2008 |
51 | EE | Sunghyun Kim,
Heejo Lee:
Reducing Payload Scans for Attack Signature Matching Using Rule Classification.
ACISP 2008: 350-360 |
50 | EE | Riaz Ahmed Shaikh,
Hassan Jameel,
Brian J. d'Auriol,
Sungyoung Lee,
Young Jae Song,
Heejo Lee:
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
ICYCS 2008: 2038-2043 |
49 | EE | Hyundo Park,
Peng Li,
Debin Gao,
Heejo Lee,
Robert H. Deng:
Distinguishing between FE and DDoS Using Randomness Check.
ISC 2008: 131-145 |
48 | EE | Keun Park,
Dongwon Seo,
Jaewon Yoo,
Heejo Lee,
Hyogon Kim:
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks.
ISPEC 2008: 176-187 |
47 | EE | Minjin Kwon,
Kyoochang Jeong,
Heejo Lee:
PROBE: A Process Behavior-Based Host Intrusion Prevention System.
ISPEC 2008: 203-217 |
46 | EE | Dongwon Seo,
Heejo Lee,
Ejovi Nuwere:
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models.
SEC 2008: 397-411 |
45 | EE | Jeheon Han,
Jonghoon Kwon,
Heejo Lee:
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events.
SEC 2008: 669-673 |
44 | EE | Hassan Jameel,
Riaz Ahmed Shaikh,
Le Xuan Hung,
Yuan Wei Wei,
Syed Muhammad Khaliq-ur-rehman Raazi,
Ngo Trong Canh,
Sungyoung Lee,
Heejo Lee,
Yuseung Son,
Miguel Fernandes:
Image-Feature Based Human Identification Protocols on Limited Display Devices.
WISA 2008: 211-224 |
2007 |
43 | EE | Heejo Lee,
Minjin Kwon,
Geoffrey Hasker,
Adrian Perrig:
BASE: an incrementally deployable mechanism for viable IP spoofing prevention.
ASIACCS 2007: 20-31 |
42 | EE | Hyunsang Choi,
Hanwoo Lee,
Heejo Lee,
Hyogon Kim:
Botnet Detection by Monitoring Group Activities in DNS Traffic.
CIT 2007: 715-720 |
41 | EE | Hassan Jameel,
Riaz Ahmed Shaikh,
Heejo Lee,
Sungyoung Lee:
Human Identification Through Image Evaluation Using Secret Predicates.
CT-RSA 2007: 67-84 |
40 | EE | Nguyen Ngoc Diep,
Le Xuan Hung,
Yonil Zhung,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Enforcing Access Control Using Risk Assessment.
ECUMN 2007: 419-424 |
39 | EE | Do-Hoon Kim,
Taek Lee,
Sung-Oh David Jung,
Hoh Peter In,
Heejo Lee:
Cyber Threat Trend Analysis Model Using HMM.
IAS 2007: 177-182 |
38 | EE | Soo Kim,
Jeong-Gil Ko,
Jongwon Yoon,
Heejo Lee:
Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations.
ICOIN 2007: 584-593 |
37 | EE | Wan Yeon Lee,
Heejo Lee,
Hyogon Kim:
Energy-Aware QoS Adjustment of Multimedia Tasks with Uncertain Execution Time.
International Conference on Computational Science (4) 2007: 709-712 |
36 | EE | Euijin Choo,
Jehyun Lee,
Heejo Lee,
Giwon Nam:
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission.
MUE 2007: 60-65 |
35 | EE | Pho Duc Giang,
Le Xuan Hung,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems.
MUE 2007: 698-703 |
34 | EE | Weiwei Yuan,
Donghai Guan,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Bayesian memory-based reputation system.
MobiMedia 2007: 9 |
33 | EE | Nguyen Ngoc Diep,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments.
RTCSA 2007: 482-487 |
32 | EE | Le Xuan Hung,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Activity-based Access Control Model to Hospital Information.
RTCSA 2007: 488-496 |
31 | | Nguyen Ngoc Diep,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Contextual Risk-Based Access Control.
Security and Management 2007: 406-412 |
30 | EE | ChangHee Lee,
Heejo Lee:
A password stretching method using user specific salts.
WWW 2007: 1215-1216 |
29 | EE | Hassan Jameel,
Heejo Lee,
Sungyoung Lee:
Using Image Attributes for Human Identification Protocols
CoRR abs/0704.2295: (2007) |
28 | EE | Sangki Yun,
Hyogon Kim,
Heejo Lee,
Inhye Kang:
100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs.
IEEE Journal on Selected Areas in Communications 25(4): 689-698 (2007) |
27 | EE | Hyogon Kim,
Heejo Lee,
Sangmin Shin:
On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics.
IEICE Transactions 90-B(2): 412-416 (2007) |
26 | EE | Hyundo Park,
Heejo Lee,
Hyogon Kim:
Detecting Unknown Worms Using Randomness Check.
IEICE Transactions 90-B(4): 894-903 (2007) |
25 | EE | Hyogon Kim,
Sangki Yun,
Heejo Lee:
Boosting VoIP Capacity of Wireless Mesh Networks through Lazy Frame Aggregation.
IEICE Transactions 90-B(5): 1283-1285 (2007) |
24 | EE | Hyogon Kim,
Jongwon Yoon,
Heejo Lee:
Error Bound of Collision Probability Estimation in Non-saturated IEEE 802.11 WLANs.
IEICE Transactions 90-B(7): 1884-1885 (2007) |
23 | EE | Wan Yeon Lee,
Heejo Lee:
Evaluation of authentication interworking methods among multiple WLAN service providers.
Int. J. Communication Systems 20(5): 515-531 (2007) |
2006 |
22 | EE | Soo Kim,
Heejo Lee,
Wan Yeon Lee:
Improving Resiliency of Network Topology with Enhanced Evolving Strategies.
CIT 2006: 149 |
21 | EE | Beomsoo Park,
Sungjin Hong,
Jaewook Oh,
Heejo Lee,
Yoojae Won:
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition.
CIT 2006: 163 |
20 | EE | Hyogon Kim,
Sangki Yun,
Heejo Lee,
Inhye Kang,
Kyu-Young Choi:
A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs.
GLOBECOM 2006 |
19 | EE | Weiwei Yuan,
Donghai Guan,
Sungyoung Lee,
Young-Koo Lee,
Heejo Lee:
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments.
ICISS 2006: 357-360 |
18 | EE | Hyundo Park,
Heejo Lee:
Detecting Unknown Worms Using Randomness Check.
ICOIN 2006: 775-784 |
17 | EE | Sangki Yun,
Hyogon Kim,
Heejo Lee,
Inhye Kang:
Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation.
VTC Fall 2006: 1-5 |
16 | EE | Hyogon Kim,
Heejo Lee,
Sangmin Shin,
Inhye Kang:
On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics.
VTC Fall 2006: 1-6 |
15 | EE | Taek Lee,
Hoh Peter In,
Eul-Gyu Im,
Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks.
WISI 2006: 163-164 |
14 | EE | Heejo Lee,
Jong Kim,
Wan Yeon Lee:
Resiliency of Network Topologies under Path-Based Attacks.
IEICE Transactions 89-B(10): 2878-2884 (2006) |
13 | EE | Wan Yeon Lee,
Heejo Lee:
Optimal Scheduling for Real-Time Parallel Tasks.
IEICE Transactions 89-D(6): 1962-1966 (2006) |
2005 |
12 | EE | Hyunsang Choi,
Heejo Lee:
PCAV: Internet Attack Visualization on Parallel Coordinates.
ICICS 2005: 454-466 |
11 | EE | O-Hoon Kwon,
Seung-Min Lee,
Heejo Lee,
Jong Kim,
Sang Cheon Kim,
Gun Woo Nam,
Joong Gil Park:
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities.
ICOIN 2005: 652-661 |
10 | EE | Beomsoo Park,
Sungjin Hong,
Jaewook Oh,
Heejo Lee:
Defending a Web Browser Against Spying with Browser Helper Objects.
ISI 2005: 638-639 |
2004 |
9 | EE | Heejo Lee,
Jong Kim:
Attack Resiliency of Network Topologies.
PDCAT 2004: 638-641 |
2003 |
8 | EE | Heejo Lee,
Jong Kim,
Sung Je Hong,
Sunggu Lee:
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems.
IEEE Trans. Parallel Distrib. Syst. 14(4): 394-407 (2003) |
7 | EE | Heejo Lee,
Jong Kim,
Sung Je Hong,
Sunggu Lee:
Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization.
Parallel Computing 29(1): 135-159 (2003) |
2001 |
6 | EE | Heejo Lee,
Kihong Park:
On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack.
INFOCOM 2001: 338-347 |
5 | EE | Kihong Park,
Heejo Lee:
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets.
SIGCOMM 2001: 15-26 |
2000 |
4 | | Heejo Lee,
Jong Kim,
Sung Je Hong,
Sunggu Lee:
Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization.
SAC (2) 2000: 641-648 |
1997 |
3 | | Jong Kim,
Heejo Lee,
Sunggu Lee:
Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
IEEE Trans. Computers 46(4): 499-505 (1997) |
1995 |
2 | | Jong Kim,
Heejo Lee,
Sunggu Lee:
Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
FTCS 1995: 174-183 |
1 | EE | Heejo Lee,
Kenji Toda,
Jong Kim,
Kenji Nishida,
Eiichi Takahashi,
Yoshinori Yamaguchi:
Performance comparison of real-time architectures using simulation.
RTCSA 1995: 150- |