default search action
Heejo Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j59]Seunghoon Woo, Eunjin Choi, Heejo Lee:
A large-scale analysis of the effectiveness of publicly reported security patches. Comput. Secur. 148: 104181 (2025) - 2024
- [c99]Choongin Lee, Isa Jafarov, Sven Dietrich, Heejo Lee:
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering. ESORICS (2) 2024: 3-23 - [c98]Pyeongju Ahn, Yeonseok Jang, Seunghoon Woo, Heejo Lee:
BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines. ESORICS (3) 2024: 110-129 - [c97]Yoonjong Na, Seunghoon Woo, Joomyeong Lee, Heejo Lee:
CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components. ICSE 2024: 236:1-236:12 - 2023
- [j58]Carlos Nkuba Kayembe, Seunghoon Woo, Heejo Lee, Sven Dietrich:
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol. IEEE Access 11: 60562-60577 (2023) - [c96]Taejun Lee, Heewon Park, Heejo Lee:
AutoMetric: Towards Measuring Open-Source Software Quality Metrics Automatically. AST 2023: 47-55 - [c95]Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh:
V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques. USENIX Security Symposium 2023: 6541-6556 - 2022
- [j57]Carlos Nkuba Kayembe, Seulbae Kim, Sven Dietrich, Heejo Lee:
Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes. IEEE Access 10: 1775-1789 (2022) - [j56]Hyunji Hong, Seunghoon Woo, Eunjin Choi, Jihyun Choi, Heejo Lee:
xVDB: A High-Coverage Approach for Constructing a Vulnerability Database. IEEE Access 10: 85050-85063 (2022) - [j55]Hyunji Hong, Seunghoon Woo, Sunghan Park, Jeongwook Lee, Heejo Lee:
Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites. IEEE Access 10: 95356-95368 (2022) - [j54]Junwon Lee, Heejo Lee:
Improving SSH detection model using IPA time and WGAN-GP. Comput. Secur. 116: 102672 (2022) - [j53]Junwon Lee, Heejo Lee:
An SSH predictive model using machine learning with web proxy session logs. Int. J. Inf. Sec. 21(2): 311-322 (2022) - [c94]Kyeongseok Yang, Sudharssan Mohan, Yonghwi Kwon, Heejo Lee, Chung Hwan Kim:
Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles. CCS 2022: 3503-3505 - [c93]Haram Park, Carlos Nkuba Kayembe, Seunghoon Woo, Heejo Lee:
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing. DSN 2022: 343-354 - [c92]Jeonghwa Heo, Heewoong Jang, Heejo Lee:
How to divide a permission token in the delegation process of blockchain-based access control for IoT. SysCon 2022: 1-8 - [c91]Seunghoon Woo, Hyunji Hong, Eunjin Choi, Heejo Lee:
MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components. USENIX Security Symposium 2022: 3037-3053 - [i6]Haram Park, Carlos Nkuba Kayembe, Seunghoon Woo, Heejo Lee:
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing. CoRR abs/2208.00110 (2022) - 2021
- [j52]Kyu-Sun Shim, Nam In Park, Jin-Hwan Kim, Oc-Yeub Jeon, Heejo Lee:
Vehicle Speed Measurement Methodology Robust to Playback Speed-Manipulated Video File. IEEE Access 9: 132862-132874 (2021) - [j51]Hyunchul Jung, Hyungeun Jo, Heejo Lee:
UDP-Based Active Scan for IoT Security (UAIS). KSII Trans. Internet Inf. Syst. 15(1): 20-34 (2021) - [c90]Hyunji Hong, Seunghoon Woo, Heejo Lee:
Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions. ACSAC 2021: 194-206 - [c89]Seongkyeong Kwon, Seunghoon Woo, Gangmo Seong, Heejo Lee:
OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept. DSN 2021: 174-185 - [c88]Seunghoon Woo, Sunghan Park, Seulbae Kim, Heejo Lee, Hakjoo Oh:
Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse. ICSE 2021: 860-872 - [c87]Hajin Jang, Kyeongseok Yang, Geonwoo Lee, Yoonjong Na, Jeremy D. Seideman, Shoufu Luo, Heejo Lee, Sven Dietrich:
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection. SEC 2021: 66-82 - [c86]Junwon Lee, Heejo Lee:
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security. SEC 2021: 287-301 - [c85]Seunghoon Woo, Dongwook Lee, Sunghan Park, Heejo Lee, Sven Dietrich:
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities. USENIX Security Symposium 2021: 3041-3058 - [i5]Seunghoon Woo, Sunghan Park, Seulbae Kim, Heejo Lee, Hakjoo Oh:
CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse. CoRR abs/2102.06182 (2021) - 2020
- [c84]Yoonjong Na, Yejin Joo, Heejo Lee, Xiangchen Zhao, Kurian Karyakulam Sajan, Gowri Sankar Ramachandran, Bhaskar Krishnamachari:
Enhancing the Reliability of IoT Data Marketplaces through Security Validation of IoT Devices. DCOSS 2020: 265-272 - [c83]Myung-Sun Baek, Yong-Tae Lee, Kwangho Jang, Heejo Lee, Wonjoo Park:
Design and Performance Evaluation of Crime Type and Crime Risk Score Estimation Technique for Fast and Efficient Response of Severe Crimes. ICTC 2020: 1826-1828 - [c82]Sunbeom So, Myungho Lee, Jisu Park, Heejo Lee, Hakjoo Oh:
VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts. SP 2020: 1678-1694
2010 – 2019
- 2019
- [i4]Sunbeom So, Myungho Lee, Jisu Park, Heejo Lee, Hakjoo Oh:
VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts. CoRR abs/1908.11227 (2019) - 2018
- [j50]Seulbae Kim, Heejo Lee:
Software systems at risk: An empirical study of cloned vulnerabilities in practice. Comput. Secur. 77: 720-736 (2018) - [c81]Sangwoo Kim, Seokmyung Hong, Jaesang Oh, Heejo Lee:
Obfuscated VBA Macro Detection Using Machine Learning. DSN 2018: 490-501 - [c80]Choong In Lee, Jeonghan Bae, Heejo Lee:
PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces. SEC 2018: 141-155 - 2017
- [j49]Munkhbayar Bat-Erdene, Taebeom Kim, Hyundo Park, Heejo Lee:
Packer Detection for Multi-Layer Executables Using Entropy Analysis. Entropy 19(3): 125 (2017) - [j48]Munkhbayar Bat-Erdene, Hyundo Park, Hongzhe Li, Heejo Lee, Mahn-Soo Choi:
Entropy analysis to classify unknown packing algorithms for malware detection. Int. J. Inf. Sec. 16(3): 227-248 (2017) - [c79]Youngbin Pyo, Choong In Lee, Heejo Lee:
Visual analysis of corrupted video data in video event data recorders. DSC 2017: 453-458 - [c78]Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh:
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. IEEE Symposium on Security and Privacy 2017: 595-614 - 2016
- [j47]Jonghoon Kwon, Jehyun Lee, Heejo Lee, Adrian Perrig:
PsyBoG: A scalable botnet detection method for large-scale DNS traffic. Comput. Networks 97: 48-73 (2016) - [j46]Hongzhe Li, Hyuckmin Kwon, Jonghoon Kwon, Heejo Lee:
CLORIFI: software vulnerability discovery using code clone verification. Concurr. Comput. Pract. Exp. 28(6): 1900-1917 (2016) - [j45]Ji Eun Song, Kiryong Lee, Wan Yeon Lee, Heejo Lee:
Integrity verification of the ordered data structures in manipulated video content. Digit. Investig. 18: 1-7 (2016) - [j44]Hongzhe Li, Jaesang Oh, Heejo Lee:
Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code. IEICE Trans. Inf. Syst. 99-D(9): 2385-2389 (2016) - [j43]Choong In Lee, Jehyun Lee, Youngbin Pyo, Heejo Lee:
Broken Integrity Detection of Video Files in Video Event Data Recorders. KSII Trans. Internet Inf. Syst. 10(8): 3943-3957 (2016) - [j42]Hyok An, Heejo Lee, Adrian Perrig:
Coordination of anti-spoofing mechanisms in partial deployments. J. Commun. Networks 18(6): 948-961 (2016) - [c77]John Milburn, Heejo Lee:
FassKey: A secure and convenient authentication system. NetSoft 2016: 489-495 - [c76]Hongzhe Li, Jaesang Oh, Hakjoo Oh, Heejo Lee:
Automated Source Code Instrumentation for Verifying Potential Vulnerabilities. SEC 2016: 211-226 - 2015
- [j41]Jonghoon Kwon, Dongwon Seo, Minjin Kwon, Heejo Lee, Adrian Perrig, Hyogon Kim:
An incrementally deployable anti-spoofing mechanism for software-defined networks. Comput. Commun. 64: 1-20 (2015) - [j40]Jehyun Lee, Suyeon Lee, Heejo Lee:
Screening smartphone applications using malware family signatures. Comput. Secur. 52: 234-249 (2015) - [j39]Wan Yeon Lee, Hyuckmin Kwon, Heejo Lee:
Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11(4), 224-233]. Digit. Investig. 15: 119-123 (2015) - [j38]Sangwook Lee, Ji Eun Song, Wan Yeon Lee, Young Woong Ko, Heejo Lee:
Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations. IEICE Trans. Inf. Syst. 98-D(1): 95-97 (2015) - [j37]Wade Trappe, Lalitha Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun:
Introduction to the Issue on Signal and Information Processing for Privacy. IEEE J. Sel. Top. Signal Process. 9(7): 1173-1175 (2015) - [j36]Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim:
A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control. Wirel. Networks 21(8): 2631-2647 (2015) - [c75]Aapo Kalliola, Kiryong Lee, Heejo Lee, Tuomas Aura:
Flooding DDoS mitigation and traffic management with software defined networking. CloudNet 2015: 248-254 - [i3]Taeho Lee, Pawel Szalachowski, David Barrera, Adrian Perrig, Heejo Lee, David Watrin:
Bootstrapping Real-world Deployment of Future Internet Architectures. CoRR abs/1508.02240 (2015) - 2014
- [j35]Jehyun Lee, Heejo Lee:
GMAD: Graph-based Malware Activity Detection by DNS traffic analysis. Comput. Commun. 49: 33-47 (2014) - [j34]Ilju Seo, Heejo Lee, Seung Chul Han:
Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection. Comput. Secur. 46: 141-153 (2014) - [c74]Jonghoon Kwon, Jihwan Jeong, Jehyun Lee, Heejo Lee:
DroidGraph: discovering Android malware by analyzing semantic behavior. CNS 2014: 498-499 - [c73]Jihwan Jeong, Dongwon Seo, Chanyoung Lee, Jonghoon Kwon, Heejo Lee, John Milburn:
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android. MALWARE 2014: 50-57 - [c72]Jonghoon Kwon, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig:
PsyBoG: Power spectral density analysis for detecting botnet groups. MALWARE 2014: 85-92 - [c71]Ibnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee:
Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment. SEC 2014: 44-51 - [e1]Yongdae Kim, Heejo Lee, Adrian Perrig:
Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8267, Springer 2014, ISBN 978-3-319-05148-2 [contents] - 2013
- [j33]Dongwon Seo, Heejo Lee, Ejovi Nuwere:
SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree. Comput. Commun. 36(5): 562-574 (2013) - [j32]Dongwon Seo, Heejo Lee, Adrian Perrig:
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks. Comput. Secur. 39: 366-385 (2013) - [c70]Hongzhe Li, Taebeom Kim, Munkhbayar Bat-Erdene, Heejo Lee:
Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution. ARES 2013: 446-454 - [c69]Jungin Kang, Sangwook Lee, Heejo Lee:
A Digital Forensic Framework for Automated User Activity Reconstruction. ISPEC 2013: 263-277 - [c68]Hyok An, Heejo Lee, Adrian Perrig:
UAS: Universal anti-spoofing by incorporating existing mechanisms. LCN 2013: 316-319 - [c67]Munkhbayar Bat-Erdene, Taebeom Kim, Hongzhe Li, Heejo Lee:
Dynamic classification of packing algorithms for inspecting executables using entropy analysis. MALWARE 2013: 19-26 - [c66]Suyeon Lee, Jehyun Lee, Heejo Lee:
Screening Smartphone Applications Using Behavioral Signatures. SEC 2013: 14-27 - [c65]Heesung Do, Peter Choi, Heejo Lee:
Dynamic Surveillance: A Case Study with Enron Email Data Set. WISA 2013: 81-99 - 2012
- [j31]Hyunsang Choi, Heejo Lee:
Identifying botnets by capturing group activities in DNS traffic. Comput. Networks 56(1): 20-33 (2012) - [j30]Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, Bruno Sinopoli:
Cyber-Physical Security of a Smart Grid Infrastructure. Proc. IEEE 100(1): 195-209 (2012) - [c64]Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim:
Carving secure wi-fi zones with defensive jamming. AsiaCCS 2012: 53-54 - [c63]Hyundo Park, Indra Widjaja, Heejo Lee:
Detection of cache pollution attacks using randomness checks. ICC 2012: 1096-1100 - [c62]Jonghoon Kwon, Heejo Lee:
BinGraph: Discovering mutant malware using hierarchical semantic signatures. MALWARE 2012: 104-111 - [c61]Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In:
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis. SEC 2012: 376-387 - [c60]Taebeom Kim, Haemin Park, Hyunchul Jung, Heejo Lee:
Online Detection of Fake Access Points Using Received Signal Strengths. VTC Spring 2012: 1-5 - 2011
- [j29]Wan Yeon Lee, Hyogon Kim, Heejo Lee:
Minimum-Energy Semi-Static Scheduling of a Periodic Real-Time Task on DVFS-Enabled Multi-Core Processors. IEICE Trans. Inf. Syst. 94-D(12): 2389-2392 (2011) - [c59]Jonghoon Kwon, Jehyun Lee, Heejo Lee:
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. ISPEC 2011: 343-361 - [c58]Dongwon Seo, Heejo Lee, Adrian Perrig:
PFS: Probabilistic filter scheduling against distributed denial-of-service attacks. LCN 2011: 9-17 - [c57]Hyunsang Choi, Bin B. Zhu, Heejo Lee:
Detecting Malicious Web Links and Identifying Their Attack Types. WebApps 2011 - 2010
- [j28]Syed Muhammad Khaliq-ur-Rahman Raazi, Heejo Lee, Sungyoung Lee, Young-Koo Lee:
MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks. Ann. des Télécommunications 65(1-2): 101-116 (2010) - [j27]Wan Yeon Lee, Soo Kim, Heejo Lee, Hyogon Kim:
Enhancing Resiliency of Networks: Evolving Strategy vs. Multihoming. IEICE Trans. Commun. 93-B(1): 174-177 (2010) - [j26]Sunghyun Kim, Heejo Lee:
Abnormal Policy Detection and Correction Using Overlapping Transition. IEICE Trans. Inf. Syst. 93-D(5): 1053-1061 (2010) - [j25]Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee, Murad Khalid, Ravi Sankar:
Activity-oriented access control to ubiquitous hospital information and services. Inf. Sci. 180(16): 2979-2990 (2010) - [j24]Sunghyun Kim, Heejo Lee:
Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly. KSII Trans. Internet Inf. Syst. 4(4): 671-690 (2010) - [j23]Riaz Ahmed Shaikh, Hassan Jameel Asghar, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song:
Achieving Network Level Privacy in Wireless Sensor Networks. Sensors 10(3): 1447-1472 (2010) - [j22]Syed Muhammad Khaliq-ur-Rahman Raazi, Heejo Lee, Sungyoung Lee, Young-Koo Lee:
BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks. Sensors 10(4): 3911-3933 (2010) - [c56]Guhyeon Jeong, Euijin Choo, Joosuk Lee, Munkhbayar Bat-Erdene, Heejo Lee:
Generic unpacking using entropy analysis. MALWARE 2010: 98-105 - [c55]Jusuk Lee, Kyoochang Jeong, Heejo Lee:
Detecting metamorphic malwares using code graphs. SAC 2010: 1970-1977 - [c54]Tae Hwan Oh, Shinyoung Lim, Young B. Choi, Kwang-Roh Park, Heejo Lee, Hyunsang Choi:
State of the Art of Network Security Perspectives in Cloud Computing. SUComS 2010: 629-637
2000 – 2009
- 2009
- [j21]Hyunsang Choi, Heejo Lee, Hyogon Kim:
Fast detection and visualization of network attacks on parallel coordinates. Comput. Secur. 28(5): 276-288 (2009) - [j20]Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks. IEICE Trans. Commun. 92-B(1): 131-142 (2009) - [j19]Sunghyun Kim, Heejo Lee:
Reducing Payload Inspection Cost Using Rule Classification for Fast Attack Signature Matching. IEICE Trans. Inf. Syst. 92-D(10): 1971-1978 (2009) - [j18]Adrian Perrig, Wade Trappe, Virgil D. Gligor, Radha Poovendran, Heejo Lee:
Secure wireless networking. J. Commun. Networks 11(6): 323-327 (2009) - [j17]Xuan Hung Le, Sungyoung Lee, Ismail Butun, Murad Khalid, Ravi Sankar, Miso Kim, Manhyung Han, Young-Koo Lee, Heejo Lee:
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. J. Commun. Networks 11(6): 599-606 (2009) - [j16]Hyundo Park, Hyogon Kim, Heejo Lee:
Is early warning of an imminent worm epidemic possible? IEEE Netw. 23(5): 14-20 (2009) - [j15]Riaz Ahmed Shaikh, Hassan Jameel Asghar, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song:
Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. Sensors 9(8): 5989-6007 (2009) - [j14]Wan Yeon Lee, Hyogon Kim, Heejo Lee:
Maximum-Utility Scheduling of Operation Modes With Probabilistic Task Execution Times Under Energy Constraints. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 28(10): 1531-1544 (2009) - [j13]Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song:
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 20(11): 1698-1712 (2009) - [c53]Le Xuan Hung, Riaz Ahmed Shaikh, Hassan Jameel, Syed Muhammad Khaliq-ur-Rahman Raazi, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes:
Activity-Oriented Access Control for Ubiquitous Environments. CCNC 2009: 1-5 - [c52]Syed Muhammad Khaliq-ur-Rahman Raazi, Heejo Lee, Sungyoung Lee, Young-Koo Lee:
BARI: A Distributed Key Management Approach for Wireless Body Area Networks. CIS (2) 2009: 324-329 - [c51]Hyunsang Choi, Heejo Lee, Hyogon Kim:
BotGAD: detecting botnets by capturing group activities in network traffic. COMSWARE 2009: 2 - [c50]Wan Yeon Lee, Young Woong Ko, Heejo Lee, Hyogon Kim:
Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores. ICHIT 2009: 273-277 - [c49]Euijin Choo, Heejo Lee, Wan Yeon Lee:
Dynamic multimedia scheduling against Motion based DoS attacks. ICOIN 2009: 1-5 - [c48]Jehyun Lee, Heejo Lee, Hoh Peter In:
Scalable attack graph for risk assessment. ICOIN 2009: 1-5 - [i2]Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song:
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. CoRR abs/0912.5334 (2009) - 2008
- [j12]Jin-Ho Kim, Heejo Lee, Saewoong Bahk:
A connection management protocol for stateful inspection firewalls in multi-homed networks. J. Commun. Networks 10(4): 455-464 (2008) - [c47]Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee:
Network Level Privacy for Wireless Sensor Networks. IAS 2008: 261-266 - [c46]Sunghyun Kim, Heejo Lee:
Reducing Payload Scans for Attack Signature Matching Using Rule Classification. ACISP 2008: 350-360 - [c45]Kyoochang Jeong, Heejo Lee:
Code Graph for Malware Detection. ICOIN 2008: 1-5 - [c44]Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee:
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. ICYCS 2008: 2038-2043 - [c43]Le Xuan Hung, Hassan Jameel, Riaz Ahmed Shaikh, Syed Muhammad Khaliq-ur-Rahman Raazi, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung:
Activity-based Security Scheme for Ubiquitous Environments. IPCCC 2008: 475-481 - [c42]Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim:
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. ISPEC 2008: 176-187 - [c41]Minjin Kwon, Kyoochang Jeong, Heejo Lee:
PROBE: A Process Behavior-Based Host Intrusion Prevention System. ISPEC 2008: 203-217 - [c40]Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng:
Distinguishing between FE and DDoS Using Randomness Check. ISC 2008: 131-145 - [c39]Dongwon Seo, Heejo Lee, Ejovi Nuwere:
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models. SEC 2008: 397-411 - [c38]Jeheon Han, Jonghoon Kwon, Heejo Lee:
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. SEC 2008: 669-673 - [c37]Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Weiwei Yuan, Syed Muhammad Khaliq-ur-Rahman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes:
Image-Feature Based Human Identification Protocols on Limited Display Devices. WISA 2008: 211-224 - 2007
- [j11]Hyogon Kim, Heejo Lee, Sangmin Shin:
On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. IEICE Trans. Commun. 90-B(2): 412-416 (2007) - [j10]Hyundo Park, Heejo Lee, Hyogon Kim:
Detecting Unknown Worms Using Randomness Check. IEICE Trans. Commun. 90-B(4): 894-903 (2007) - [j9]Hyogon Kim, Sangki Yun, Heejo Lee:
Boosting VoIP Capacity of Wireless Mesh Networks through Lazy Frame Aggregation. IEICE Trans. Commun. 90-B(5): 1283-1285 (2007) - [j8]Hyogon Kim, Jongwon Yoon, Heejo Lee:
Error Bound of Collision Probability Estimation in Non-saturated IEEE 802.11 WLANs. IEICE Trans. Commun. 90-B(7): 1884-1885 (2007) - [j7]Wan Yeon Lee, Heejo Lee:
Evaluation of authentication interworking methods among multiple WLAN service providers. Int. J. Commun. Syst. 20(5): 515-531 (2007) - [j6]Sangki Yun, Hyogon Kim, Heejo Lee, Inhye Kang:
100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs. IEEE J. Sel. Areas Commun. 25(4): 689-698 (2007) - [c36]Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim:
Botnet Detection by Monitoring Group Activities in DNS Traffic. CIT 2007: 715-720 - [c35]Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee:
Cyber Threat Trend Analysis Model Using HMM. IAS 2007: 177-182 - [c34]Tran Van Phuong, Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee, Heejo Lee:
Transmission Time-Based Mechanism to Detect Wormhole Attacks. APSCC 2007: 172-178 - [c33]Tran Van Phuong, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee, Heejo Lee:
TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks. CCNC 2007: 593-598 - [c32]Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig:
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. AsiaCCS 2007: 20-31 - [c31]Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Contextual Risk-Based Access Control. Security and Management 2007: 406-412 - [c30]Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee:
Human Identification Through Image Evaluation Using Secret Predicates. CT-RSA 2007: 67-84 - [c29]Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Enforcing Access Control Using Risk Assessment. ECUMN 2007: 419-424 - [c28]Wan Yeon Lee, Heejo Lee, Hyogon Kim:
Energy-Aware QoS Adjustment of Multimedia Tasks with Uncertain Execution Time. International Conference on Computational Science (4) 2007: 709-712 - [c27]Soo Kim, JeongGil Ko, Jongwon Yoon, Heejo Lee:
Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations. ICOIN 2007: 584-593 - [c26]Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Sungyoung Lee, Heejo Lee:
A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks. ICON 2007: 188-193 - [c25]Pho Duc Giang, Le Xuan Hung, Riaz Ahmed Shaikh, Yonil Zhung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments. ICPS 2007: 149-152 - [c24]Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Bayesian memory-based reputation system. MobiMedia 2007: 9 - [c23]Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam:
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission. MUE 2007: 60-65 - [c22]Pho Duc Giang, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems. MUE 2007: 698-703 - [c21]Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments. RTCSA 2007: 482-487 - [c20]Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Activity-based Access Control Model to Hospital Information. RTCSA 2007: 488-496 - [c19]ChangHee Lee, Heejo Lee:
A password stretching method using user specific salts. WWW 2007: 1215-1216 - [i1]Hassan Jameel, Heejo Lee, Sungyoung Lee:
Using Image Attributes for Human Identification Protocols. CoRR abs/0704.2295 (2007) - 2006
- [j5]Wan Yeon Lee, Heejo Lee:
Optimal Scheduling for Real-Time Parallel Tasks. IEICE Trans. Inf. Syst. 89-D(6): 1962-1966 (2006) - [j4]Heejo Lee, Jong Kim, Wan Yeon Lee:
Resiliency of Network Topologies under Path-Based Attacks. IEICE Trans. Commun. 89-B(10): 2878-2884 (2006) - [c18]Soo Kim, Heejo Lee, Wan Yeon Lee:
Improving Resiliency of Network Topology with Enhanced Evolving Strategies. CIT 2006: 149 - [c17]Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee, Yoojae Won:
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition. CIT 2006: 163 - [c16]Hyogon Kim, Sangki Yun, Heejo Lee, Inhye Kang, Kyu-Young Choi:
A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs. GLOBECOM 2006 - [c15]Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. ICISS 2006: 357-360 - [c14]Hyundo Park, Heejo Lee:
Detecting Unknown Worms Using Randomness Check. ICOIN 2006: 775-784 - [c13]Hyogon Kim, Heejo Lee, Sangmin Shin, Inhye Kang:
On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. VTC Fall 2006: 1-6 - [c12]Sangki Yun, Hyogon Kim, Heejo Lee, Inhye Kang:
Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation. VTC Fall 2006: 1-5 - [c11]Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks. WISI 2006: 163-164 - 2005
- [c10]Hyunsang Choi, Heejo Lee:
PCAV: Internet Attack Visualization on Parallel Coordinates. ICICS 2005: 454-466 - [c9]O-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim, Sang Cheon Kim, Gun Woo Nam, Joong Gil Park:
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities. ICOIN 2005: 652-661 - [c8]Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee:
Defending a Web Browser Against Spying with Browser Helper Objects. ISI 2005: 638-639 - 2004
- [c7]Jin-Ho Kim, Saewoong Bahk, Heejo Lee:
A connection management protocol for stateful inspection firewalls in multi-homed networks. ICC 2004: 1887-1891 - [c6]Heejo Lee, Jong Kim:
Attack Resiliency of Network Topologies. PDCAT 2004: 638-641 - 2003
- [j3]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization. Parallel Comput. 29(1): 135-159 (2003) - [j2]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems. IEEE Trans. Parallel Distributed Syst. 14(4): 394-407 (2003) - 2001
- [c5]Heejo Lee, Kihong Park:
On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack. INFOCOM 2001: 338-347 - [c4]Kihong Park, Heejo Lee:
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. SIGCOMM 2001: 15-26 - 2000
- [c3]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization. SAC (2) 2000: 641-648
1990 – 1999
- 1997
- [j1]Jong Kim, Heejo Lee, Sunggu Lee:
Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. IEEE Trans. Computers 46(4): 499-505 (1997) - 1995
- [c2]Jong Kim, Heejo Lee, Sunggu Lee:
Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. FTCS 1995: 174-183 - [c1]Heejo Lee, Kenji Toda, Jong Kim, Kenji Nishida, Eiichi Takahashi, Yoshinori Yamaguchi:
Performance comparison of real-time architectures using simulation. RTCSA 1995: 150-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint