| 2009 |
| 32 | EE | Sang-Kyun Noh,
Joo-Hyung Oh,
Jae-Seo Lee,
Bong-Nam Noh,
Hyun-Cheol Jeong:
Detecting P2P Botnets Using a Multi-phased Flow Model.
ICDS 2009: 247-253 |
| 2008 |
| 31 | EE | Jun-Hyung Park,
Minsoo Kim,
Bong-Nam Noh:
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.
WISA 2008: 201-210 |
| 2007 |
| 30 | EE | Jeong-Wook Kim,
Hyug-Hyun Cho,
Gil-Jong Mun,
Jae-Hyun Seo,
Bong-Nam Noh,
Yong-Min Kim:
Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network.
FGCN (2) 2007: 559-564 |
| 2006 |
| 29 | EE | Sang-Kyun Noh,
Yong-Min Kim,
DongKook Kim,
Bong-Nam Noh:
An Efficient Similarity Measure for Clustering of Categorical Sequences.
Australian Conference on Artificial Intelligence 2006: 372-382 |
| 28 | EE | Gil-Jong Mun,
Yong-Min Kim,
DongKook Kim,
BongNam Noh:
Network Intrusion Detection Using Statistical Probability Distribution.
ICCSA (2) 2006: 340-348 |
| 27 | EE | Sang-Kyun Noh,
Yong-Min Kim,
DongKook Kim,
BongNam Noh:
Network Anomaly Detection Based on Clustering of Sequence Patterns.
ICCSA (2) 2006: 349-358 |
| 26 | EE | Jung-Sun Kim,
Seungyong Lee,
Minsoo Kim,
Jae-Hyun Seo,
BongNam Noh:
A Security Architecture for Adapting Multiple Access Control Models to Operating Systems.
ICCSA (5) 2006: 922-931 |
| 25 | EE | Hyun-Uk Hwang,
Min-Soo Kim,
Bong-Nam Noh:
Expert System Using Fuzzy Petri Nets in Computer Forensics.
ICHIT 2006: 312-322 |
| 24 | | Jun-Hyung Park,
Minsoo Kim,
BongNam Noh,
James B. D. Joshi:
A similarity based technique for detecting malicious executable files for computer forensics.
IRI 2006: 188-193 |
| 23 | EE | Sang-Kyun Noh,
DongKook Kim,
Yong-Min Kim,
Bong-Nam Noh:
Modeling of Network Intrusions Based on the Multiple Transition Probability.
IWSEC 2006: 278-291 |
| 22 | EE | InSu Kim,
HeeMan Park,
BongNam Noh,
YoungLok Lee,
Seungyong Lee,
HyungHyo Lee:
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning.
SUTC (2) 2006: 96-103 |
| 21 | | InSu Kim,
HeeMan Park,
BongNam Noh,
YoungLok Lee,
Seungyong Lee,
HyungHyo Lee:
Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing.
WEBIST (1) 2006: 190-198 |
| 20 | EE | Jae-Chul Park,
Bong-Nam Noh:
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment.
WISA 2006: 74-82 |
| 2005 |
| 19 | EE | Gil-Jong Mun,
Yong-Min Kim,
DongKook Kim,
BongNam Noh:
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.
CISC 2005: 254-264 |
| 18 | EE | YoungLok Lee,
HyungHyo Lee,
Seungyong Lee,
HeeMan Park,
BongNam Noh:
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate.
EUC Workshops 2005: 490-498 |
| 17 | EE | YoungLok Lee,
HyungHyo Lee,
Seungyong Lee,
InSu Kim,
BongNam Noh:
Development of Event Manager and Its Application in Jini Environment.
EUC Workshops 2005: 704-713 |
| 16 | EE | Minsoo Kim,
Jae-Hyun Seo,
Il-Ahn Cheong,
BongNam Noh:
Auto-generation of Detection Rules with Tree Induction Algorithm.
FSKD (2) 2005: 160-169 |
| 15 | EE | Minsoo Kim,
Jae-Hyun Seo,
Seungyong Lee,
BongNam Noh,
Jung-Taek Seo,
Eung Ki Park,
Choonsik Park:
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
ICCSA (2) 2005: 225-234 |
| 14 | EE | Hyang-Chang Choi,
YongHoon Yi,
Jae-Hyun Seo,
BongNam Noh,
HyungHyo Lee:
A Privacy Protection Model in ID Management Using Access Control.
ICCSA (2) 2005: 82-91 |
| 2004 |
| 13 | EE | Jung-Sun Kim,
Minsoo Kim,
BongNam Noh:
A Fuzzy Expert System for Network Forensics.
ICCSA (1) 2004: 175-182 |
| 12 | EE | Jun-Hyung Park,
Minsoo Kim,
BongNam Noh:
Detection Techniques for ELF Executable File Using Assembly Instruction Searching.
ICCSA (1) 2004: 230-237 |
| 11 | EE | HyungHyo Lee,
Seungyong Lee,
BongNam Noh:
A New Role-Based Authorization Model in a Corporate Workflow Systems.
ICCSA (1) 2004: 701-710 |
| 10 | EE | Il-Ahn Cheong,
Yong-Min Kim,
Minsoo Kim,
BongNam Noh:
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network.
ICOIN 2004: 962-972 |
| 9 | EE | Seong Ho Lee,
HyungHyo Lee,
BongNam Noh:
A Rule-Based Intrusion Alert Correlation System for Integrated Security Management.
International Conference on Computational Science 2004: 365-372 |
| 8 | EE | Seungyong Lee,
Yong-Min Kim,
BongNam Noh,
HyungHyo Lee:
A New Authorization Model for Workflow Management System Using the RPI-RBAC Model.
International Conference on Computational Science 2004: 639-643 |
| 7 | EE | HyungHyo Lee,
YoungLok Lee,
BongNam Noh:
A Framework for Modeling Organization Structure in Role Engineering.
PARA 2004: 1017-1024 |
| 2003 |
| 6 | EE | YongHoon Yi,
MyongJae Kim,
YoungLok Lee,
HyungHyo Lee,
BongNam Noh:
Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment.
APWeb 2003: 287-292 |
| 5 | EE | HyungHyo Lee,
YoungLok Lee,
BongNam Noh:
A New Role-Based Delegation Model Using Sub-role Hierarchies.
ISCIS 2003: 811-818 |
| 4 | | JongSoon Park,
YoungLok Lee,
HyungHyo Lee,
BongNam Noh:
A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance.
Security and Management 2003: 294-302 |
| 3 | | Sang-Kil Park,
Jongsoo Jang,
BongNam Noh:
Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework.
Security and Management 2003: 397-401 |
| 2002 |
| 2 | EE | HyungHyo Lee,
BongNam Noh:
Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management.
ICOIN (2) 2002: 430-441 |
| 1999 |
| 1 | EE | HyungHyo Lee,
BongNam Noh:
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach.
ICPP Workshops 1999: 179-184 |