Researcher Page

사진

Kim, Se-Hun (김세헌) C-1856-2011

Department
Department of Industrial & Systems Engineering(산업및시스템공학과)
Co-author
Collaboration Network Collaboration Network
Website
http://tslab.kaist.ac.krHomePage
Research Area
IDS (Intrusion Detection System) Development, Telecommunication Network Operation Control System, Information Security Management,Mobile Communication System

Keyword Cloud

Reload 더보기
1

ISMS 인증 기대 요인 및 인증 의도에 관한 연구

박경태; 김세헌researcher한국정보보호학회정보보호학회논문지, v.25, no.2, pp.375 - 381, 2015-04

2

정보보호 관리체계(ISMS) 인증을 위한컨설팅 업체 선정 요인에 관한 연구

박경태; 김세헌researcher한국정보보호학회정보보호학회논문지, v.24, no.6, pp.1309 - 1318, 2014-12

3

탐색적 요인 분석을 이용한 기업의 ISMS 인증 시장애요인에 관한 연구

박경태; 김세헌researcher한국정보보호학회정보보호학회논문지, v.24, no.5, pp.951 - 959, 2014-10

4

개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업및 소상공인을 중심으로

박경태; 김세헌researcher한국정보보호학회정보보호학회논문지, v.24, no.5, pp.911 - 918, 2014-10

5

A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

Kim, Gisung; Lee, Seungmin; Kim, SehunresearcherPERGAMON-ELSEVIER SCIENCE LTDEXPERT SYSTEMS WITH APPLICATIONS, v.41, no.4, pp.1690 - 1700, 2014-03

6

Advanced probabilistic approach for network intrusion forecasting and detection

Shin, Seongjun; Lee, Seungmin; Kim, Hyunwoo; Kim, SehunresearcherPERGAMON-ELSEVIER SCIENCE LTDEXPERT SYSTEMS WITH APPLICATIONS, v.40, no.1, pp.315 - 322, 2013-01

7

A Counterattack- Detection Scheme in Transmission Time-Based Wormhole Detection Methods

Kim, Dong-uk; Kim, Hyo-won; Kim, Gisung; Kim, SehunresearcherHINDAWI PUBLISHING CORPORATIONINTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013 View PDF (1767kb)

8

취약점의 권한 획득 정도에 따른 웹 애플리케이션 취약성 수치화 프레임워크

조성영; 유수연; 전상훈; 임채호; 김세헌researcher한국정보보호학회정보보호학회논문지, v.22, no.3, pp.601 - 613, 2012-06

9

A Congestion-Aware IDS Node Selection Method for Wireless Sensor Networks

Choi, Jae-Un; Kim, Gi-Sung; Kim, Se-HunresearcherHINDAWI PUBLISHING CORPORATIONINTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, v.2012, 2012 View PDF (617kb)

10

Sequence-order-independent network profiling for detecting application layer DDoS attacks

Lee, Sang-Jae; Kim, Gi-Sung; Kim, Se-HunresearcherSPRINGER INTERNATIONAL PUBLISHING AGEURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, v.2011, no.50, 2011-08

11

Self-adaptive and dynamic clustering for online anomaly detection

Lee, Seung-Min; Kim, Gi-Sung; Kim, Se-HunresearcherPERGAMON-ELSEVIER SCIENCE LTDEXPERT SYSTEMS WITH APPLICATIONS, v.38, no.12, pp.14891 - 14898, 2011

12

A distributed sinkhole detection method using cluster analysis

Shim, Woo-Chul; Kim, Gi-Sung; Kim, Se-HunresearcherPERGAMON-ELSEVIER SCIENCE LTDEXPERT SYSTEMS WITH APPLICATIONS, v.37, pp.8486 - 8491, 2010-12

13

Feature Construction Scheme for Efficient Intrusion Detection System

Kim, E; Lee, S; Kwon, K; Kim, SehunresearcherINST INFORMATION SCIENCEJOURNAL OF INFORMATION SCIENCE AND ENGINEERING, v.26, pp.527 - 547, 2010-03

14

Fairness-Aware Resource Allocation in a Cooperative OFDMA Uplink System

Shim, Woo-Chul; Han, Young-Goo; Kim, Se-HunresearcherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.59, no.2, pp.932 - 939, 2010-02

15

A cooperative-sinkhole detection method for mobile ad hoc networks

Kim, Gi-Sung; Han, Young-Goo; Kim, Se-HunresearcherELSEVIER GMBHAEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, v.64, no.5, pp.390 - 397, 2010

16

Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases

Lee, Seungmin; Park, The-Jun; Lee, Donghyeok; Nam, Taekyong; Kim, SehunresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E92D, no.11, pp.2207 - 2217, 2009-11

17

Hierarchical System for Objectionable Video Detection

Lee, Seung-Min; Shim, Woo-Chul; Kim, Se-HunresearcherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON CONSUMER ELECTRONICS, v.55, no.2, pp.677 - 684, 2009-05

18

The Capacity of Downlink Multiuser OFDM with Quality Based CSI Feedback

Kim, Jongin; Kim, Dongwoo; Kim, SehunresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON COMMUNICATIONS, v.E92B, pp.1252 - 1257, 2009-04

19

A Goal Programming Approach for Resource Allocation Considering Client Demands in a Multiuser OFDMA Downlink System

Han, Young-Goo; Shim, Woo-Chul; Kim, Se-HunresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON COMMUNICATIONS, v.E92B, no.4, pp.1376 - 1379, 2009-04 View PDF (110kb)

20

An Adjustable Scheduling Algorithm for Multi-User MIMO Systems

Kim, Jae-Hong; Lee, Sang-Jae; Kim, Se-HunresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON COMMUNICATIONS, v.E92B, pp.527 - 532, 2009-02 View PDF (273kb)

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0