A Cheating Attack on a Whitelist-based Anti-Ransomware Solution and its Countermeasure SB Cheon, GY Choi, DY Kim 2023 IEEE International Conference on Consumer Electronics (ICCE), 01-04, 2023 | 5 | 2023 |
Hierarchical Threads Generation-based Bypassing Attack on DLL Injection Monitoring System DY Kim Journal of IKEEE 27 (3), 239-245, 2023 | | 2023 |
The Shortest Verification Path of the MHT Scheme for Verifying Distributed Data JL DaeYoub Kim Applied Sciences 12 (21), 2022 | | 2022 |
A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme DY Kim Journal of IKEEE 26 (3), 380-388, 2022 | | 2022 |
PE 파일 분석을 위한 함수 호출 그래프 생성 연구 DY Kim 전기전자학회논문지 25 (3), 451-461, 2021 | | 2021 |
A reverse hash chain path-based access control scheme for a connected smart home system DY Kim, J Lee IEEE Consumer Electronics Magazine 10 (1), 93-100, 2020 | 6 | 2020 |
Blacklist vs. whitelist-based ransomware solutions DY Kim, J Lee IEEE Consumer Electronics Magazine 9 (3), 22-28, 2020 | 23 | 2020 |
An ndn cache management for mec DY Kim, J Lee Applied Sciences 10 (3), 896, 2020 | 5 | 2020 |
A reverse sequence hash chain-based access control for a smart home system DY Kim 2020 IEEE International Conference on Consumer Electronics (ICCE), 1-4, 2020 | 6 | 2020 |
Zone-based multi-access edge computing scheme for user device mobility management J Lee, D Kim, J Lee Applied Sciences 9 (11), 2308, 2019 | 20 | 2019 |
Efficient and secure device clustering for networked home domains D Kim, J Lee IEEE Transactions on Consumer Electronics 65 (2), 224-232, 2019 | 8 | 2019 |
The Error Occurrence and Its Impact Analysis of Improved MHT Operation for CCN Content Authentication DY Kim Journal of IKEEE 23 (2), 479-486, 2019 | | 2019 |
Mobile edge computing based immersive virtual reality streaming scheme J Lee, D Kim, J Lee Computing and Informatics 38 (5), 1131–1148-1131–1148, 2019 | 4 | 2019 |
Efficient and secure device clustering for networked home domains DYKJH Lee 2018 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2018 | | 2018 |
White list-based ransomware real-time detection and prevention for user device protection DY Kim, GY Choi, JH Lee 2018 IEEE International Conference on Consumer Electronics (ICCE), 1-5, 2018 | 19 | 2018 |
The Shortest Authentication Path for Performance Improvement of MHT DY Kim 정보처리학회논문지/컴퓨터 및 통신 시스템 제 7 (9), 9, 2018 | | 2018 |
분산 네트워크 환경에서의 MHT 콘텐츠 인증 기술 성능 개선을 위한 최소 인증 경로에 관한 연구 김대엽 정보처리학회논문지. 컴퓨터 및 통신시스템 7 (9), 235-242, 2018 | | 2018 |
A Blockchain-Based Content Authentication Scheme for CCN DY Kim Journal of the Korea Institute of Information Security & Cryptology 28 (4 …, 2018 | | 2018 |
The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment DY Kim KIPS Transactions on Computer and Communication Systems 7 (9), 235-242, 2018 | 1 | 2018 |
Network Overhead Improvement for MHT-based Content Authentication Scheme DY Kim Journal of Digital Convergence 16 (1), 271-279, 2018 | 3 | 2018 |