Search Results - "Jungchan Na"
-
1
Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks
Published in Journal of Applied Mathematics (01-01-2014)“…Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. Recently IoT technologies begin to…”
Get full text
Journal Article -
2
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
Published in Energies (Basel) (01-10-2012)“…In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC…”
Get full text
Journal Article -
3
Development of unidirectional security gateway appliance using intel 82580EB NIC interface
Published in 2016 International Conference on Information and Communication Technology Convergence (ICTC) (01-10-2016)“…Recently, cyber-attacks are increasingly targeting industrial control system facilities such as Stuxnet, Duke, and Flame. In order to protect these facilities…”
Get full text
Conference Proceeding -
4
Secure firmware architecture using virtual hard disks
Published in 2014 10th International Conference on Information Assurance and Security (01-11-2014)“…Recently, smart devices have rapidly become ubiquitous; however, vulnerability attacks that target the devices' firmware have increased apace. Despite efforts…”
Get full text
Conference Proceeding -
5
A design of unidirectional security gateway for enforcement reliability and security of transmission data in industrial control systems
Published in 2016 18th International Conference on Advanced Communication Technology (ICACT) (01-01-2016)“…Recently, targeted attacks are increased against industrial control system facilities. In order to protect these facilities from attacks, defence-in-depth…”
Get full text
Conference Proceeding -
6
Security Requirement for Cyber Attack Traceback
Published in 2008 Fourth International Conference on Networked Computing and Advanced Information Management (01-09-2008)“…This paper aims at providing definition of technology to track the origin of the attacking programs such as hacking and viruses. In addition, it offers the…”
Get full text
Conference Proceeding -
7
An Efficient Algorithm for Intrusion Source Identification
Published in 2008 Fourth International Conference on Networked Computing and Advanced Information Management (01-09-2008)“…There has been a growing interest in the design and development of intrusion detection systems for the Internet. One of the goals of these systems is to detect…”
Get full text
Conference Proceeding -
8
Design and implementation of policy decision point in policy-based network
Published in Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05) (2005)“…As users of network have become increasing, the supply of network-based services has activated and the necessity of a solution considering scale and speed of…”
Get full text
Conference Proceeding -
9
A secure method for transferring active packet using digital signature schemes
Published in 10th International Conference on Telecommunications, 2003. ICT 2003 (2003)“…Active networks represent a new approach to network architecture. Active networks provide a much more flexible network infrastructure than traditional networks…”
Get full text
Conference Proceeding -
10
A design of unidirectional security gateway for enforcement reliability and security of transmission data in industrial control systems
Published in 2016 18th International Conference on Advanced Communication Technology (ICACT) (01-01-2016)“…Recently, targeted attacks are increased against industrial control system facilities. In order to protect these facilities from attacks, defence-in-depth…”
Get full text
Conference Proceeding -
11
Hash Function with Variable Output Length
Published in 2009 Fifth International Joint Conference on INC, IMS and IDC (01-08-2009)“…A hashing function is the mathematically complex algorithm that compresses an arbitrary input message into a fixed-length value, and it can be applicable for…”
Get full text
Conference Proceeding -
12
Information-Revealing with Distributed Escrow Authorities
Published in 2009 Fifth International Joint Conference on INC, IMS and IDC (01-08-2009)“…This paper present an alternative scheme to key escrow scheme which allows probabilistic law enforcement access to reveal the encrypted communications. Namely,…”
Get full text
Conference Proceeding -
13
Comparisons analysis of Security Vulnerabilities for Security Enforcement in IPv4/IPv6
Published in 2006 8th International Conference Advanced Communication Technology (2006)“…When IPv6 were defined, it was assumed that the local link would consist of mutually trusting nodes. Even though the actual link may still be somewhat…”
Get full text
Conference Proceeding -
14
Abnormal traffic detection and its implementation
Published in The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005 (2005)“…Wide spread of Internet usage has introduced many network security threats, and the recent trend of attack is to cause serious network performance degradation…”
Get full text
Conference Proceeding -
15
The reliable distributed network management platform
Published in Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems (1995)“…Outgrowth of the development of distributed computer environment has caused local resources to be connected and shared by means of networks. A user can utilize…”
Get full text
Conference Proceeding -
16
A prototype implementation of performance management in HANURI/M
Published in Proceedings of IEEE International Workshop on System Management (1996)“…In a distributed processing environment, good management tools make the environment very reliable. We have developed a prototype of distributed systems…”
Get full text
Conference Proceeding -
17
Practical network attack situation analysis using sliding window cache scheme
Published in 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732) (2003)“…With the growing deployment of intrusion detection systems, managing reports from these systems become critically important. In situations where there are…”
Get full text
Conference Proceeding