| 2008 | 
|---|
| 51 | EE | Sunghyun Kim,
Heejo Lee:
Reducing Payload Scans for Attack Signature Matching Using Rule Classification.
ACISP 2008: 350-360 | 
| 50 | EE | Riaz Ahmed Shaikh,
Hassan Jameel,
Brian J. d'Auriol,
Sungyoung Lee,
Young Jae Song,
Heejo Lee:
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
ICYCS 2008: 2038-2043 | 
| 49 | EE | Hyundo Park,
Peng Li,
Debin Gao,
Heejo Lee,
Robert H. Deng:
Distinguishing between FE and DDoS Using Randomness Check.
ISC 2008: 131-145 | 
| 48 | EE | Keun Park,
Dongwon Seo,
Jaewon Yoo,
Heejo Lee,
Hyogon Kim:
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks.
ISPEC 2008: 176-187 | 
| 47 | EE | Minjin Kwon,
Kyoochang Jeong,
Heejo Lee:
PROBE: A Process Behavior-Based Host Intrusion Prevention System.
ISPEC 2008: 203-217 | 
| 46 | EE | Dongwon Seo,
Heejo Lee,
Ejovi Nuwere:
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models.
SEC 2008: 397-411 | 
| 45 | EE | Jeheon Han,
Jonghoon Kwon,
Heejo Lee:
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events.
SEC 2008: 669-673 | 
| 44 | EE | Hassan Jameel,
Riaz Ahmed Shaikh,
Le Xuan Hung,
Yuan Wei Wei,
Syed Muhammad Khaliq-ur-rehman Raazi,
Ngo Trong Canh,
Sungyoung Lee,
Heejo Lee,
Yuseung Son,
Miguel Fernandes:
Image-Feature Based Human Identification Protocols on Limited Display Devices.
WISA 2008: 211-224 | 
| 2007 | 
|---|
| 43 | EE | Heejo Lee,
Minjin Kwon,
Geoffrey Hasker,
Adrian Perrig:
BASE: an incrementally deployable mechanism for viable IP spoofing prevention.
ASIACCS 2007: 20-31 | 
| 42 | EE | Hyunsang Choi,
Hanwoo Lee,
Heejo Lee,
Hyogon Kim:
Botnet Detection by Monitoring Group Activities in DNS Traffic.
CIT 2007: 715-720 | 
| 41 | EE | Hassan Jameel,
Riaz Ahmed Shaikh,
Heejo Lee,
Sungyoung Lee:
Human Identification Through Image Evaluation Using Secret Predicates.
CT-RSA 2007: 67-84 | 
| 40 | EE | Nguyen Ngoc Diep,
Le Xuan Hung,
Yonil Zhung,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Enforcing Access Control Using Risk Assessment.
ECUMN 2007: 419-424 | 
| 39 | EE | Do-Hoon Kim,
Taek Lee,
Sung-Oh David Jung,
Hoh Peter In,
Heejo Lee:
Cyber Threat Trend Analysis Model Using HMM.
IAS 2007: 177-182 | 
| 38 | EE | Soo Kim,
Jeong-Gil Ko,
Jongwon Yoon,
Heejo Lee:
Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations.
ICOIN 2007: 584-593 | 
| 37 | EE | Wan Yeon Lee,
Heejo Lee,
Hyogon Kim:
Energy-Aware QoS Adjustment of Multimedia Tasks with Uncertain Execution Time.
International Conference on Computational Science (4) 2007: 709-712 | 
| 36 | EE | Euijin Choo,
Jehyun Lee,
Heejo Lee,
Giwon Nam:
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission.
MUE 2007: 60-65 | 
| 35 | EE | Pho Duc Giang,
Le Xuan Hung,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems.
MUE 2007: 698-703 | 
| 34 | EE | Weiwei Yuan,
Donghai Guan,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Bayesian memory-based reputation system.
MobiMedia 2007: 9 | 
| 33 | EE | Nguyen Ngoc Diep,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments.
RTCSA 2007: 482-487 | 
| 32 | EE | Le Xuan Hung,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Activity-based Access Control Model to Hospital Information.
RTCSA 2007: 488-496 | 
| 31 |  | Nguyen Ngoc Diep,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Contextual Risk-Based Access Control.
Security and Management 2007: 406-412 | 
| 30 | EE | ChangHee Lee,
Heejo Lee:
A password stretching method using user specific salts.
WWW 2007: 1215-1216 | 
| 29 | EE | Hassan Jameel,
Heejo Lee,
Sungyoung Lee:
Using Image Attributes for Human Identification Protocols
CoRR abs/0704.2295:  (2007) | 
| 28 | EE | Sangki Yun,
Hyogon Kim,
Heejo Lee,
Inhye Kang:
100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs.
IEEE Journal on Selected Areas in Communications 25(4): 689-698 (2007) | 
| 27 | EE | Hyogon Kim,
Heejo Lee,
Sangmin Shin:
On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics.
IEICE Transactions 90-B(2): 412-416 (2007) | 
| 26 | EE | Hyundo Park,
Heejo Lee,
Hyogon Kim:
Detecting Unknown Worms Using Randomness Check.
IEICE Transactions 90-B(4): 894-903 (2007) | 
| 25 | EE | Hyogon Kim,
Sangki Yun,
Heejo Lee:
Boosting VoIP Capacity of Wireless Mesh Networks through Lazy Frame Aggregation.
IEICE Transactions 90-B(5): 1283-1285 (2007) | 
| 24 | EE | Hyogon Kim,
Jongwon Yoon,
Heejo Lee:
Error Bound of Collision Probability Estimation in Non-saturated IEEE 802.11 WLANs.
IEICE Transactions 90-B(7): 1884-1885 (2007) | 
| 23 | EE | Wan Yeon Lee,
Heejo Lee:
Evaluation of authentication interworking methods among multiple WLAN service providers.
Int. J. Communication Systems 20(5): 515-531 (2007) | 
| 2006 | 
|---|
| 22 | EE | Soo Kim,
Heejo Lee,
Wan Yeon Lee:
Improving Resiliency of Network Topology with Enhanced Evolving Strategies.
CIT 2006: 149 | 
| 21 | EE | Beomsoo Park,
Sungjin Hong,
Jaewook Oh,
Heejo Lee,
Yoojae Won:
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition.
CIT 2006: 163 | 
| 20 | EE | Hyogon Kim,
Sangki Yun,
Heejo Lee,
Inhye Kang,
Kyu-Young Choi:
A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs.
GLOBECOM 2006 | 
| 19 | EE | Weiwei Yuan,
Donghai Guan,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments.
ICISS 2006: 357-360 | 
| 18 | EE | Hyundo Park,
Heejo Lee:
Detecting Unknown Worms Using Randomness Check.
ICOIN 2006: 775-784 | 
| 17 | EE | Sangki Yun,
Hyogon Kim,
Heejo Lee,
Inhye Kang:
Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation.
VTC Fall 2006: 1-5 | 
| 16 | EE | Hyogon Kim,
Heejo Lee,
Sangmin Shin,
Inhye Kang:
On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics.
VTC Fall 2006: 1-6 | 
| 15 | EE | Taek Lee,
Hoh Peter In,
Eul-Gyu Im,
Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks.
WISI 2006: 163-164 | 
| 14 | EE | Heejo Lee,
Jong Kim,
Wan Yeon Lee:
Resiliency of Network Topologies under Path-Based Attacks.
IEICE Transactions 89-B(10): 2878-2884 (2006) | 
| 13 | EE | Wan Yeon Lee,
Heejo Lee:
Optimal Scheduling for Real-Time Parallel Tasks.
IEICE Transactions 89-D(6): 1962-1966 (2006) | 
| 2005 | 
|---|
| 12 | EE | Hyunsang Choi,
Heejo Lee:
PCAV: Internet Attack Visualization on Parallel Coordinates.
ICICS 2005: 454-466 | 
| 11 | EE | O-Hoon Kwon,
Seung-Min Lee,
Heejo Lee,
Jong Kim,
Sang Cheon Kim,
Gun Woo Nam,
Joong Gil Park:
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities.
ICOIN 2005: 652-661 | 
| 10 | EE | Beomsoo Park,
Sungjin Hong,
Jaewook Oh,
Heejo Lee:
Defending a Web Browser Against Spying with Browser Helper Objects.
ISI 2005: 638-639 | 
| 2004 | 
|---|
| 9 | EE | Heejo Lee,
Jong Kim:
Attack Resiliency of Network Topologies.
PDCAT 2004: 638-641 | 
| 2003 | 
|---|
| 8 | EE | Heejo Lee,
Jong Kim,
Sung Je Hong,
Sunggu Lee:
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems.
IEEE Trans. Parallel Distrib. Syst. 14(4): 394-407 (2003) | 
| 7 | EE | Heejo Lee,
Jong Kim,
Sung Je Hong,
Sunggu Lee:
Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization.
Parallel Computing 29(1): 135-159 (2003) | 
| 2001 | 
|---|
| 6 | EE | Heejo Lee,
Kihong Park:
On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack.
INFOCOM 2001: 338-347 | 
| 5 | EE | Kihong Park,
Heejo Lee:
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets.
SIGCOMM 2001: 15-26 | 
| 2000 | 
|---|
| 4 |  | Heejo Lee,
Jong Kim,
Sung Je Hong,
Sunggu Lee:
Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization.
SAC (2) 2000: 641-648 | 
| 1997 | 
|---|
| 3 |  | Jong Kim,
Heejo Lee,
Sunggu Lee:
Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
IEEE Trans. Computers 46(4): 499-505 (1997) | 
| 1995 | 
|---|
| 2 |  | Jong Kim,
Heejo Lee,
Sunggu Lee:
Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
FTCS 1995: 174-183 | 
| 1 | EE | Heejo Lee,
Kenji Toda,
Jong Kim,
Kenji Nishida,
Eiichi Takahashi,
Yoshinori Yamaguchi:
Performance comparison of real-time architectures using simulation.
RTCSA 1995: 150- |