Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2024

Research activity per year

Search results

  • 2010

    Secure USB bypassing tool

    Bang, J., Yoo, B. & Lee, S., 2010, p. S114-S120.

    Research output: Contribution to conferencePaperpeer-review

    2 Citations (Scopus)
  • Secure USB bypassing tool

    Bang, J., Yoo, B. & Lee, S., 2010 Aug, In: Digital Investigation. 7, SUPPL., p. S114-S120

    Research output: Contribution to journalArticlepeer-review

    9 Citations (Scopus)
  • Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device

    Lee, C., Lee, S., Park, J. H., Hussain, S. & Song, J. H., 2010 Aug, In: Telecommunication Systems. 44, 3-4, p. 267-279 13 p.

    Research output: Contribution to journalArticlepeer-review

    6 Citations (Scopus)
  • Study on a carving method for deleted NTFS compressed files

    Yoo, B., Park, J., Bang, J. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563317. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2009

    Analysis of connection information for database server detection

    Han, J., Lee, K. G., Choi, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404207. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of time information for digital investigation

    Bang, J., Yoo, B., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1858-1864 7 p. 5331448. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Analysis of window Transactional NTFS(TxF) and Transactional Registry(TxR) in the digital forensic perspective

    Yoo, B., Bang, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404233. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An efficient signed digit montgomery multiplication for RSA

    Lim, D., Chang, N. S., Ji, S. Y., Kim, C. H., Lee, S. & Park, Y. H., 2009 Jul, In: Journal of Systems Architecture. 55, 7-9, p. 355-362 8 p.

    Research output: Contribution to journalArticlepeer-review

    7 Citations (Scopus)
  • Applying a stepwise forensic approach to incident response and computer usage analysis

    Lim, K. S., Lee, S. B. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404204. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A stepwise methodology for tracing computer usage

    Lee, S. B., Bang, J., Lim, K. S., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1852-1857 6 p. 5331447. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • CFES: Comprehensive framework for forensic analysis of embedded systems

    Lim, K. S., Choi, Y., Kim, J., Lee, C. & Lee, S., 2009, In: Journal of Internet Technology. 10, 5, p. 549-562 14 p.

    Research output: Contribution to journalArticlepeer-review

    4 Citations (Scopus)
  • Database forensic investigation based on table relationship analysis techniques

    Lee, D., Choi, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404235. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Data concealment and detection in Microsoft Office 2007 files

    Park, B., Park, J. & Lee, S., 2009 Mar, In: Digital Investigation. 5, 3-4, p. 104-114 11 p.

    Research output: Contribution to journalArticlepeer-review

    31 Citations (Scopus)
  • Data leak analysis in a corporate environment

    Lee, S., Lee, K., Savoldi, A. & Lee, S., 2009, 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. p. 38-43 6 p. 5412531. (2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detecting similar files based on hash and statistical analysis for digital forensic investigation

    Seo, K., Lim, K., Choi, J., Chang, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404198. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Evidence investigation methodologies for detecting financial fraud based on forensic accounting

    Choi, J., Choi, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404202. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Forensic investigation of Microsoft PowerPoint files

    Park, J. & Lee, S., 2009 Sept, In: Digital Investigation. 6, 1-2, p. 16-24 9 p.

    Research output: Contribution to journalArticlepeer-review

    13 Citations (Scopus)
  • Improved side-channel attack on des with the first four rounds masked

    Kim, J., Hong, S., Han, D. G. & Lee, S., 2009 Oct, In: ETRI Journal. 31, 5, p. 625-627 3 p.

    Research output: Contribution to journalArticlepeer-review

    4 Citations (Scopus)
  • Model for digital business forensics

    Ahn, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404231. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Online removal of ocular artifacts from single channel EEG for ubiquitous healthcare applications

    Shin, H., Kim, H., Lee, S. & Kang, J., 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009. 5405708. (Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Packed PE file detection for malware forensics

    Han, S., Lee, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404211. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Research about extracting and analyzing accounting data of company to detect financial fraud

    Kimin, S., Jaemin, C., Yong-seok, C., Dong-chan, L. & Sangjin, L., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 200-202 3 p. 5137302. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • U-HMS: Hybrid system for secure intelligent multimedia data services in Ubi-Home

    Park, J. H., Lee, S., Lim, J. & Yang, L. T., 2009 Jun, In: Journal of Intelligent Manufacturing. 20, 3, p. 337-346 10 p.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • 2008

    A methodology for forensic analysis of embedded systems

    Lim, K. S. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 283-286 4 p. 4734223. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • A tool for the detection of hidden data in microsoft compound document file format

    Kwon, H., Yeog, K., Sangjin, L. & Jongin, L., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 141-146 6 p. 4438224. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Data hiding in windows executable files

    Shin, D. M., Kim, Y., Byun, K. D. & Lee, S., 2008, Proceedings of the 6th Australian Digital Forensics Conference. p. 153-159 7 p. (Proceedings of the 6th Australian Digital Forensics Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Design and implementation of a tool for System Restore Point analysis

    Yun, S. M., Savoldi, A., Gubian, P., Kim, Y., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 542-546 5 p. 4604116. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of a tool to detect accounting frauds

    Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Detection of hidden information in forensic tools

    Kim, Y., Bang, J., Lee, S. & Lim, J., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extended OCBP Scheme for MIPv6 over IEEE 802.16e Networks

    Park, H. S., Yun, S., Kim, B. H., Lee, D. C., Yi, O. & Lee, S., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 732-738 7 p. 4622915. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extraction of residual information in the microsoft powerpoint file from the viewpoint of digital forensics considering PerCom environment

    Park, J., Park, B., Lee, S., Hong, S. & Park, J. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 584-589 6 p. 4517460. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Live forensic analysis of a compromised linux system using LECT (Linux Evidence Collection Tool)

    Choi, J., Savoldi, A., Gubian, P., Lee, S. & Lee, S., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 231-236 6 p. 4511568. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Methodologies for detecting covert database

    Lee, K. G., Savoldi, A., Gubian, P., Lim, K. S., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 538-541 4 p. 4604115. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Performance enhancement of differential power analysis attacks with signal companding methods

    Ryoo, J. C., Han, D. G., Kim, S. K. & Lee, S., 2008, In: IEEE Signal Processing Letters. 15, p. 625-628 4 p.

    Research output: Contribution to journalArticlepeer-review

    11 Citations (Scopus)
  • Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

    Lee, C., Kim, J., Hong, S., Lee, S., Sung, J. & Lee, H. M., 2008, Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. p. 199-206 8 p. 4654086. (Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security analysis of the full-round DDO-64 block cipher

    Lee, C., Kim, J., Hong, S., Sung, J. & Lee, S., 2008 Dec, In: Journal of Systems and Software. 81, 12, p. 2328-2335 8 p.

    Research output: Contribution to journalArticlepeer-review

    10 Citations (Scopus)
  • Seven new block cipher structures with provable security against differential cryptanalysis

    Kim, J., Lee, C., Sung, J., Hong, S., Lee, S. & Elm, J., 2008 Oct, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 10, p. 3047-3058 12 p.

    Research output: Contribution to journalArticlepeer-review

    8 Citations (Scopus)
  • The design of framework for detecting an insider's leak of confidential information

    Baek, E., Kim, Y., Sung, J. & Lee, S., 2008 Jan 21, e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop. Association for Computing Machinery, Inc, 1363236. (e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • USBPassOn: Secure USB Thumb Drive forensic toolkit

    Lee, K. G., Lee, H. W., Park, C. W., Bang, J. W., Kim, K. Y. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 279-282 4 p. 4734222. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • User authentication mechanism using java card for personalized IPTV services

    Park, Y. K., Lim, S. H., Yi, O., Lee, S. & Kim, S. H., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 618-626 9 p. 4622895. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2007

    A field guide to hidden accounting information detection

    Kim, Y., Bang, J., Lee, G. T., Lee, S. J. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 146-150 5 p. 4426220. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of unified hardware for 128-bit block ciphers ARIA and AES

    Koo, B., Ryu, G., Chang, T. & Lee, S., 2007 Dec, In: ETRI Journal. 29, 6, p. 820-822 3 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    8 Citations (Scopus)
  • Discovering methodology and scenario to detect covert database system

    Lee, G. T., Lee, S., Tsomko, E. & Lee, S., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 4426217. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Generalised category attack-improving histogram-based attack on JPEG LSB embedding

    Lee, K., Westfeld, A. & Lee, S., 2007, Information Hiding - 9th International Workshop, IH 2007, Revised Selected Papers. p. 378-391 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4567 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • Password recovery using an evidence collection tool and countermeasures

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.. p. 97-102 6 p. 4457662. (Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Preimage attack on the parallel FFT-hashing function

    Donghoon, C., Moti, Y., Jaechul, S., Seokhie, H. & Sangjin, L., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 59-67 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Windows pagefile collection and analysis for a live forensics context

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 97-101 5 p. 4426211. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2006

    A DRBAC model based on context for smart and secure services in intelligent ubiquitous home

    Park, J. H., Park, J. S., Lee, S. J. & Koh, B. S., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 893-901 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)