Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2009

    Secure wireless networking

    Perrig, A., Trappe, W., Gligor, V., Poovendran, R. & Lee, H., 2009 Dec, In: Journal of Communications and Networks. 11, 6, p. 533-537 5 p.

    Research output: Contribution to journalEditorialpeer-review

  • 2008

    A connection management protocol for stateful inspection firewalls in multi-homed networks

    Kim, J. H., Lee, H. & Bahk, S., 2008 Dec, In: Journal of Communications and Networks. 10, 4, p. 455-464 10 p.

    Research output: Contribution to journalArticlepeer-review

  • Activity-based security scheme for ubiquitous environments

    Hung, L. X., Hassan, J., Riaz, A. S., Raazi, S. M. K., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y., Fernandes, M., Kim, M. & Zhung, Y., 2008, 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008. p. 475-481 7 p. 4745102. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge

    Hung, L. X., Canh, N. T., Lee, S., Lee, Y. K. & Lee, H., 2008 Dec, In: Sensors. 8, 12, p. 7753-7782 30 p.

    Research output: Contribution to journalArticlepeer-review

    8 Citations (Scopus)
  • Code graph for malware detection

    Kyoochang, J. & Heejo, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472801. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • Detecting more SIP attacks on VoIP services by combining rule matching and state transition models

    Seo, D., Lee, H. & Nuwere, E., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 397-411 15 p. (IFIP International Federation for Information Processing; vol. 278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Distinguishing between FE and DDoS using randomness check

    Park, H., Li, P., Gao, D., Lee, H. & Deng, R. H., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Energy-efficient and fault-tolerant positioning of multiple base stations

    Kim, S., Ko, J., Yoon, J. & Lee, H., 2008, Information Networking: Towards Ubiquitous Networking and Services - International Conference, ICOIN 2007, Revised Selected Papers. Springer Verlag, p. 584-593 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5200 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • HoneyID: Unveiling hidden spywares by generating bogus events

    Han, J., Kwon, J. & Lee, H., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 669-673 5 p. (IFIP International Federation for Information Processing; vol. 278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Network level privacy for wireless sensor networks

    Shaikh, R. A., Jameel, H., d'Auriol, B., Lee, S., Lee, H. & Song, Y. J., 2008, Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008. IEEE Computer Society, p. 261-266 6 p. 4627096. (Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • PROBE: A process behavior-based host intrusion prevention system

    Kwon, M., Jeong, K. & Lee, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 203-217 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Reducing payload scans for attack signature matching using rule classification

    Kim, S. & Lee, H., 2008, Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings. Springer Verlag, p. 350-360 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

    Shaikh, R. A., Jameel, H., D'Auriol, B. J., Lee, S., Song, Y. J. & Lee, H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2038-2043 6 p. 4709287. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Unified rate limiting in broadband access networks for defeating Internet worms and DDoS attacks

    Park, K., Seo, D., Yoo, J., Lee, H. & Kim, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 176-187 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    100+ VoIP Calls on 802.11b: The power of combining voice frame aggregation and uplink-downlink bandwidth control in wireless LANs

    Yun, S., Kim, H., Lee, H. & Kang, I., 2007 May, In: IEEE Journal on Selected Areas in Communications. 25, 4, p. 689-698 10 p.

    Research output: Contribution to journalArticlepeer-review

    22 Citations (Scopus)
  • Activity-based access control model to hospital information

    Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

    Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A location-aware key predistribution scheme for distributed wireless sensor networks

    Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A password stretching method using user specific salts

    Lee, C. & Lee, H., 2007, 16th International World Wide Web Conference, WWW2007. p. 1215-1216 2 p. (16th International World Wide Web Conference, WWW2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A privacy preserving access control scheme using anonymous identification for ubiquitous environments

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H. J., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 482-487 6 p. 4296887. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A taxonomy of online game security

    Park, K. & Lee, H., 2007, Encyclopedia of Internet Technologies and Applications. IGI Global, p. 606-611 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • A trust-based approach to control privacy exposure in Ubiquitous Computing environments

    Giang, P. D., Hung, L. X., Shaikh, R. A., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, 2007 IEEE International Conference on Pervasive Services, ICPS. p. 149-152 4 p. 4283905. (2007 IEEE International Conference on Pervasive Services, ICPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • BASE: An incrementally deployable mechanism for viable IP spoofing prevention

    Lee, H., Kwon, M., Hasker, G. & Perrig, A., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 20-31 12 p. (Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • Bayesian memory-based reputation system

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2007 Aug 27, MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications. Association for Computing Machinery, 1385300. (MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Boosting VoIP capacity of wireless mesh networks through lazy frame aggregation

    Kim, H., Yun, S. & Lee, H., 2007 May, In: IEICE Transactions on Communications. E90-B, 5, p. 1283-1285 3 p.

    Research output: Contribution to journalArticlepeer-review

    4 Citations (Scopus)
  • Botnet detection by monitoring group activities in DNS traffic

    Choi, H., Lee, H., Lee, H. & Kim, H., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 715-720 6 p. 4385169. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    206 Citations (Scopus)
  • Contextual risk-based access control

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings of The 2007 International Conference on Security and Management, SAM'07. p. 406-412 7 p. (Proceedings of The 2007 International Conference on Security and Management, SAM'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Cyber threat trend analysis model using HMM

    Kim, D. H., Lee, T., Jung, S. O. D., In, H. P. & Lee, H. J., 2007, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security. p. 177-182 6 p. 4299771. (Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Detecting Unknown Worms Using Randomness Check

    Park, H., Lee, H. & Kim, H., 2007 Apr, In: IEICE Transactions on Communications. E90-B, 4, p. 894-903 10 p.

    Research output: Contribution to journalArticlepeer-review

    5 Citations (Scopus)
  • Energy-aware QoS adjustment of multimedia tasks with uncertain execution time

    Lee, W. Y., Lee, H. & Kim, H., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 4 ed. Springer Verlag, p. 709-712 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4490 LNCS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Enforcing access control using risk assessment

    Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks. p. 419-424 6 p. 4115226. (Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Citations (Scopus)
  • Error bound of collision probability estimation in non-saturated IEEE 802.11 WLANs

    Kim, H., Yoon, J. & Lee, H., 2007 Jul, In: IEICE Transactions on Communications. E90-B, 7, p. 1884-1885 2 p.

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)
  • Evaluation of authentication interworking methods among multiple WLAN service providers

    Lee, W. Y. & Lee, H., 2007 May, In: International Journal of Communication Systems. 20, 5, p. 515-531 17 p.

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)
  • Human identification through image evaluation using secret predicates

    Jameel, H., Shaikh, R. A., Lee, H. & Lee, S., 2007, Topics in Cryptology: CT-RSA 2007 - The Cryptographers Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Springer Verlag, p. 67-84 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4377 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Multiple-objective metric for placing multiple base stations in wireless sensor networks

    Kim, S., Ko, J. G., Yoon, J. & Lee, H., 2007, 2007 2nd International Symposium on Wireless Pervasive Computing. p. 627-631 5 p. 4147138. (2007 2nd International Symposium on Wireless Pervasive Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Citations (Scopus)
  • On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

    Kim, H., Lee, H. & Shin, S., 2007 Feb, In: IEICE Transactions on Communications. E90-B, 2, p. 412-416 5 p.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • SRMT: A lightweight encryption scheme for secure real-time multimedia transmission

    Choo, E., Lee, J., Lee, H. & Nam, G., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. IEEE Computer Society, p. 60-65 6 p. 4197250. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • Transmission time-based mechanism to detect wormhole attacks

    Van Phuong, T., Canh, N. T., Lee, Y. K., Lee, S. & Lee, H., 2007, Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007. p. 172-178 7 p. 4414457. (Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)
  • TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks

    Van Tran, P., Hung, L. X., Lee, Y. K., Lee, S. & Lee, H., 2007, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007. p. 593-598 6 p. 4199210. (2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    47 Citations (Scopus)
  • Using reputation system in ubiquitous healthcare

    Weiwei, Y., Donghai, G., Sungyoung, L. & Heejo, L., 2007, HEALTHCOM 2007: Ubiquitous Health in Aging Societies - 2007 9th International Conference on e-Health Networking, Application and Services. p. 182-186 5 p. 4265820. (HEALTHCOM 2007: Ubiquitous Health in Aging Societies - 2007 9th International Conference on e-Health Networking, Application and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • 2006

    A simple congestion-resilient link adaptation algorithm for IEEE 802.11 WLANs

    Kim, H., Yun, S., Lee, H., Kang, I. & Choi, K. Y., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151441. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Cascade damage estimation model for internet attacks

    Lee, T., In, H. P., Im, E. G. & Lee, H., 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. Springer Verlag, p. 163-164 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Detecting unknown worms using randomness check

    Park, H. & Lee, H., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 775-784 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Energy-efficient scheduling for multiprocessors

    Lee, W. Y. & Lee, H., 2006, In: Electronics Letters. 42, 21, p. 1200-1201 2 p.

    Research output: Contribution to journalArticlepeer-review

    9 Citations (Scopus)
  • Filtering out unfair recommendations for trust model in ubiquitous environments

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2006, Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Bagchi, A. & Atluri, V. (eds.). Springer Verlag, p. 357-360 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Improving resiliency of network topology with enhanced evolving strategies

    Kim, S., Lee, H. & Lee, W. Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 149 1 p. 4019940. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Improving VoIP call capacity of multi-hop wireless networks through self-controlled frame aggregation

    Yun, S., Kim, H., Lee, H. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2181-2185 5 p. 4109716. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • One touch logon: Replacing multiple passwords with single fingerprint recognition

    Park, B., Hong, S., Oh, J., Lee, H. & Won, Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 163 1 p. 4019947. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

    Kim, H., Lee, H., Shin, S. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2241-2246 6 p. 4109728. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Optimal scheduling for real-time parallel tasks

    Lee, W. Y. & Lee, H., 2006 Jun, In: IEICE Transactions on Information and Systems. E89-D, 6, p. 1962-1966 5 p.

    Research output: Contribution to journalArticlepeer-review

    22 Citations (Scopus)