dblp.uni-trier.dewww.uni-trier.de

Heejo Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
51EESunghyun Kim, Heejo Lee: Reducing Payload Scans for Attack Signature Matching Using Rule Classification. ACISP 2008: 350-360
50EERiaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee: Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. ICYCS 2008: 2038-2043
49EEHyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng: Distinguishing between FE and DDoS Using Randomness Check. ISC 2008: 131-145
48EEKeun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim: Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. ISPEC 2008: 176-187
47EEMinjin Kwon, Kyoochang Jeong, Heejo Lee: PROBE: A Process Behavior-Based Host Intrusion Prevention System. ISPEC 2008: 203-217
46EEDongwon Seo, Heejo Lee, Ejovi Nuwere: Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models. SEC 2008: 397-411
45EEJeheon Han, Jonghoon Kwon, Heejo Lee: HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. SEC 2008: 669-673
44EEHassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq-ur-rehman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes: Image-Feature Based Human Identification Protocols on Limited Display Devices. WISA 2008: 211-224
2007
43EEHeejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig: BASE: an incrementally deployable mechanism for viable IP spoofing prevention. ASIACCS 2007: 20-31
42EEHyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim: Botnet Detection by Monitoring Group Activities in DNS Traffic. CIT 2007: 715-720
41EEHassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee: Human Identification Through Image Evaluation Using Secret Predicates. CT-RSA 2007: 67-84
40EENguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Enforcing Access Control Using Risk Assessment. ECUMN 2007: 419-424
39EEDo-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee: Cyber Threat Trend Analysis Model Using HMM. IAS 2007: 177-182
38EESoo Kim, Jeong-Gil Ko, Jongwon Yoon, Heejo Lee: Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations. ICOIN 2007: 584-593
37EEWan Yeon Lee, Heejo Lee, Hyogon Kim: Energy-Aware QoS Adjustment of Multimedia Tasks with Uncertain Execution Time. International Conference on Computational Science (4) 2007: 709-712
36EEEuijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam: SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission. MUE 2007: 60-65
35EEPho Duc Giang, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee: A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems. MUE 2007: 698-703
34EEWeiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Bayesian memory-based reputation system. MobiMedia 2007: 9
33EENguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee: A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments. RTCSA 2007: 482-487
32EELe Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Activity-based Access Control Model to Hospital Information. RTCSA 2007: 488-496
31 Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Contextual Risk-Based Access Control. Security and Management 2007: 406-412
30EEChangHee Lee, Heejo Lee: A password stretching method using user specific salts. WWW 2007: 1215-1216
29EEHassan Jameel, Heejo Lee, Sungyoung Lee: Using Image Attributes for Human Identification Protocols CoRR abs/0704.2295: (2007)
28EESangki Yun, Hyogon Kim, Heejo Lee, Inhye Kang: 100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs. IEEE Journal on Selected Areas in Communications 25(4): 689-698 (2007)
27EEHyogon Kim, Heejo Lee, Sangmin Shin: On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. IEICE Transactions 90-B(2): 412-416 (2007)
26EEHyundo Park, Heejo Lee, Hyogon Kim: Detecting Unknown Worms Using Randomness Check. IEICE Transactions 90-B(4): 894-903 (2007)
25EEHyogon Kim, Sangki Yun, Heejo Lee: Boosting VoIP Capacity of Wireless Mesh Networks through Lazy Frame Aggregation. IEICE Transactions 90-B(5): 1283-1285 (2007)
24EEHyogon Kim, Jongwon Yoon, Heejo Lee: Error Bound of Collision Probability Estimation in Non-saturated IEEE 802.11 WLANs. IEICE Transactions 90-B(7): 1884-1885 (2007)
23EEWan Yeon Lee, Heejo Lee: Evaluation of authentication interworking methods among multiple WLAN service providers. Int. J. Communication Systems 20(5): 515-531 (2007)
2006
22EESoo Kim, Heejo Lee, Wan Yeon Lee: Improving Resiliency of Network Topology with Enhanced Evolving Strategies. CIT 2006: 149
21EEBeomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee, Yoojae Won: One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition. CIT 2006: 163
20EEHyogon Kim, Sangki Yun, Heejo Lee, Inhye Kang, Kyu-Young Choi: A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs. GLOBECOM 2006
19EEWeiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. ICISS 2006: 357-360
18EEHyundo Park, Heejo Lee: Detecting Unknown Worms Using Randomness Check. ICOIN 2006: 775-784
17EESangki Yun, Hyogon Kim, Heejo Lee, Inhye Kang: Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation. VTC Fall 2006: 1-5
16EEHyogon Kim, Heejo Lee, Sangmin Shin, Inhye Kang: On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. VTC Fall 2006: 1-6
15EETaek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee: Cascade Damage Estimation Model for Internet Attacks. WISI 2006: 163-164
14EEHeejo Lee, Jong Kim, Wan Yeon Lee: Resiliency of Network Topologies under Path-Based Attacks. IEICE Transactions 89-B(10): 2878-2884 (2006)
13EEWan Yeon Lee, Heejo Lee: Optimal Scheduling for Real-Time Parallel Tasks. IEICE Transactions 89-D(6): 1962-1966 (2006)
2005
12EEHyunsang Choi, Heejo Lee: PCAV: Internet Attack Visualization on Parallel Coordinates. ICICS 2005: 454-466
11EEO-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim, Sang Cheon Kim, Gun Woo Nam, Joong Gil Park: HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities. ICOIN 2005: 652-661
10EEBeomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee: Defending a Web Browser Against Spying with Browser Helper Objects. ISI 2005: 638-639
2004
9EEHeejo Lee, Jong Kim: Attack Resiliency of Network Topologies. PDCAT 2004: 638-641
2003
8EEHeejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee: Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems. IEEE Trans. Parallel Distrib. Syst. 14(4): 394-407 (2003)
7EEHeejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee: Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization. Parallel Computing 29(1): 135-159 (2003)
2001
6EEHeejo Lee, Kihong Park: On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack. INFOCOM 2001: 338-347
5EEKihong Park, Heejo Lee: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. SIGCOMM 2001: 15-26
2000
4 Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee: Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization. SAC (2) 2000: 641-648
1997
3 Jong Kim, Heejo Lee, Sunggu Lee: Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. IEEE Trans. Computers 46(4): 499-505 (1997)
1995
2 Jong Kim, Heejo Lee, Sunggu Lee: Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. FTCS 1995: 174-183
1EEHeejo Lee, Kenji Toda, Jong Kim, Kenji Nishida, Eiichi Takahashi, Yoshinori Yamaguchi: Performance comparison of real-time architectures using simulation. RTCSA 1995: 150-

Coauthor Index

1Ngo Trong Canh [44]
2Hyunsang Choi [12] [42]
3Kyu-Young Choi [20]
4Euijin Choo [36]
5Robert H. Deng (Robert Huijie Deng) [49]
6Nguyen Ngoc Diep [31] [33] [40]
7Miguel Fernandes [44]
8Debin Gao [49]
9Pho Duc Giang [35]
10Donghai Guan [19] [34]
11Jeheon Han [45]
12Geoffrey Hasker [43]
13Sung Je Hong [4] [7] [8]
14Sungjin Hong [10] [21]
15Le Xuan Hung [32] [35] [40] [44]
16Eul-Gyu Im [15]
17Hoh Peter In (Hoh In) [15] [39]
18Hassan Jameel [29] [41] [44] [50]
19Kyoochang Jeong [47]
20Sung-Oh David Jung [39]
21Inhye Kang [16] [17] [20] [28]
22Do-Hoon Kim [39]
23Hyogon Kim [16] [17] [20] [24] [25] [26] [27] [28] [37] [42] [48]
24Jong Kim [1] [2] [3] [4] [7] [8] [9] [11] [14]
25Sang Cheon Kim [11]
26Soo Kim [22] [38]
27Sunghyun Kim [51]
28Jeong-Gil Ko [38]
29Jonghoon Kwon [45]
30Minjin Kwon [43] [47]
31O-Hoon Kwon [11]
32ChangHee Lee [30]
33Hanwoo Lee [42]
34Jehyun Lee [36]
35Seung-Min Lee [11]
36Sunggu Lee [2] [3] [4] [7] [8]
37Sungyoung Lee [19] [29] [31] [32] [33] [34] [35] [40] [41] [44] [50]
38Taek Lee [15] [39]
39Wan Yeon Lee [13] [14] [22] [23] [37]
40Young-Koo Lee [19] [31] [32] [33] [34] [35] [40]
41Peng Li [49]
42Giwon Nam [36]
43Gun Woo Nam [11]
44Kenji Nishida [1]
45Ejovi Nuwere [46]
46Jaewook Oh [10] [21]
47Beomsoo Park [10] [21]
48Hyundo Park [18] [26] [49]
49Joong Gil Park [11]
50Keun Park [48]
51Kihong Park [5] [6]
52Adrian Perrig [43]
53Syed Muhammad Khaliq-ur-rehman Raazi [44]
54Dongwon Seo [46] [48]
55Riaz Ahmed Shaikh [41] [44] [50]
56Sangmin Shin [16] [27]
57Yuseung Son [44]
58Young Jae Song [50]
59Eiichi Takahashi [1]
60Kenji Toda [1]
61Yuan Wei Wei [44]
62Yoojae Won [21]
63Yoshinori Yamaguchi [1]
64Jaewon Yoo [48]
65Jongwon Yoon [24] [38]
66Weiwei Yuan [19] [34]
67Sangki Yun [17] [20] [25] [28]
68Yonil Zhung [40]
69Brian J. d'Auriol [50]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)