Researcher Page

사진
Kim, Kwangjo (김광조)
교수, (전산학부)
Research Area
Authentication, Network Security, Industrial Security, SCADA security
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    1
    Two-Dimensional Projection-Based Wireless Intrusion Classification Using Lightweight EfficientNet

    Aminanto, Muhamad Erza; Purbomukti, Ibnu Rifqi; Chandra, Harry; et al, CMC-COMPUTERS MATERIALS & CONTINUA, v.72, no.3, pp.5301 - 5314, 2022

    2
    Multi-Class Intrusion Detection Using Two-Channel Color Mapping in IEEE 802.11 Wireless Network

    Aminanto, Muhamad Erza; Wicaksono, R. Satrio Hariomurti; Aminanto, Achmad Eriza; et al, IEEE ACCESS, v.10, pp.36791 - 36801, 2022

    3
    Privacy-Preserving Deep Learning on Machine Learning as a Service-a Comprehensive Survey

    Tanuwidjaja, Harry Chandra; Choi, Rakyong; Baek, Seunggeun; et al, IEEE ACCESS, v.8, pp.167425 - 167447, 2020-09

    4
    Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network

    Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.7, pp.1433 - 1447, 2020-07

    5
    A Compendium of Practices for Central Bank Digital Currencies for Multinational Financial Infrastructures

    Opare, Edwin Ayisi; Kim, Kwangjo, IEEE ACCESS, v.8, pp.110810 - 110847, 2020-06

    6
    Advances in Security Research in the Asiacrypt Region

    Phan, Raphael C. W.; Abe, Masayuki; Batten, Lynn; et al, COMMUNICATIONS OF THE ACM, v.64, no.4, pp.78 - 81, 2020-03

    7
    애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법

    조준완; 이지은; 김광조, 정보보호학회논문지, v.29, no.4, pp.719 - 728, 2019-08

    8
    Post-quantum security of IGE mode encryption in Telegram

    Lee, Jeeun; Kim, Sungsook; Lee, Seunghyun; et al, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS, COMMUNICATIONS AND COMPUTER SCIENCES, v.E102-A, no.1, pp.148 - 151, 2019-01

    9
    eMotion: An SGX extension for migrating enclaves

    Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoon; et al, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

    10
    Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

    Aminanto, Muhamad Erza; Choi, Rakyong; Tanuwidjaja, Harry Chandra; et al, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.13, no.3, pp.621 - 636, 2018-03

    11
    암호와 정보보호

    김광조, 학문연구의 동향과 쟁점 - 전기공학, 전자공학, 정보통신공학, v.7, 2018-01

    12
    Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

    Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; et al, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12

    13
    양자 컴퓨터 공격에 안전한 격자 기반키 교환 방식의 비교

    최락용; 안형철; 이지은; et al, 한국통신학회논문지, v.42, no.11, pp.2200 - 2207, 2017-11

    14
    Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm

    Aminanto, Muhamad Erza; Kim, Hakju; Kim, Kyung-Min; et al, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.1, pp.176 - 183, 2017-01

    15
    Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

    Omar Y. Al-Jarrah; Omar Alhussein; Paul D. Yoo; et al, IEEE TRANSACTIONS ON CYBERNETICS, v.46, no.8, pp.1796 - 1806, 2016-08

    16
    Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework

    Huseynov, Khalid; Yoo, Paul D.; 김광조, 정보보호학회논문지, v.25, no.4, pp.807 - 816, 2015-08

    17
    Differentially private client-side data deduplication protocol for cloud storage services

    Shin, Youngjoo; Kim, Kwangjo, SECURITY AND COMMUNICATION NETWORKS, v.8, no.12, pp.2114 - 2123, 2015-08

    18
    조직의 실시간 보안관리 체계 확립을 위한 ‘인터페이스 보안’ 강화에 대한 연구

    박준정; 김소라; 안수현; et al, 정보처리학회논문지. 컴퓨터 및 통신시스템, v.4, no.5, pp.171 - 176, 2015-05

    19
    Identity-based chameleon hashing and signatures without key exposure

    Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; et al, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

    20
    escar 회의 등을 통한 각국의 자동차 보안 기술 동향 연구

    김광조; 이동수, 한국정보보호학회지, v.24, no.2, pp.7 - 20, 2014-04

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0