Researcher Page

사진
Kim, Se-Hun (김세헌)
명예교수, Department of Industrial & Systems Engineering(산업및시스템공학과)
Research Area
IDS (Intrusion Detection System) Development, Telecommunication Network Operation Control System, Information Security Management,Mobile Communication System
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) Altmetrics
    1
    Article
    ISMS 인증 기대 요인 및 인증 의도에 관한 연구

    박경태; 김세헌researcher, 정보보호학회논문지, v.25, no.2, pp.375 - 381, 2015-04

    2
    Article
    정보보호 관리체계(ISMS) 인증을 위한컨설팅 업체 선정 요인에 관한 연구

    박경태; 김세헌researcher, 정보보호학회논문지, v.24, no.6, pp.1309 - 1318, 2014-12

    3
    Article
    개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업및 소상공인을 중심으로

    박경태; 김세헌researcher, 정보보호학회논문지, v.24, no.5, pp.911 - 918, 2014-10

    4
    Article
    탐색적 요인 분석을 이용한 기업의 ISMS 인증 시장애요인에 관한 연구

    박경태; 김세헌researcher, 정보보호학회논문지, v.24, no.5, pp.951 - 959, 2014-10

    5
    Article
    A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

    Kim, Gisung; Lee, Seungmin; Kim, Sehunresearcher, EXPERT SYSTEMS WITH APPLICATIONS, v.41, no.4, pp.1690 - 1700, 2014-03

    6
    Article
    Advanced probabilistic approach for network intrusion forecasting and detection

    Shin, Seongjun; Lee, Seungmin; Kim, Hyunwoo; et al, EXPERT SYSTEMS WITH APPLICATIONS, v.40, no.1, pp.315 - 322, 2013-01

    7
    Article
    A Counterattack- Detection Scheme in Transmission Time-Based Wormhole Detection Methods

    Kim, Dong-uk; Kim, Hyo-won; Kim, Gisung; et al, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013

    8
    Article
    취약점의 권한 획득 정도에 따른 웹 애플리케이션 취약성 수치화 프레임워크

    조성영; 유수연; 전상훈; et al, 정보보호학회논문지, v.22, no.3, pp.601 - 613, 2012-06

    9
    Article
    A Congestion-Aware IDS Node Selection Method for Wireless Sensor Networks

    Choi, Jae-Un; Kim, Gi-Sung; Kim, Se-Hunresearcher, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, v.2012, 2012

    10
    Article
    An Efficient Filtering Method for Detecting Malicous Web Pages

    Choi, Jaeun; KIm, Gisung; KIm, Tae Ghyoon; et al, Information Security Applications, v.7690, pp.241 - 253, 2012

    11
    Article
    Sequence-order-independent network profiling for detecting application layer DDoS attacks

    Lee, Sang-Jae; Kim, Gi-Sung; Kim, Se-Hunresearcher, EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, v.2011, no.50, 2011-08

    12
    Article
    Self-adaptive and dynamic clustering for online anomaly detection

    Lee, Seung-Min; Kim, Gi-Sung; Kim, Se-Hunresearcher, EXPERT SYSTEMS WITH APPLICATIONS, v.38, no.12, pp.14891 - 14898, 2011

    13
    Article
    A distributed sinkhole detection method using cluster analysis

    Shim, Woo-Chul; Kim, Gi-Sung; Kim, Se-Hunresearcher, EXPERT SYSTEMS WITH APPLICATIONS, v.37, pp.8486 - 8491, 2010-12

    14
    Article
    Feature Construction Scheme for Efficient Intrusion Detection System

    Kim, E; Lee, S; Kwon, K; et al, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, v.26, pp.527 - 547, 2010-03

    15
    Article
    Fairness-Aware Resource Allocation in a Cooperative OFDMA Uplink System

    Shim, Woo-Chul; Han, Young-Goo; Kim, Se-Hunresearcher, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.59, no.2, pp.932 - 939, 2010-02

    16
    Article
    A cooperative-sinkhole detection method for mobile ad hoc networks

    Kim, Gi-Sung; Han, Young-Goo; Kim, Se-Hunresearcher, AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, v.64, no.5, pp.390 - 397, 2010

    17
    Article
    Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases

    Lee, Seungmin; Park, The-Jun; Lee, Donghyeok; et al, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E92D, no.11, pp.2207 - 2217, 2009-11

    18
    Article
    Hierarchical System for Objectionable Video Detection

    Lee, Seung-Min; Shim, Woo-Chul; Kim, Se-Hunresearcher, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, v.55, no.2, pp.677 - 684, 2009-05

    19
    Article
    A Goal Programming Approach for Resource Allocation Considering Client Demands in a Multiuser OFDMA Downlink System

    Han, Young-Goo; Shim, Woo-Chul; Kim, Se-Hunresearcher, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E92B, no.4, pp.1376 - 1379, 2009-04

    20
    Article
    The Capacity of Downlink Multiuser OFDM with Quality Based CSI Feedback

    Kim, Jongin; Kim, Dongwoo; Kim, Sehunresearcher, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E92B, pp.1252 - 1257, 2009-04

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0