Kyungroul Lee

Orcid: 0000-0003-1477-7569

According to our database1, Kyungroul Lee authored at least 60 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability.
Sensors, February, 2024

2023
Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing.
Sensors, April, 2023

Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.
Sensors, March, 2023

Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.
Sensors, 2023

2022
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.
Entropy, 2022

Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT.
Digit. Commun. Networks, 2022

2021
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey.
Wirel. Commun. Mob. Comput., 2021

Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT.
IEEE Access, 2021

Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Vulnerability Analysis of a Secure USB Memory: Based on a Commercial Product D.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

2020
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service.
Secur. Commun. Networks, 2020

Facilitating User Authorization from Imbalanced Data Logs of Credit Cards Using Artificial Intelligence.
Mob. Inf. Syst., 2020

Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication.
Entropy, 2020

Threats and Corrective Measures for IoT Security with Observance to Cybercrime.
CoRR, 2020

Vulnerability analysis on the image-based authentication: Through the WM_INPUT message.
Concurr. Comput. Pract. Exp., 2020

2019
True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing.
Sensors, 2019

Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems.
IEEE Access, 2019

Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication.
IEEE Access, 2019

Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

Improvement of QR Code Access Control System Based on Lamport Hash Chain.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

2018
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services.
J. Sensors, 2018

A framework for mitigating zero-day attacks in IoT.
CoRR, 2018

Ransomware prevention technique using key backup.
Concurr. Comput. Pract. Exp., 2018

TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network.
IEEE Access, 2018

Vulnerability analysis of secure USB: based on the fingerprint authentication of product B.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Vulnerability Analysis on a Secure USB: Based on a Commercial Product A.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT.
Secur. Commun. Networks, 2017

A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Security Assessment of the Image-Based Authentication Using Screen-Capture Tools.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Study on the Transaction Linkage Technique Combining the Designated Terminal.
Proceedings of the Big Data Technologies and Applications - 8th International Conference, 2017

2016
An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers.
Comput. Stand. Interfaces, 2016

Analysis on the Key Storage Mechanism of the CNG Library.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Brief Review on JTAG Security.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Analysis on Manipulation of the MAC Address and Consequent Security Threats.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

Security Assessment of Keyboard Data Based on Kaspersky Product.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Security Assessment on the Mouse Data using Mouse Loggers.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Cognitive Countermeasures against BAD USB.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Ransomware-Prevention Technique Using Key Backup.
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016

2015
Vulnerability Analysis on the CNG Crypto Library.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Security Threats to the Platform Identification.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Anti-theft Solusions for In-Vehicle Electronic Devices.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
Vulnerability to Flash Controller for Secure USB Drives.
J. Internet Serv. Inf. Secur., 2013

GEESE: A Cognitive USN Platform.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation).
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Reverse-safe authentication protocol for secure USB memories.
Secur. Commun. Networks, 2012

Extraction of Platform-unique Information as an Identifier.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A Brief Survey on Rootkit Techniques in Malicious Codes.
J. Internet Serv. Inf. Secur., 2012

A secure framework of the surveillance video network integrating heterogeneous video formats and protocols.
Comput. Math. Appl., 2012

A Novel Search System for Protecting Search Word.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Privacy Preserving Model for Personal Information in Search Engine.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Architecture to Support Heterogeneous Devices for Video Surveillance System.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Keyboard Security: A Technological Review.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Reversability Assessment on Secure USB Memories.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Safe Authentication Protocol for Secure USB Memories.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

A Solution to Protecting USB Keyboard Data.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010


  Loading...