Researcher Page

사진

Kim, Se-Hun (김세헌) C-1856-2011

Department
Department of Industrial & Systems Engineering(산업및시스템공학과)
Website
http://tslab.kaist.ac.krHomePage
Research Area
IDS (Intrusion Detection System) Development, Telecommunication Network Operation Control System, Information Security Management,Mobile Communication System

Keyword Cloud

Reload 더보기
1

ISMS 인증 기대 요인 및 인증 의도에 관한 연구

박경태; 김세헌researcher, 정보보호학회논문지, v.25, no.2, pp.375 - 381, 2015-04

2

정보보호 관리체계(ISMS) 인증을 위한컨설팅 업체 선정 요인에 관한 연구

박경태; 김세헌researcher, 정보보호학회논문지, v.24, no.6, pp.1309 - 1318, 2014-12

3

탐색적 요인 분석을 이용한 기업의 ISMS 인증 시장애요인에 관한 연구

박경태; 김세헌researcher, 정보보호학회논문지, v.24, no.5, pp.951 - 959, 2014-10

4

개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업및 소상공인을 중심으로

박경태; 김세헌researcher, 정보보호학회논문지, v.24, no.5, pp.911 - 918, 2014-10

5

A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

Kim, Gisung; Lee, Seungmin; Kim, Sehunresearcher, EXPERT SYSTEMS WITH APPLICATIONS, v.41, no.4, pp.1690 - 1700, 2014-03

6

Advanced probabilistic approach for network intrusion forecasting and detection

Shin, Seongjun; Lee, Seungmin; Kim, Hyunwoo; et al, EXPERT SYSTEMS WITH APPLICATIONS, v.40, no.1, pp.315 - 322, 2013-01

7

A Counterattack- Detection Scheme in Transmission Time-Based Wormhole Detection Methods

Kim, Dong-uk; Kim, Hyo-won; Kim, Gisung; et al, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013

8

취약점의 권한 획득 정도에 따른 웹 애플리케이션 취약성 수치화 프레임워크

조성영; 유수연; 전상훈; et al, 정보보호학회논문지, v.22, no.3, pp.601 - 613, 2012-06

9

An Efficient Filtering Method for Detecting Malicous Web Pages

Choi, Jaeun; KIm, Gisung; KIm, Tae Ghyoon; et al, Information Security Applications, v.7690, pp.241 - 253, 2012

10

A Congestion-Aware IDS Node Selection Method for Wireless Sensor Networks

Choi, Jae-Un; Kim, Gi-Sung; Kim, Se-Hunresearcher, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, v.2012, 2012

11

Sequence-order-independent network profiling for detecting application layer DDoS attacks

Lee, Sang-Jae; Kim, Gi-Sung; Kim, Se-Hunresearcher, EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, v.2011, no.50, 2011-08

12

Self-adaptive and dynamic clustering for online anomaly detection

Lee, Seung-Min; Kim, Gi-Sung; Kim, Se-Hunresearcher, EXPERT SYSTEMS WITH APPLICATIONS, v.38, no.12, pp.14891 - 14898, 2011

13

A distributed sinkhole detection method using cluster analysis

Shim, Woo-Chul; Kim, Gi-Sung; Kim, Se-Hunresearcher, EXPERT SYSTEMS WITH APPLICATIONS, v.37, pp.8486 - 8491, 2010-12

14

Feature Construction Scheme for Efficient Intrusion Detection System

Kim, E; Lee, S; Kwon, K; et al, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, v.26, pp.527 - 547, 2010-03

15

Fairness-Aware Resource Allocation in a Cooperative OFDMA Uplink System

Shim, Woo-Chul; Han, Young-Goo; Kim, Se-Hunresearcher, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.59, no.2, pp.932 - 939, 2010-02

16

A cooperative-sinkhole detection method for mobile ad hoc networks

Kim, Gi-Sung; Han, Young-Goo; Kim, Se-Hunresearcher, AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, v.64, no.5, pp.390 - 397, 2010

17

Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases

Lee, Seungmin; Park, The-Jun; Lee, Donghyeok; et al, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E92D, no.11, pp.2207 - 2217, 2009-11

18

Hierarchical System for Objectionable Video Detection

Lee, Seung-Min; Shim, Woo-Chul; Kim, Se-Hunresearcher, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, v.55, no.2, pp.677 - 684, 2009-05

19

The Capacity of Downlink Multiuser OFDM with Quality Based CSI Feedback

Kim, Jongin; Kim, Dongwoo; Kim, Sehunresearcher, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E92B, pp.1252 - 1257, 2009-04

20

A Goal Programming Approach for Resource Allocation Considering Client Demands in a Multiuser OFDMA Downlink System

Han, Young-Goo; Shim, Woo-Chul; Kim, Se-Hunresearcher, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E92B, no.4, pp.1376 - 1379, 2009-04

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0