Byoung-Koo Kim

According to our database1, Byoung-Koo Kim authored at least 26 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security enhancement scheme for mobile device using H/W cryptographic module.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

2022
Enhancing IoT security with PUF-based authentication scheme.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Reinforcement of IoT Open Platform Security using PUF -based Device Authentication.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
Multiple PUF-based lightweight authentication method in the IoT.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

PUF-based IoT Device Authentication Scheme on IoT Open Platform.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

2020
PUF-based Authentication Scheme for IoT Devices.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Secure IoT Device Authentication Scheme using Key Hiding Technology.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2019
Security Enhancement for IoT Device using Physical Unclonable Functions.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

PUF based IoT Device Authentication Scheme.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
Abnormal Traffic Detection Mechanism for Protecting IIoT Environments.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2017
Design of unidirectional security gateway system for secure monitoring of OPC-UA data.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

2014
Design of Industrial Firewall System Based on Multiple Access Control Filter.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

Whitelist Generation Technique for Industrial Firewall in SCADA Networks.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2012
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Network-based Executable File Extraction and Analysis for Malware Detection.
Proceedings of the SECRYPT 2012, 2012

Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2009
Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009

Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection.
Proceedings of the 2009 International Conference on Security & Management, 2009

2007
Memory-efficient content filtering hardware for high-speed intrusion detection systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

High Performance Session State Management Scheme for Stateful Packet Inspection.
Proceedings of the Managing Next Generation Networks and Services, 2007

ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
FPGA Based Intrusion Detection System Against Unknown and Known Attacks.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Design and Implementation of FPGA Based High-Performance Intrusion Detection System.
Proceedings of the Intelligence and Security Informatics, 2006

2004
Design and Implementation of High-Performance Intrusion Detection System.
Proceedings of the Computational Science and Its Applications, 2004

Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System.
Proceedings of the Computational Science and Its Applications, 2004

2002
Design of Network Security Control System for Cooperative Intrusion Detection.
Proceedings of the Information Networking, 2002


  Loading...