default search action
Kyungroul Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Jaehyuk Lee, Wonbin Jeong, Kyungroul Lee:
Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability. Sensors 24(4): 1229 (2024) - 2023
- [j25]Kyungroul Lee, Jaehyuk Lee, Sun-Young Lee, Kangbin Yim:
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. Sensors 23(6): 3023 (2023) - [j24]Kyungroul Lee, Kangbin Yim:
Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing. Sensors 23(7): 3501 (2023) - [j23]Jaehyuk Lee, Sun-Young Lee, Kangbin Yim, Kyungroul Lee:
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption. Sensors 23(10): 4728 (2023) - 2022
- [j22]Kyungroul Lee, Kangbin Yim:
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT. Digit. Commun. Networks 8(2): 124-131 (2022) - [j21]Jaehyuk Lee, Kyungroul Lee:
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms. Entropy 24(2): 239 (2022) - 2021
- [j20]Kyungroul Lee, Jaehyuk Lee, Chang Choi, Kangbin Yim:
Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT. IEEE Access 9: 10925-10939 (2021) - [j19]Sita Rani, Aman Kataria, Vishal Sharma, Smarajit Ghosh, Vinod Karar, Kyungroul Lee, Chang Choi:
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey. Wirel. Commun. Mob. Comput. 2021: 5579148:1-5579148:30 (2021) - [c32]Wontae Jung, Kangbin Yim, Kyungroul Lee:
Vulnerability Analysis of a Secure USB Memory: Based on a Commercial Product D. BWCCA 2021: 279-283 - [c31]Jaehyuk Lee, Kangbin Yim, Kyungroul Lee:
Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C. IMIS 2021: 59-66 - [c30]Wontae Jung, Kangbin Yim, Kyungroul Lee:
Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D. IMIS 2021: 494-500 - 2020
- [j18]Kyungroul Lee, Kangbin Yim, Sun-Young Lee:
Vulnerability analysis on the image-based authentication: Through the WM_INPUT message. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j17]Kyungroul Lee, Sun-Young Lee:
Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication. Entropy 22(3): 355 (2020) - [j16]Vinay Arora, Rohan Singh Leekha, Kyungroul Lee, Aman Kataria:
Facilitating User Authorization from Imbalanced Data Logs of Credit Cards Using Artificial Intelligence. Mob. Inf. Syst. 2020: 8885269:1-8885269:13 (2020) - [j15]Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service. Secur. Commun. Networks 2020: 7672941:1-7672941:16 (2020) - [i2]Sita Rani, Aman Kataria, Smarajit Ghosh, Vinod Karar, Takshi Gupta, Kyungroul Lee, Chang Choi:
Threats and Corrective Measures for IoT Security with Observance to Cybercrime. CoRR abs/2010.08793 (2020)
2010 – 2019
- 2019
- [j14]Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems. IEEE Access 7: 110205-110215 (2019) - [j13]Kyungroul Lee, Christian Esposito, Sun-Young Lee:
Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication. IEEE Access 7: 177241-177253 (2019) - [j12]Kyungroul Lee, Manhee Lee:
True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing. Sensors 19(19): 4130 (2019) - [c29]Hyeongmin Park, Taeeun Kim, Gaeul Kim, Wonyoung Jang, Kyungroul Lee, Sun-Young Lee:
Improvement of QR Code Access Control System Based on Lamport Hash Chain. IMIS 2019: 824-833 - [c28]Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. I-SPAN 2019: 133-139 - 2018
- [j11]Kyungroul Lee, Sun-Young Lee, Changho Seo, Kangbin Yim:
TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network. IEEE Access 6: 12838-12847 (2018) - [j10]Kyungroul Lee, Kangbin Yim, Jung-Taek Seo:
Ransomware prevention technique using key backup. Concurr. Comput. Pract. Exp. 30(3) (2018) - [j9]Kyungroul Lee, Insu Oh, Yeunsu Lee, Hyeji Lee, Kangbin Yim, Jungtaek Seo:
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services. J. Sensors 2018: 2089626:1-2089626:17 (2018) - [c27]Kyungroul Lee, Insu Oh, Wonyoung Jang, Chang Choi, Kangbin Yim:
Vulnerability Analysis on a Secure USB: Based on a Commercial Product A. BWCCA 2018: 498-502 - [c26]Insu Oh, Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Hyobeom Ahn, Kangbin Yim:
Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface. IMIS 2018: 212-219 - [c25]Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Kangbin Yim:
Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic. IMIS 2018: 546-553 - [c24]Kyungroul Lee, Byeonggeun Son, Sun-Young Lee, Kangbin Yim:
Vulnerability analysis of secure USB: based on the fingerprint authentication of product B. RACS 2018: 167-169 - [i1]Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You, Kyungroul Lee, Kangbin Yim:
A framework for mitigating zero-day attacks in IoT. CoRR abs/1804.05549 (2018) - 2017
- [j8]Vishal Sharma, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim, Hyungjoon Park, Kangbin Yim, Sun-Young Lee:
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT. Secur. Commun. Networks 2017: 4749085:1-4749085:24 (2017) - [c23]Kyungroul Lee, Habin Yim, Insu Oh, Kangbin Yim:
Study on the Transaction Linkage Technique Combining the Designated Terminal. BDTA 2017: 3-8 - [c22]Myoungsu Kim, Kyungroul Lee, Kangbin Yim:
Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A. BWCCA 2017: 386-391 - [c21]Insu Oh, Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment of the Image-Based Authentication Using Screen-Capture Tools. IMIS 2017: 156-161 - [c20]Insu Oh, Kyungroul Lee, Kangbin Yim:
A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function. WISA 2017: 236-245 - 2016
- [j7]Kyungroul Lee, Hyeungjun Yeuk, Jaein Kim, Hyungjoon Park, Kangbin Yim:
An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers. Comput. Stand. Interfaces 44: 137-143 (2016) - [c19]Kyungroul Lee, Insu Oh, Kangbin Yim:
Ransomware-Prevention Technique Using Key Backup. BDTA 2016: 105-114 - [c18]Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim:
Cognitive Countermeasures against BAD USB. BWCCA 2016: 377-386 - [c17]Hyeji Lee, Yeunsu Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment on the Mouse Data using Mouse Loggers. BWCCA 2016: 387-393 - [c16]Seungho Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment of Keyboard Data Based on Kaspersky Product. BWCCA 2016: 395-400 - [c15]Kyungroul Lee, Hyeungjun Yeuk, Kangbin Yim, Suhyun Kim:
Analysis on Manipulation of the MAC Address and Consequent Security Threats. MIST@CCS 2016: 113-117 - [c14]Kyungroul Lee, Yeunsu Lee, Hyeji Lee, Kangbin Yim:
A Brief Review on JTAG Security. IMIS 2016: 486-490 - [c13]Kyungroul Lee, Hyeji Lee, Yeunsu Lee, Kangbin Yim:
Analysis on the Key Storage Mechanism of the CNG Library. IMIS 2016: 499-502 - 2015
- [c12]Kyungroul Lee, Hyeungjun Yeuk, Habin Lim, Kangbin Yim:
Security Threats to the Platform Identification. BWCCA 2015: 547-550 - [c11]Kyungroul Lee, Ilsun You, Kangbin Yim:
Vulnerability Analysis on the CNG Crypto Library. IMIS 2015: 221-224 - 2014
- [c10]Kyungroul Lee, Hyungjun Yeuk, Jaein Kim, Kangbin Yim:
Anti-theft Solusions for In-Vehicle Electronic Devices. IMIS 2014: 549-553 - 2013
- [j6]Jaein Kim, Youngjun Lee, Kyungroul Lee, Taeyoung Jung, Dmitry Volokhov, Kangbin Yim:
Vulnerability to Flash Controller for Secure USB Drives. J. Internet Serv. Inf. Secur. 3(3/4): 136-145 (2013) - [c9]Kyungroul Lee, Hyungjun Yeuk, Sungkwan Kim, Kangbin Yim:
Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client. IMIS 2013: 706-708 - [c8]Kyungroul Lee, Youngjun Lee, Junyoung Park, Kangbin Yim, Ilsun You:
Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation). IMIS 2013: 709-713 - [c7]Junyoung Park, Youngjun Lee, Kyungroul Lee, Hanggon Kim, Dmitry Volokhov, Kangbin Yim:
GEESE: A Cognitive USN Platform. NBiS 2013: 267-269 - 2012
- [j5]Kyungroul Lee, Kangbin Yim, Mohammad A. Mikki:
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols. Comput. Math. Appl. 63(2): 525-535 (2012) - [j4]Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim:
A Brief Survey on Rootkit Techniques in Malicious Codes. J. Internet Serv. Inf. Secur. 2(3/4): 134-147 (2012) - [j3]Kangwon Lee, Kyungroul Lee, Jaecheon Byun, Sunghoon Lee, Hyobeom Ahn, Kangbin Yim:
Extraction of Platform-unique Information as an Identifier. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 85-99 (2012) - [j2]Kyungroul Lee, Kangbin Yim, Eugene H. Spafford:
Reverse-safe authentication protocol for secure USB memories. Secur. Commun. Networks 5(8): 834-845 (2012) - [c6]Eun-Ae Cho, Kyungroul Lee, Kangbin Yim:
A Privacy Preserving Model for Personal Information in Search Engine. IMIS 2012: 17-21 - [c5]Kyungroul Lee, Eun-Ae Cho, Kangbin Yim:
A Novel Search System for Protecting Search Word. IMIS 2012: 22-28 - 2011
- [c4]Kyungroul Lee, Sitha Pho, Kangbin Yim:
Reversability Assessment on Secure USB Memories. IMIS 2011: 6-8 - [c3]Kyungroul Lee, Kangbin Yim:
Keyboard Security: A Technological Review. IMIS 2011: 9-15 - [c2]Mohammad A. Mikki, Kyungroul Lee, Wansoo Kim, Kangbin Yim:
Architecture to Support Heterogeneous Devices for Video Surveillance System. IMIS 2011: 16-19 - 2010
- [j1]Kyungroul Lee, Hyeungjun Yeuk, Youngtae Choi, Sitha Pho, Ilsun You, Kangbin Yim:
Safe Authentication Protocol for Secure USB Memories. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 46-55 (2010) - [c1]Kyungroul Lee, Wansoo Kim, Kwangjin Bae, Kangbin Yim:
A Solution to Protecting USB Keyboard Data. BWCCA 2010: 108-111
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint