Cheol Won Lee

According to our database1, Cheol Won Lee authored at least 13 papers between 1998 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

2017
Toward a Cyber Resilient and Secure Microgrid Using Software-Defined Networking.
IEEE Trans. Smart Grid, 2017

Reproducible network research with a high-fidelity software-defined network testbed.
Proceedings of the 2017 Winter Simulation Conference, 2017

A hardware-in-the-loop emulation testbed for high fidelity and reproducible network experiments.
Proceedings of the 2017 Winter Simulation Conference, 2017

2016
Convenus: Congestion verification of network updates in software-defined networks.
Proceedings of the Winter Simulation Conference, WSC 2016, 2016

2013
Prevention of malware propagation in AMI.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

2012
The Not-So-Smart Grid: Preliminary work on identifying vulnerabilities in ANSI C12.22.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2007
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures.
Proceedings of the Computational Science and Its Applications, 2007

2004
A Source Identification Scheme against DDoS Attacks in Cluster Interconnects.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

2003
Intrusion-Tolerant System Design for Web Server Survivability.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

2002
Analysis of System Performance by Changing the Ring Architecture on the Dual Ring CC-NUMA System.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

2001
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

1998
A study on appliance of role based access control model using role attributes.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998


  Loading...