2008 | ||
---|---|---|
51 | EE | Sunghyun Kim, Heejo Lee: Reducing Payload Scans for Attack Signature Matching Using Rule Classification. ACISP 2008: 350-360 |
50 | EE | Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee: Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. ICYCS 2008: 2038-2043 |
49 | EE | Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng: Distinguishing between FE and DDoS Using Randomness Check. ISC 2008: 131-145 |
48 | EE | Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim: Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. ISPEC 2008: 176-187 |
47 | EE | Minjin Kwon, Kyoochang Jeong, Heejo Lee: PROBE: A Process Behavior-Based Host Intrusion Prevention System. ISPEC 2008: 203-217 |
46 | EE | Dongwon Seo, Heejo Lee, Ejovi Nuwere: Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models. SEC 2008: 397-411 |
45 | EE | Jeheon Han, Jonghoon Kwon, Heejo Lee: HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. SEC 2008: 669-673 |
44 | EE | Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq-ur-rehman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes: Image-Feature Based Human Identification Protocols on Limited Display Devices. WISA 2008: 211-224 |
2007 | ||
43 | EE | Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig: BASE: an incrementally deployable mechanism for viable IP spoofing prevention. ASIACCS 2007: 20-31 |
42 | EE | Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim: Botnet Detection by Monitoring Group Activities in DNS Traffic. CIT 2007: 715-720 |
41 | EE | Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee: Human Identification Through Image Evaluation Using Secret Predicates. CT-RSA 2007: 67-84 |
40 | EE | Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Enforcing Access Control Using Risk Assessment. ECUMN 2007: 419-424 |
39 | EE | Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee: Cyber Threat Trend Analysis Model Using HMM. IAS 2007: 177-182 |
38 | EE | Soo Kim, Jeong-Gil Ko, Jongwon Yoon, Heejo Lee: Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations. ICOIN 2007: 584-593 |
37 | EE | Wan Yeon Lee, Heejo Lee, Hyogon Kim: Energy-Aware QoS Adjustment of Multimedia Tasks with Uncertain Execution Time. International Conference on Computational Science (4) 2007: 709-712 |
36 | EE | Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam: SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission. MUE 2007: 60-65 |
35 | EE | Pho Duc Giang, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee: A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems. MUE 2007: 698-703 |
34 | EE | Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Bayesian memory-based reputation system. MobiMedia 2007: 9 |
33 | EE | Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee: A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments. RTCSA 2007: 482-487 |
32 | EE | Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Activity-based Access Control Model to Hospital Information. RTCSA 2007: 488-496 |
31 | Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Contextual Risk-Based Access Control. Security and Management 2007: 406-412 | |
30 | EE | ChangHee Lee, Heejo Lee: A password stretching method using user specific salts. WWW 2007: 1215-1216 |
29 | EE | Hassan Jameel, Heejo Lee, Sungyoung Lee: Using Image Attributes for Human Identification Protocols CoRR abs/0704.2295: (2007) |
28 | EE | Sangki Yun, Hyogon Kim, Heejo Lee, Inhye Kang: 100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs. IEEE Journal on Selected Areas in Communications 25(4): 689-698 (2007) |
27 | EE | Hyogon Kim, Heejo Lee, Sangmin Shin: On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. IEICE Transactions 90-B(2): 412-416 (2007) |
26 | EE | Hyundo Park, Heejo Lee, Hyogon Kim: Detecting Unknown Worms Using Randomness Check. IEICE Transactions 90-B(4): 894-903 (2007) |
25 | EE | Hyogon Kim, Sangki Yun, Heejo Lee: Boosting VoIP Capacity of Wireless Mesh Networks through Lazy Frame Aggregation. IEICE Transactions 90-B(5): 1283-1285 (2007) |
24 | EE | Hyogon Kim, Jongwon Yoon, Heejo Lee: Error Bound of Collision Probability Estimation in Non-saturated IEEE 802.11 WLANs. IEICE Transactions 90-B(7): 1884-1885 (2007) |
23 | EE | Wan Yeon Lee, Heejo Lee: Evaluation of authentication interworking methods among multiple WLAN service providers. Int. J. Communication Systems 20(5): 515-531 (2007) |
2006 | ||
22 | EE | Soo Kim, Heejo Lee, Wan Yeon Lee: Improving Resiliency of Network Topology with Enhanced Evolving Strategies. CIT 2006: 149 |
21 | EE | Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee, Yoojae Won: One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition. CIT 2006: 163 |
20 | EE | Hyogon Kim, Sangki Yun, Heejo Lee, Inhye Kang, Kyu-Young Choi: A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs. GLOBECOM 2006 |
19 | EE | Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee: Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. ICISS 2006: 357-360 |
18 | EE | Hyundo Park, Heejo Lee: Detecting Unknown Worms Using Randomness Check. ICOIN 2006: 775-784 |
17 | EE | Sangki Yun, Hyogon Kim, Heejo Lee, Inhye Kang: Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation. VTC Fall 2006: 1-5 |
16 | EE | Hyogon Kim, Heejo Lee, Sangmin Shin, Inhye Kang: On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. VTC Fall 2006: 1-6 |
15 | EE | Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee: Cascade Damage Estimation Model for Internet Attacks. WISI 2006: 163-164 |
14 | EE | Heejo Lee, Jong Kim, Wan Yeon Lee: Resiliency of Network Topologies under Path-Based Attacks. IEICE Transactions 89-B(10): 2878-2884 (2006) |
13 | EE | Wan Yeon Lee, Heejo Lee: Optimal Scheduling for Real-Time Parallel Tasks. IEICE Transactions 89-D(6): 1962-1966 (2006) |
2005 | ||
12 | EE | Hyunsang Choi, Heejo Lee: PCAV: Internet Attack Visualization on Parallel Coordinates. ICICS 2005: 454-466 |
11 | EE | O-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim, Sang Cheon Kim, Gun Woo Nam, Joong Gil Park: HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities. ICOIN 2005: 652-661 |
10 | EE | Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee: Defending a Web Browser Against Spying with Browser Helper Objects. ISI 2005: 638-639 |
2004 | ||
9 | EE | Heejo Lee, Jong Kim: Attack Resiliency of Network Topologies. PDCAT 2004: 638-641 |
2003 | ||
8 | EE | Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee: Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems. IEEE Trans. Parallel Distrib. Syst. 14(4): 394-407 (2003) |
7 | EE | Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee: Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization. Parallel Computing 29(1): 135-159 (2003) |
2001 | ||
6 | EE | Heejo Lee, Kihong Park: On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack. INFOCOM 2001: 338-347 |
5 | EE | Kihong Park, Heejo Lee: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. SIGCOMM 2001: 15-26 |
2000 | ||
4 | Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee: Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization. SAC (2) 2000: 641-648 | |
1997 | ||
3 | Jong Kim, Heejo Lee, Sunggu Lee: Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. IEEE Trans. Computers 46(4): 499-505 (1997) | |
1995 | ||
2 | Jong Kim, Heejo Lee, Sunggu Lee: Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. FTCS 1995: 174-183 | |
1 | EE | Heejo Lee, Kenji Toda, Jong Kim, Kenji Nishida, Eiichi Takahashi, Yoshinori Yamaguchi: Performance comparison of real-time architectures using simulation. RTCSA 1995: 150- |