Calculated based on number of publications stored in Pure and citations from Scopus
20122024

Research activity per year

Network

Mookyu Park

  • Korea University
  • Institute of Cyber Security and Privacy (ICSP)
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University

External person

Jemin Justin Lee

  • Korea University

External person

Junhyoung Oh

  • Institute of Cyber Security and Privacy (ICSP)
  • Korea University

External person

Junwoo Seo

  • Korea University
  • Department of Cyber Defense
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

YoungIn You

  • Graduate School of Information Management and Security, Korea University
  • Graduate School for Information Security (GSIS)
  • Korea University
  • Institute of Cyber Security and Privacy (ICSP)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

Kyoungmin Kim

  • Korea University
  • Department of Cyber Defense
  • R. O. K.

External person

Haengrok Oh

  • Korean Agency for Defense Development

External person

Moosung Park

  • Korean Agency for Defense Development

External person

Yu Kyung Kim

  • Korea University

External person

Minhee Joo

  • Korea University
  • Institute of Cyber Security and Privacy (ICSP)

External person

Myong Hyun Go

  • Korea University
  • The Asan Institute for Policy Studies

External person

Semi Park

  • Korea University

External person

Moohong Min

  • Addiction Treatment Center for Korea Racing Association
  • Korea University
  • Sungkyunkwan University

External person

Youngsup Shin

  • Korean Agency for Defense Development
  • Korea University
  • R. O. K.

External person

Jaehyeok Han

  • Institute of Cyber Security and Privacy (ICSP)
  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Sangkyo Oh

  • Center for Information Security Technologies, Korea University
  • Center for Information Security Technologies (CIST), Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Misun Song

  • Center for Information Security Technologies, Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hyun Sik Yoon

  • Korea University Anam Campus
  • Korea University

External person

Jang Ho Yun

  • Korea University
  • Central Technology Research Institute

External person

Dahee Choi

  • Korea University
  • Graduate School of Information Security, Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University

External person

Aram Kim

  • Korea Institute of Nuclear Non-proliferation and Control
  • Korea Institue of Nuclear Nonproliferation and Control

External person

Juhyeon Lee

  • Korea University
  • Institute of Cyber Security and Privacy (ICSP)

External person

Inhyun Cho

  • Korea University
  • Korea University Anam Campus

External person

Hyunbeom Park

  • A3security
  • Consulting Biz Division

External person

Won Park

  • Institute of Cyber Security and Privacy (ICSP)
  • Korea University

External person

Chulwon Lee

  • KB Financial Group Inc.
  • Korea University

External person

Dongkyun Seo

  • Graduate School of Information Management and Security, Korea University
  • Graduate School for Information Security (GSIS)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Jun Seob Yoon

  • Korea University
  • Risk management Laboratory
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

JunSeok Seo

  • Center for Information Security Technologies, Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hojin Lee

  • Creative Research Initiatives
  • Korea University
  • Division of Life Sciences, School of Life Sciences, Korea University
  • Division of Life Sciences, Korea University
  • Division of Life Sciences, College of Life Science, Korea University

External person

Hae Young Kang

  • Korea University

External person

N. V. Son

  • Korea University
  • Ctr. for Info. Security Technologies
  • Dept. of Civil, Environmental and Architectural Engineering
  • Center for Information Security, Korea University
  • Department of Civil, Environmental and Architectural Engineering, Korea University

External person

Jinho Ryu

  • Korea Institute of Nuclear Non-proliferation and Control
  • Korea Institue of Nuclear Nonproliferation and Control

External person

Yong Ju Lee

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Sanghyun Park

  • Center for Information Security Technologies, Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hwankuk Kim

  • Korea Information Security Agency

External person

Hyunji Chung

  • Center for Information Security Technologies, Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • National Institute of Standards and Technology

External person

Ukjin Lee

  • Department of Psychology, Korea University
  • Korea University

External person

Changhoon Lee

  • Seoul National University of Science and Technology(SeoulTech)
  • Seoul National University of Science and Technology
  • Department of Computer Science and Engineering, Seoul National University of Science and Technology
  • Hanshin University
  • Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech)
  • University of Science and Technology UST
  • Seoul National University of Science and Technology (SNUST)
  • Seoul National University of Science and Technology(SeoulTech)
  • School of Computer Engineering
  • Hanshin University
  • Korea University
  • University of La Laguna

External person

Jeongeun Seo

  • Korea University

External person

Chang Yeon Kim

  • Institute of Cyber Security and Privacy (ICSP)
  • Korea University

External person

Hyochang Baek

  • Institute of Cyber Security and Privacy (ICSP)
  • Korea University

External person

Chaeeun Lee

  • Korea University

External person

Kookheui Kwon

  • Korea Institute of Nuclear Non-proliferation and Control
  • Korea Institue of Nuclear Nonproliferation and Control

External person

Min Yang Cho

  • Dong-Seoul College
  • Korea University

External person

Ilyoung Hong

  • Supreme Prosecutors' Office
  • Ctr. for Info. Security Technologies
  • Korea University
  • Center for Information Security, Korea University
  • Supreme Prosecutors' Office

External person

Jaehee Lee

  • Korea University

External person

Jewan Bang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University
  • Korean National Police Agency

External person

Eun Young Choi

  • Korea University
  • Korea Security and Internet Agency
  • Korea Information Security Agency
  • Kumho Life and Environmental Science Laboratory

External person

Woong Go

  • Korea Security and Internet Agency

External person

Joshua I. James

  • University College Dublin
  • UCD Digital Forensic Investigation Research Group (DigitalFIRE)

External person

Kitae Jeong

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

ChoYee Y. Nam

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jaechul Sung

  • University of Seoul
  • Department of MathematicsUniversity of Seoul
  • Korea Information Security Agency
  • Center for Information Security Technologies (CIST)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Cryptographic Technology Team
  • Center for Information Security, Korea University

External person

Joong Sun Oh

  • Korea Electric Power

External person

Eunnarae Ko

  • Korea University

External person

Kyoung Mun Lee

  • Ltd
  • Korea University

External person

Junghoon Oh

  • Korea University
  • A-FIRST AhnLab
  • Digital Forensics Research Center (DFRC)
  • Electronics and Telecommunications Research Institute

External person

Yunho Lee

  • Ctr. for Info. Security Technologies
  • Korea University
  • Center for Information Security, Korea University

External person

Kwan Tae Cho

  • Electronics and Telecommunications Research Institute
  • Graduate School of Information Security, Korea University
  • Cyber Security Research Division at Electronics and Telecommunications Research Institute
  • Graduate School of Information and Security
  • Korea University
  • Cyber Security Research Department, Attached Institute of ETRI
  • Ctr. for Info. Security Technologies
  • ICT Convergence Security Research Laboratory
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Seok Yeong Kim

  • Korean Medical Association
  • MERS Policy Communittee of the Korean Medical Association
  • Research Institute for Healthcare Policy
  • Korean Medical Association

External person

Dohyun Kim

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Electronics and Telecommunications Research Institute

External person

Sungmoon Kwon

  • Ajou University

External person

Jung Gu Kim

  • Dong-Seoul College

External person

Ji Won Park

  • Korea University

External person

Nack Hwan Kim

  • Korea University
  • Gunsan Medical Center
  • Department of Physical Medicine & Rehabilitation
  • Departments of Physical Medicine and Rehabilitation
  • Graduate School of Medicine, Korea University
  • Departments of Physical Medicine and Rehabilitation
  • Department of Physical Medicine and Rehabilitation
  • Department of Chemical and Biological Engineering, College of Engineering, Korea University
  • Biomedical Research Center, Korea University Guro Hospital
  • Biomedial Research Center
  • Department of Medical Science
  • Laboratory of Infection and Immunology, Graduate School of Medicine, Korea University
  • Dept. of Chemical and Biological Engineering, Korea University

External person

Cheol Ho Choi

  • Korea University

External person

Jiwon Chung

  • Korea University

External person

Riha Kim

  • Korea University

External person

Jin Suk Kim

  • Korean Medical Association
  • Research Institute for Healthcare Policy
  • Korean Medical Association

External person

Jemin Lee

  • Korea University

External person

Ji Woong Jang

  • Korea University

External person

Young Do Kim

  • Korea University
  • Korea Institute for Defense Analyses

External person

Kwansik Moon

  • The National Assembly of the Republic of Korea
  • Korea University

External person

Changwan Lim

  • Korean Agency for Defense Development

External person

Jinhyeok Jeon

  • Sungkyunkwan University
  • Department of Information Security

External person

Changsoo Lee

  • Korea Investment

External person

Suhyeon Lee

  • Korean Agency for Defense Development
  • Center for Information Security, Korea University
  • Korea University
  • Cyber Operations Command
  • Ministry of Defense

External person

Hyeon Yu

  • Korea Police Investigation Academy
  • Ctr. for Info. Security Technologies
  • Korea University
  • Center for Information Security, Korea University

External person

Jung Taek Seo

  • Electronics and Telecommunications Research Institute
  • Soonchunhyang University
  • National Security Research Institute, Korea

External person

Insung Han

  • Korean Agency for Defense Development

External person

Junbeom Lee

  • Suwon University
  • Department of Information and Telecommunications Engineering

External person

Jinkeon Kang

  • Korea University
  • Indraprastha Institute of Information Technology Delhi
  • Ctr. for Info. Security Technologies
  • Center for Cell Dynamics
  • Center for Information Security, Korea University
  • Laser Physics Laboratory
  • National Institute of Standards and Technology

External person

Tae Ho Kim

  • Korea University

External person

Jin Sung Kim

  • Korea University
  • Korea Institute for Defense Analyses

External person

So Hyeon Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Myongwon Jang

  • Korea University

External person

Min Sik Kim

  • Petabi Inc.

External person

Hee Joo Lee

  • Korea University

External person

Jae Hyeon Woo

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Sungyoung Cho

  • Korean Agency for Defense Development

External person

Sung Jin Kim

  • Ajou University

External person

Byung Gil Lee

  • Cyber Security Research Division at Electronics and Telecommunications Research Institute
  • Electronics and Telecommunications Research Institute
  • ICT Convergence Security Research Laboratory

External person

Jinhyoung Hong

  • Korea University

External person

Junghwan Lee

  • Kwangwoon University
  • Dept. of Comp. Sci.
  • Department of Computer Science, Kwangwoon University

External person

Taejin Lee

  • Korea Security and Internet Agency
  • Korea Information Security Agency

External person

Habin Yim

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Sooyoung Park

  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hyun Kyoo Park

  • Petabi Corp.

External person

Hee Joo Lee

  • Korea University
  • Korea University Anam Campus
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Changyeob Lee

  • Sogang University
  • Department of Computer Science and Engineering, Sogang University

External person

Jaebin Cho

  • Kyonggi University
  • Deparment of Convergence Secuirty

External person

Choi Nam

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Ho Myung Kim

  • Korea University

External person

Simon S. Woo

  • Sungkyunkwan University
  • Stony Brook University

External person

Sooheon Kim

  • Data Marketing Korea Research Lab Teheran Rd

External person

Janghyuk Kauh

  • Korean Agency for Defense Development

External person

S. Lee

  • Department of Electrical Engineering
  • Korea University
  • Myongji College

External person