Filter
Conference contribution

Search results

  • 2010

    Exploiting spectrum usage patterns for efficient spectrum management in cognitive radio networks

    Lee, C. & Lee, W., 2010, 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010. p. 320-327 8 p. 5474718. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Forensic artifacts left by virtual disk encryption tools

    Lim, S., Park, J., Lim, K. S., Lee, C. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563320. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Image enhancement for reducing LCD backlight power based on human visual characteristics

    Lee, S., Lee, H. & Sull, S., 2010, Proceedings - 2010 Digital Image Computing: Techniques and Applications, DICTA 2010. p. 132-136 5 p. 5692553. (Proceedings - 2010 Digital Image Computing: Techniques and Applications, DICTA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Integrated e-mail analysis tool design for digital criminal investigation

    Jeong, C., Lee, K. G., Yoo, B. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563315. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Minimizing the joining delay for cooperation in mobile robot networks

    Kim, K., Roh, H. & Lee, W., 2010, ICUFN 2010 - 2nd International Conference on Ubiquitous and Future Networks. p. 139-144 6 p. 5547228. (ICUFN 2010 - 2nd International Conference on Ubiquitous and Future Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Mobility-aware call admission control algorithm in vehicular WiFi networks

    Kim, Y., Pack, S. & Lee, W., 2010, 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. Institute of Electrical and Electronics Engineers Inc., 5684127. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Modeling autonomous military robots using hybrid system framework

    Lee, J., Cha, R., Han, Y., Nam, W., Choi, J. Y., Kim, W. T. & Park, S. M., 2010, 2010 International Conference on Information and Communication Technology Convergence, ICTC 2010. p. 429-430 2 p. 5674805. (2010 International Conference on Information and Communication Technology Convergence, ICTC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Notarization and archive system of web postings for litigation

    Kim, A., Kim, Y., Lim, S. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563316. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On session handoff probability in NEMO-based vehicular environments

    Pack, S., Kim, Y., Kim, K. & Lee, W., 2010, 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010. 5421751. (2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • PTAS for minimum connected dominating set with routing cost constraint in wireless sensor networks

    Du, H., Ye, Q., Zhong, J., Wang, Y., Lee, W. & Park, H., 2010, Combinatorial Optimization and Applications - 4th International Conference, COCOA 2010, Proceedings. PART 1 ed. p. 252-259 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6508 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • QoS performance based admission control in cellular networks

    Kim, D. H., Oh, S. J., Zhang, D., Bhushan, N. & Pankaj, R., 2010, 2010 IEEE 71st Vehicular Technology. 5494028. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security analysis of smart card based password authentication schemes

    Kim, H. S., Seo, S. & Choi, J. Y., 2010, Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010. p. 352-356 5 p. 5534807. (Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Study on a carving method for deleted NTFS compressed files

    Yoo, B., Park, J., Bang, J. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563317. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Toward an integrated system between cloud computing and smartcard application

    Park, H. A., Park, J. H., Choi, J. T. & Lee, D. H., 2010, Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010. p. 580-587 8 p. 5711122. (Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2009

    Analysis of connection information for database server detection

    Han, J., Lee, K. G., Choi, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404207. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of time information for digital investigation

    Bang, J., Yoo, B., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1858-1864 7 p. 5331448. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Analysis of window Transactional NTFS(TxF) and Transactional Registry(TxR) in the digital forensic perspective

    Yoo, B., Bang, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404233. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An efficient call delivery algorithm in hierarchical cellular networks

    Pack, S., An, J. & Lee, W., 2009, 2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009. p. 74-78 5 p. 5174288. (2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A new double-block-length hash function using feistel structure

    Lee, J., Hong, S., Sung, J. & Park, H., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 11-20 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A novel approach for JPEG steganography

    Sachnev, V., Kim, H. J., Zhang, R. & Choi, Y. S., 2009, Digital Watermarking - 7th International Workshop, IWDW 2008, Selected Papers. p. 209-217 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5450 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Applying a stepwise forensic approach to incident response and computer usage analysis

    Lim, K. S., Lee, S. B. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404204. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A regression method to compare network data and modeling data using generalized additive model

    Chae, S., Lee, H., Cho, J., Jung, M., Lim, J. & Moon, J., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 190-200 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A spectral technique for image clustering

    Tsomko, E., Kim, H. J., Izquierdo, E. & Ones, V. G., 2009, 2009 International Conference on Ultra Modern Telecommunications and Workshops. 5345343. (2009 International Conference on Ultra Modern Telecommunications and Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A stepwise methodology for tracing computer usage

    Lee, S. B., Bang, J., Lim, K. S., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1852-1857 6 p. 5331447. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Automatic consistency checking of use case scenarios

    Min, H. & Choi, J. Y., 2009, Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009. p. 166-173 8 p. (Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Behavioral learning of exposed terminals in IEEE 802.11 wireless networks

    Jun, C., Jieun, Y., Kyunghwi, K. & Wonjun, L., 2009, 2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009. p. 208-213 6 p. 5174313. (2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Channel occupancy-based user association in IEEE 802.11 wireless LANs

    Jung, B., Lee, W., Pack, S. & Du, D. Z., 2009, 2009 IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, PIMRC 2009. Institute of Electrical and Electronics Engineers Inc., p. 747-751 5 p. 5449783. (IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Cryptanalysis of secure key exchange protocol between STB and Smart card in IPTV broadcasting

    Lee, S. H., Park, N. S., Kim, S. K. & Choi, J. Y., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 797-803 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Database forensic investigation based on table relationship analysis techniques

    Lee, D., Choi, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404235. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Data leak analysis in a corporate environment

    Lee, S., Lee, K., Savoldi, A. & Lee, S., 2009, 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. p. 38-43 6 p. 5412531. (2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detecting similar files based on hash and statistical analysis for digital forensic investigation

    Seo, K., Lim, K., Choi, J., Chang, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404198. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Developing a multi-protocol mobility manager for SIP/SS7 networks

    Park, H. S., Lee, H. W., Park, S. J. & Lee, D. H., 2009, Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009. p. 565-570 6 p. 5066842. (Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Distributed SC-FDMA resource allocation algorithm based on the hungarian method

    Noh, J. H. & Oh, S. J., 2009, Proceedings of the 2009 IEEE 70th Vehicular Technology Conference Fall, VTC 2009 Fall. 5378857. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Dynamic frequency reuse OFDMA downlink scheduling by random access scheme

    Kim, D. H. & Oh, S. J., 2009, Proceedings of the 2009 IEEE 70th Vehicular Technology Conference Fall, VTC 2009 Fall. 5378864. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient sequential architecture for the AES CCM mode in the 802.16e standard

    Ji, J. D., Jung, S. W., Jun, E. A. & Lim, J., 2009, ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems. p. 253-256 4 p. 5364531. (ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Evaluation of quality of protection adding HVM in wireless network

    Lim, S. H., Kim, H. S., Yun, S., Cho, J. W., Yi, O. & Lim, J., 2009, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5302103. (Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Evidence investigation methodologies for detecting financial fraud based on forensic accounting

    Choi, J., Choi, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404202. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Fast BCH syndrome coding for steganography

    Zhang, R., Sachnev, V. & Kim, H. J., 2009, Information Hiding - 11th International Workshop, IH 2009, Revised Selected Papers. p. 48-58 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5806 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Citations (Scopus)
  • FMIPv6 based secure binding update authentication in wireless vehicular networks

    Lee, S. H., Choi, J. Y. & Park, N. S., 2009, 2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009. IEEE Computer Society, 4800584. (2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved remote user authentication scheme using bilinear pairings

    Jun, E. A., Ji, J. D., Lim, J. & Jung, S. W., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 602-605 4 p. (ACM International Conference Proceeding Series; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Improved searchable public key encryption with designated tester

    Rhee, H. S., Park, J. H., Susilo, W. & Lee, D. H., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 376-379 4 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    138 Citations (Scopus)
  • Improving the modified matrix encoding on steganography method

    Choi, Y. S. & Kim, H. J., 2009, 5th International Conference on Information Assurance and Security, IAS 2009. p. 205-208 4 p. 5283888. (5th International Conference on Information Assurance and Security, IAS 2009; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Model for digital business forensics

    Ahn, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404231. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Online removal of ocular artifacts from single channel EEG for ubiquitous healthcare applications

    Shin, H., Kim, H., Lee, S. & Kang, J., 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009. 5405708. (Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Optimal rate and power allocation in uplink packet CDMA transmission

    Kim, B. H. & Oh, S. J., 2009, 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009 - Proceedings. 4917867. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Packed PE file detection for malware forensics

    Han, S., Lee, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404211. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Practical access control protocol for secure sensor networks

    Hwaseong, L., Kilho, S. & Dong, H. L., 2009, 2009 IEEE 13th International Symposium on Consumer Electronics, ISCE 2009. p. 806-809 4 p. 5157056. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Research about extracting and analyzing accounting data of company to detect financial fraud

    Kimin, S., Jaemin, C., Yong-seok, C., Dong-chan, L. & Sangjin, L., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 200-202 3 p. 5137302. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Security authentication for U-health application services

    Ahn, B. H., Hong, J. & Lee, D., 2009, Communication and Networking: International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Pro. Slezak, D., Kim, T., Chang, A. C-C., Vasilakos, T., Li, M. & Sakurai, K. (eds.). p. 17-24 8 p. (Communications in Computer and Information Science; vol. 56).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security enhancing compiler for localization schemes in pervasive sensor networks

    Chun, J. Y., Kim, Y. H., Hwang, J. Y. & Lee, D. H., 2009, Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009. p. 307-312 6 p. 5222880. (Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution