, S., 2011, Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings. p. 172-186 15 p. (Communications in Computer and Information Science; vol. 186 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • System-level simulation of LTE/LTE-A for IMT-Advanced systems

    Noh, J. H. & Oh, S. J., 2011, 2011 IEEE 73rd Vehicular Technology Conference, VTC2011-Spring - Proceedings. 5956445. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Ternary data hiding technique for JPEG steganography

    Sachnev, V. & Kim, H. J., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. p. 202-210 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Ternary data hiding technique for JPEG steganography

    Sachnev, V. & Kim, H. J., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 202-210 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • The method of database server detection and investigation in the enterprise environment

    Son, N., Lee, K. G., Jeon, S., Chung, H., Lee, S. & Lee, C., 2011, Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings. p. 164-171 8 p. (Communications in Computer and Information Science; vol. 186 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • User input pattern-based authentication method to prevent mobile e-financial incidents

    Seo, H. & Kim, H. K., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 382-387 6 p. 5952006. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • What can free money tell us on the virtual black market?

    Woo, K., Kwon, H., Kim, H. C., Kim, C. K. & Kim, H. K., 2011, Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11. p. 392-393 2 p. (Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • 2010

    A fast implementation of arithmetic coding

    Kim, H. J., 2010, Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010. p. 419-423 5 p. 5474097. (Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A fingerprint-based user authentication scheme using smart cards in IPTV environments

    Jun, E. A., Rhee, H. S., Jung, S. W. & Lee, D. H., 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480301. (2010 International Conference on Information Science and Applications, ICISA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A method of measuring the propagation of damage to information communication system

    Yoo, D. Y., Yi, W. S., Lee, G. S. & Choi, J. Y., 2010, 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. p. 192-196 5 p. 5542928. (2nd International Conference on Software Engineering and Data Mining, SEDM 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A new approach to photography forensics using 3D analysis for correcting perception errors: A case study

    Kim, H. J., Lim, S., Kim, B. & Jung, E. S., 2010, SMVC'10 - Proceedings of the 2010 ACM Workshop on Surreal Media and Virtual Cloning, Co-located with ACM Multimedia 2010. p. 27-30 4 p. (SMVC'10 - Proceedings of the 2010 ACM Workshop on Surreal Media and Virtual Cloning, Co-located with ACM Multimedia 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A process algebraic framework for modeling resource demand and supply

    Philippou, A., Lee, I., Sokolsky, O. & Choi, J. Y., 2010, Formal Modeling and Analysis of Timed Systems - 8th International Conference, FORMATS 2010, Proceedings. p. 183-197 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6246 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Cooperative bridges: Topology control in cooperative wireless ad hoc networks

    Yu, J., Roh, H., Lee, W., Pack, S. & Du, D. Z., 2010, 2010 Proceedings IEEE INFOCOM. 5462126. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • Cooperative wireless data access algorithms in multi-radio wireless networks

    Pack, S., Lee, K., Ko, J. & Lee, W., 2010, 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010. 5421773. (2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Delay minimization of tree-based neighbor discovery in mobile robot networks

    Roh, H., Kim, K. & Lee, W., 2010, Wireless Algorithms, Systems, and Applications - 5th International Conference, WASA 2010, Proceedings. p. 167-171 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6221 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Distributed construction of connected dominating sets with minimum routing cost in wireless networks

    Ding, L., Gao, X., Wu, W., Lee, W., Zhu, X. & Du, D. Z., 2010, ICDCS 2010 - 2010 International Conference on Distributed Computing Systems. p. 448-457 10 p. 5541660. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    63 Citations (Scopus)
  • Exploiting spectrum usage patterns for efficient spectrum management in cognitive radio networks

    Lee, C. & Lee, W., 2010, 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010. p. 320-327 8 p. 5474718. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Forensic artifacts left by virtual disk encryption tools

    Lim, S., Park, J., Lim, K. S., Lee, C. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563320. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Image enhancement for reducing LCD backlight power based on human visual characteristics

    Lee, S., Lee, H. & Sull, S., 2010, Proceedings - 2010 Digital Image Computing: Techniques and Applications, DICTA 2010. p. 132-136 5 p. 5692553. (Proceedings - 2010 Digital Image Computing: Techniques and Applications, DICTA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Integrated e-mail analysis tool design for digital criminal investigation

    Jeong, C., Lee, K. G., Yoo, B. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563315. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Minimizing the joining delay for cooperation in mobile robot networks

    Kim, K., Roh, H. & Lee, W., 2010, ICUFN 2010 - 2nd International Conference on Ubiquitous and Future Networks. p. 139-144 6 p. 5547228. (ICUFN 2010 - 2nd International Conference on Ubiquitous and Future Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Mobility-aware call admission control algorithm in vehicular WiFi networks

    Kim, Y., Pack, S. & Lee, W., 2010, 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. Institute of Electrical and Electronics Engineers Inc., 5684127. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Modeling autonomous military robots using hybrid system framework

    Lee, J., Cha, R., Han, Y., Nam, W., Choi, J. Y., Kim, W. T. & Park, S. M., 2010, 2010 International Conference on Information and Communication Technology Convergence, ICTC 2010. p. 429-430 2 p. 5674805. (2010 International Conference on Information and Communication Technology Convergence, ICTC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Notarization and archive system of web postings for litigation

    Kim, A., Kim, Y., Lim, S. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563316. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On session handoff probability in NEMO-based vehicular environments

    Pack, S., Kim, Y., Kim, K. & Lee, W., 2010, 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010. 5421751. (2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • PTAS for minimum connected dominating set with routing cost constraint in wireless sensor networks

    Du, H., Ye, Q., Zhong, J., Wang, Y., Lee, W. & Park, H., 2010, Combinatorial Optimization and Applications - 4th International Conference, COCOA 2010, Proceedings. PART 1 ed. p. 252-259 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6508 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • QoS performance based admission control in cellular networks

    Kim, D. H., Oh, S. J., Zhang, D., Bhushan, N. & Pankaj, R., 2010, 2010 IEEE 71st Vehicular Technology. 5494028. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security analysis of smart card based password authentication schemes

    Kim, H. S., Seo, S. & Choi, J. Y., 2010, Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010. p. 352-356 5 p. 5534807. (Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Study on a carving method for deleted NTFS compressed files

    Yoo, B., Park, J., Bang, J. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563317. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Toward an integrated system between cloud computing and smartcard application

    Park, H. A., Park, J. H., Choi, J. T. & Lee, D. H., 2010, Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010. p. 580-587 8 p. 5711122. (Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2009

    Analysis of connection information for database server detection

    Han, J., Lee, K. G., Choi, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404207. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of time information for digital investigation

    Bang, J., Yoo, B., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1858-1864 7 p. 5331448. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Analysis of window Transactional NTFS(TxF) and Transactional Registry(TxR) in the digital forensic perspective

    Yoo, B., Bang, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404233. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An efficient call delivery algorithm in hierarchical cellular networks

    Pack, S., An, J. & Lee, W., 2009, 2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009. p. 74-78 5 p. 5174288. (2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A new double-block-length hash function using feistel structure

    Lee, J., Hong, S., Sung, J. & Park, H., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 11-20 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A novel approach for JPEG steganography

    Sachnev, V., Kim, H. J., Zhang, R. & Choi, Y. S., 2009, Digital Watermarking - 7th International Workshop, IWDW 2008, Selected Papers. p. 209-217 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5450 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Applying a stepwise forensic approach to incident response and computer usage analysis

    Lim, K. S., Lee, S. B. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404204. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A regression method to compare network data and modeling data using generalized additive model

    Chae, S., Lee, H., Cho, J., Jung, M., Lim, J. & Moon, J., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 190-200 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A spectral technique for image clustering

    Tsomko, E., Kim, H. J., Izquierdo, E. & Ones, V. G., 2009, 2009 International Conference on Ultra Modern Telecommunications and Workshops. 5345343. (2009 International Conference on Ultra Modern Telecommunications and Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A stepwise methodology for tracing computer usage

    Lee, S. B., Bang, J., Lim, K. S., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1852-1857 6 p. 5331447. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Automatic consistency checking of use case scenarios

    Min, H. & Choi, J. Y., 2009, Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009. p. 166-173 8 p. (Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Behavioral learning of exposed terminals in IEEE 802.11 wireless networks

    Jun, C., Jieun, Y., Kyunghwi, K. & Wonjun, L., 2009, 2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009. p. 208-213 6 p. 5174313. (2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Channel occupancy-based user association in IEEE 802.11 wireless LANs

    Jung, B., Lee, W., Pack, S. & Du, D. Z., 2009, 2009 IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, PIMRC 2009. Institute of Electrical and Electronics Engineers Inc., p. 747-751 5 p. 5449783. (IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Cryptanalysis of secure key exchange protocol between STB and Smart card in IPTV broadcasting

    Lee, S. H., Park, N. S., Kim, S. K. & Choi, J. Y., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 797-803 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Database forensic investigation based on table relationship analysis techniques

    Lee, D., Choi, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404235. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Data leak analysis in a corporate environment

    Lee, S., Lee, K., Savoldi, A. & Lee, S., 2009, 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. p. 38-43 6 p. 5412531. (2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detecting similar files based on hash and statistical analysis for digital forensic investigation

    Seo, K., Lim, K., Choi, J., Chang, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404198. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)