Heejo Lee
Heejo Lee
Professor of Computer Science, Korea University
Dirección de correo verificada de korea.ac.kr - Página principal
Título
Citado por
Citado por
Año
Cyber–Physical Security of a Smart Grid Infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE, 1-15, 2012
10192012
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
K Park, H Lee
ACM SIGCOMM computer communication review 31 (4), 15-26, 2001
8932001
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
K Park, H Lee
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
6152001
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
3822008
Botnet detection by monitoring group activities in DNS traffic
H Choi, H Lee, H Lee, H Kim
7th IEEE International Conference on Computer and Information Technology …, 2007
3662007
Detection and categorization of malicious URLs
BB Zhu, H Choi, H Lee
US Patent 8,521,667, 2013
1702013
Detecting Malicious Web Links and Identifying Their Attack Types.
H Choi, BB Zhu, H Lee
WebApps 11 (11), 218, 2011
1472011
BotGAD: detecting botnets by capturing group activities in network traffic
H Choi, H Lee, H Kim
Proceedings of the Fourth International ICST Conference on COMmunication …, 2009
1442009
Identifying botnets by capturing group activities in DNS traffic
H Choi, H Lee
Computer Networks 56 (1), 20-33, 2012
1422012
Detecting metamorphic malwares using code graphs
J Lee, K Jeong, H Lee
Proceedings of the 2010 ACM symposium on applied computing, 1970-1977, 2010
1402010
Vuddy: A scalable approach for vulnerable code clone discovery
S Kim, S Woo, H Lee, H Oh
2017 IEEE Symposium on Security and Privacy (SP), 595-614, 2017
1162017
Fast detection and visualization of network attacks on parallel coordinates
H Choi, H Lee, H Kim
computers & security 28 (5), 276-288, 2009
1082009
Ttm: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks
P Van Tran, LX Hung, YK Lee, S Lee, H Lee
2007 4th IEEE Consumer Communications and Networking Conference, 593-598, 2007
982007
Method of sharing state between stateful inspection firewalls on mep network
J Kim, S Bahk, H Lee
US Patent App. 10/709,255, 2005
892005
PsyBoG: A scalable botnet detection method for large-scale DNS traffic
J Kwon, J Lee, H Lee, A Perrig
Computer Networks 97, 48-73, 2016
822016
Enforcing access control using risk assessment
NN Diep, LX Hung, Y Zhung, S Lee, YK Lee, H Lee
Fourth European Conference on Universal Multiservice Networks (ECUMN'07 …, 2007
812007
Apparatus and method for monitoring network using the parallel coordinate system
H Choi, H Lee
US Patent App. 11/324,698, 2007
792007
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
66*2010
Transmission time-based mechanism to detect wormhole attacks
T Van Phuong, NT Canh, YK Lee, S Lee, H Lee
The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007), 172-178, 2007
642007
Generic unpacking using entropy analysis
G Jeong, E Choo, J Lee, M Bat-Erdene, H Lee
2010 5th International Conference on Malicious and Unwanted Software, 98-105, 2010
602010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20