Search Results - "Jungchan Na"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks by Kang, DongHo, Kim, ByoungKoo, Na, JungChan, Jhang, KyoungSon

    Published in Journal of Applied Mathematics (01-01-2014)
    “…Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. Recently IoT technologies begin to…”
    Get full text
    Journal Article
  2. 2

    Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid by Choi, Kyung, Chen, Xinyi, Li, Shi, Kim, Mihui, Chae, Kijoon

    Published in Energies (Basel) (01-10-2012)
    “…In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC…”
    Get full text
    Journal Article
  3. 3

    Development of unidirectional security gateway appliance using intel 82580EB NIC interface by Youngjun Heo, Jungchan Na

    “…Recently, cyber-attacks are increasingly targeting industrial control system facilities such as Stuxnet, Duke, and Flame. In order to protect these facilities…”
    Get full text
    Conference Proceeding
  4. 4

    Secure firmware architecture using virtual hard disks by Jaebum Sim, Jungchan Na

    “…Recently, smart devices have rapidly become ubiquitous; however, vulnerability attacks that target the devices' firmware have increased apace. Despite efforts…”
    Get full text
    Conference Proceeding
  5. 5

    A design of unidirectional security gateway for enforcement reliability and security of transmission data in industrial control systems by Youngjun Heo, Byoungkoo Kim, Dongho Kang, Jungchan Na

    “…Recently, targeted attacks are increased against industrial control system facilities. In order to protect these facilities from attacks, defence-in-depth…”
    Get full text
    Conference Proceeding
  6. 6

    Security Requirement for Cyber Attack Traceback by Jongho Ryu, Jungchan Na

    “…This paper aims at providing definition of technology to track the origin of the attacking programs such as hacking and viruses. In addition, it offers the…”
    Get full text
    Conference Proceeding
  7. 7

    An Efficient Algorithm for Intrusion Source Identification by Jonghyun Kim, Jungchan Na

    “…There has been a growing interest in the design and development of intrusion detection systems for the Internet. One of the goals of these systems is to detect…”
    Get full text
    Conference Proceeding
  8. 8

    Design and implementation of policy decision point in policy-based network by Kim, Geonlyang, Kim, Jinoh, Na, Jungchan

    “…As users of network have become increasing, the supply of network-based services has activated and the necessity of a solution considering scale and speed of…”
    Get full text
    Conference Proceeding
  9. 9

    A secure method for transferring active packet using digital signature schemes by Youngsoo Kim, Jungchan Na, Seungwon Sohn

    “…Active networks represent a new approach to network architecture. Active networks provide a much more flexible network infrastructure than traditional networks…”
    Get full text
    Conference Proceeding
  10. 10

    A design of unidirectional security gateway for enforcement reliability and security of transmission data in industrial control systems by Heo, Youngjun, Kim, Byoungkoo, Kang, Dongho, Na, Jungchan

    “…Recently, targeted attacks are increased against industrial control system facilities. In order to protect these facilities from attacks, defence-in-depth…”
    Get full text
    Conference Proceeding
  11. 11

    Hash Function with Variable Output Length by JongHo Ryu, JungChan Na

    “…A hashing function is the mathematically complex algorithm that compresses an arbitrary input message into a fixed-length value, and it can be applicable for…”
    Get full text
    Conference Proceeding
  12. 12

    Information-Revealing with Distributed Escrow Authorities by JongHo Ryu, JungChan Na

    “…This paper present an alternative scheme to key escrow scheme which allows probabilistic law enforcement access to reveal the encrypted communications. Namely,…”
    Get full text
    Conference Proceeding
  13. 13

    Comparisons analysis of Security Vulnerabilities for Security Enforcement in IPv4/IPv6 by Hayoung Oh, Kijoon Chae, HyoChan Bang, JungChan Na

    “…When IPv6 were defined, it was assumed that the local link would consist of mutually trusting nodes. Even though the actual link may still be somewhat…”
    Get full text
    Conference Proceeding
  14. 14

    Abnormal traffic detection and its implementation by SooHyung Lee, HyunJu Kim, JungChan Na, JongSu Jang

    “…Wide spread of Internet usage has introduced many network security threats, and the recent trend of attack is to cause serious network performance degradation…”
    Get full text
    Conference Proceeding
  15. 15

    The reliable distributed network management platform by Soomyung Park, Sangjoon Ahn, Sunyoung Han, Wooyong Han, Jungchan Na

    “…Outgrowth of the development of distributed computer environment has caused local resources to be connected and shared by means of networks. A user can utilize…”
    Get full text
    Conference Proceeding
  16. 16

    A prototype implementation of performance management in HANURI/M by Jungchan Na, Kyeongbeom Kim, Dukjoo Son, Myungjoon Kim

    “…In a distributed processing environment, good management tools make the environment very reliable. We have developed a prototype of distributed systems…”
    Get full text
    Conference Proceeding
  17. 17

    Practical network attack situation analysis using sliding window cache scheme by Jinoh Kim, Koohong Kang, JungChan Na, Ikkyun Kim, Kiyoung Kim, Jongsoo Jang, Sungwon Sohn

    “…With the growing deployment of intrusion detection systems, managing reports from these systems become critically important. In situations where there are…”
    Get full text
    Conference Proceeding