팔로우
DaeYoub Kim
DaeYoub Kim
Associate Professor, The dept. of Information Security, Suwon Univ.
suwon.ac.kr의 이메일 확인됨
제목
인용
연도
A Cheating Attack on a Whitelist-based Anti-Ransomware Solution and its Countermeasure
SB Cheon, GY Choi, DY Kim
2023 IEEE International Conference on Consumer Electronics (ICCE), 01-04, 2023
52023
Hierarchical Threads Generation-based Bypassing Attack on DLL Injection Monitoring System
DY Kim
Journal of IKEEE 27 (3), 239-245, 2023
2023
The Shortest Verification Path of the MHT Scheme for Verifying Distributed Data
JL DaeYoub Kim
Applied Sciences 12 (21), 2022
2022
A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme
DY Kim
Journal of IKEEE 26 (3), 380-388, 2022
2022
PE 파일 분석을 위한 함수 호출 그래프 생성 연구
DY Kim
전기전자학회논문지 25 (3), 451-461, 2021
2021
A reverse hash chain path-based access control scheme for a connected smart home system
DY Kim, J Lee
IEEE Consumer Electronics Magazine 10 (1), 93-100, 2020
62020
Blacklist vs. whitelist-based ransomware solutions
DY Kim, J Lee
IEEE Consumer Electronics Magazine 9 (3), 22-28, 2020
232020
An ndn cache management for mec
DY Kim, J Lee
Applied Sciences 10 (3), 896, 2020
52020
A reverse sequence hash chain-based access control for a smart home system
DY Kim
2020 IEEE International Conference on Consumer Electronics (ICCE), 1-4, 2020
62020
Zone-based multi-access edge computing scheme for user device mobility management
J Lee, D Kim, J Lee
Applied Sciences 9 (11), 2308, 2019
202019
Efficient and secure device clustering for networked home domains
D Kim, J Lee
IEEE Transactions on Consumer Electronics 65 (2), 224-232, 2019
82019
The Error Occurrence and Its Impact Analysis of Improved MHT Operation for CCN Content Authentication
DY Kim
Journal of IKEEE 23 (2), 479-486, 2019
2019
Mobile edge computing based immersive virtual reality streaming scheme
J Lee, D Kim, J Lee
Computing and Informatics 38 (5), 1131–1148-1131–1148, 2019
42019
Efficient and secure device clustering for networked home domains
DYKJH Lee
2018 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2018
2018
White list-based ransomware real-time detection and prevention for user device protection
DY Kim, GY Choi, JH Lee
2018 IEEE International Conference on Consumer Electronics (ICCE), 1-5, 2018
192018
The Shortest Authentication Path for Performance Improvement of MHT
DY Kim
정보처리학회논문지/컴퓨터 및 통신 시스템 제 7 (9), 9, 2018
2018
분산 네트워크 환경에서의 MHT 콘텐츠 인증 기술 성능 개선을 위한 최소 인증 경로에 관한 연구
김대엽
정보처리학회논문지. 컴퓨터 및 통신시스템 7 (9), 235-242, 2018
2018
A Blockchain-Based Content Authentication Scheme for CCN
DY Kim
Journal of the Korea Institute of Information Security & Cryptology 28 (4 …, 2018
2018
The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment
DY Kim
KIPS Transactions on Computer and Communication Systems 7 (9), 235-242, 2018
12018
Network Overhead Improvement for MHT-based Content Authentication Scheme
DY Kim
Journal of Digital Convergence 16 (1), 271-279, 2018
32018
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20