2009 |
32 | EE | Sang-Kyun Noh,
Joo-Hyung Oh,
Jae-Seo Lee,
Bong-Nam Noh,
Hyun-Cheol Jeong:
Detecting P2P Botnets Using a Multi-phased Flow Model.
ICDS 2009: 247-253 |
2008 |
31 | EE | Jun-Hyung Park,
Minsoo Kim,
Bong-Nam Noh:
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.
WISA 2008: 201-210 |
2007 |
30 | EE | Jeong-Wook Kim,
Hyug-Hyun Cho,
Gil-Jong Mun,
Jae-Hyun Seo,
Bong-Nam Noh,
Yong-Min Kim:
Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network.
FGCN (2) 2007: 559-564 |
2006 |
29 | EE | Sang-Kyun Noh,
Yong-Min Kim,
DongKook Kim,
Bong-Nam Noh:
An Efficient Similarity Measure for Clustering of Categorical Sequences.
Australian Conference on Artificial Intelligence 2006: 372-382 |
28 | EE | Gil-Jong Mun,
Yong-Min Kim,
DongKook Kim,
BongNam Noh:
Network Intrusion Detection Using Statistical Probability Distribution.
ICCSA (2) 2006: 340-348 |
27 | EE | Sang-Kyun Noh,
Yong-Min Kim,
DongKook Kim,
BongNam Noh:
Network Anomaly Detection Based on Clustering of Sequence Patterns.
ICCSA (2) 2006: 349-358 |
26 | EE | Jung-Sun Kim,
Seungyong Lee,
Minsoo Kim,
Jae-Hyun Seo,
BongNam Noh:
A Security Architecture for Adapting Multiple Access Control Models to Operating Systems.
ICCSA (5) 2006: 922-931 |
25 | EE | Hyun-Uk Hwang,
Min-Soo Kim,
Bong-Nam Noh:
Expert System Using Fuzzy Petri Nets in Computer Forensics.
ICHIT 2006: 312-322 |
24 | | Jun-Hyung Park,
Minsoo Kim,
BongNam Noh,
James B. D. Joshi:
A similarity based technique for detecting malicious executable files for computer forensics.
IRI 2006: 188-193 |
23 | EE | Sang-Kyun Noh,
DongKook Kim,
Yong-Min Kim,
Bong-Nam Noh:
Modeling of Network Intrusions Based on the Multiple Transition Probability.
IWSEC 2006: 278-291 |
22 | EE | InSu Kim,
HeeMan Park,
BongNam Noh,
YoungLok Lee,
Seungyong Lee,
HyungHyo Lee:
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning.
SUTC (2) 2006: 96-103 |
21 | | InSu Kim,
HeeMan Park,
BongNam Noh,
YoungLok Lee,
Seungyong Lee,
HyungHyo Lee:
Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing.
WEBIST (1) 2006: 190-198 |
20 | EE | Jae-Chul Park,
Bong-Nam Noh:
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment.
WISA 2006: 74-82 |
2005 |
19 | EE | Gil-Jong Mun,
Yong-Min Kim,
DongKook Kim,
BongNam Noh:
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.
CISC 2005: 254-264 |
18 | EE | YoungLok Lee,
HyungHyo Lee,
Seungyong Lee,
HeeMan Park,
BongNam Noh:
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate.
EUC Workshops 2005: 490-498 |
17 | EE | YoungLok Lee,
HyungHyo Lee,
Seungyong Lee,
InSu Kim,
BongNam Noh:
Development of Event Manager and Its Application in Jini Environment.
EUC Workshops 2005: 704-713 |
16 | EE | Minsoo Kim,
Jae-Hyun Seo,
Il-Ahn Cheong,
BongNam Noh:
Auto-generation of Detection Rules with Tree Induction Algorithm.
FSKD (2) 2005: 160-169 |
15 | EE | Minsoo Kim,
Jae-Hyun Seo,
Seungyong Lee,
BongNam Noh,
Jung-Taek Seo,
Eung Ki Park,
Choonsik Park:
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
ICCSA (2) 2005: 225-234 |
14 | EE | Hyang-Chang Choi,
YongHoon Yi,
Jae-Hyun Seo,
BongNam Noh,
HyungHyo Lee:
A Privacy Protection Model in ID Management Using Access Control.
ICCSA (2) 2005: 82-91 |
2004 |
13 | EE | Jung-Sun Kim,
Minsoo Kim,
BongNam Noh:
A Fuzzy Expert System for Network Forensics.
ICCSA (1) 2004: 175-182 |
12 | EE | Jun-Hyung Park,
Minsoo Kim,
BongNam Noh:
Detection Techniques for ELF Executable File Using Assembly Instruction Searching.
ICCSA (1) 2004: 230-237 |
11 | EE | HyungHyo Lee,
Seungyong Lee,
BongNam Noh:
A New Role-Based Authorization Model in a Corporate Workflow Systems.
ICCSA (1) 2004: 701-710 |
10 | EE | Il-Ahn Cheong,
Yong-Min Kim,
Minsoo Kim,
BongNam Noh:
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network.
ICOIN 2004: 962-972 |
9 | EE | Seong Ho Lee,
HyungHyo Lee,
BongNam Noh:
A Rule-Based Intrusion Alert Correlation System for Integrated Security Management.
International Conference on Computational Science 2004: 365-372 |
8 | EE | Seungyong Lee,
Yong-Min Kim,
BongNam Noh,
HyungHyo Lee:
A New Authorization Model for Workflow Management System Using the RPI-RBAC Model.
International Conference on Computational Science 2004: 639-643 |
7 | EE | HyungHyo Lee,
YoungLok Lee,
BongNam Noh:
A Framework for Modeling Organization Structure in Role Engineering.
PARA 2004: 1017-1024 |
2003 |
6 | EE | YongHoon Yi,
MyongJae Kim,
YoungLok Lee,
HyungHyo Lee,
BongNam Noh:
Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment.
APWeb 2003: 287-292 |
5 | EE | HyungHyo Lee,
YoungLok Lee,
BongNam Noh:
A New Role-Based Delegation Model Using Sub-role Hierarchies.
ISCIS 2003: 811-818 |
4 | | JongSoon Park,
YoungLok Lee,
HyungHyo Lee,
BongNam Noh:
A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance.
Security and Management 2003: 294-302 |
3 | | Sang-Kil Park,
Jongsoo Jang,
BongNam Noh:
Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework.
Security and Management 2003: 397-401 |
2002 |
2 | EE | HyungHyo Lee,
BongNam Noh:
Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management.
ICOIN (2) 2002: 430-441 |
1999 |
1 | EE | HyungHyo Lee,
BongNam Noh:
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach.
ICPP Workshops 1999: 179-184 |