Æȷοì
Donghwan Lee
Donghwan Lee
add.re.krÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
RFID handbook: applications, technology, security, and privacy
SA Ahson, M Ilyas
CRC press, 2017
6182017
Q + -Algorithm: An Enhanced RFID Tag Collision Arbitration Algorithm
D Lee, K Kim, W Lee
International Conference on Ubiquitous Intelligence and Computing, 23-32, 2007
802007
HARMer: Cyber-attacks automation and evaluation
SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim
IEEE Access 8, 129397-129414, 2020
532020
A Time‐Optimal Anti‐collision Algorithm for FSA‐Based RFID Systems
D Lee, J Choi, W Lee, S Pack, DZ Du, S Hong
ETRI journal 33 (3), 458-461, 2011
182011
Genetic algorithmic topology control for two-tiered wireless sensor networks
D Lee, W Lee, J Kim
Computational Science–ICCS 2007: 7th International Conference, Beijing ¡¦, 2007
142007
Cy-through: toward a cybersecurity simulation for supporting live, virtual, and constructive interoperability
D Lee, D Kim, MK Ahn, W Jang, W Lee
IEEE Access 9, 10041-10053, 2021
102021
A practical framework for cyber defense generation, enforcement and evaluation
SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim
Computer Networks 208, 108878, 2022
72022
Method for determining optimal frame size for tag collision prevention in RFID system
H Jang, W Lee, D Lee, J Lee, S Kang, Y Yoon, J Han
US Patent 8,610,544, 2013
72013
ICSTASY: an integrated cybersecurity training system for military personnel
D Lee, D Kim, C Lee, MK Ahn, W Lee
IEEE Access 10, 62232-62246, 2022
62022
ºòµ¥ÀÌÅÍ ±â¹ÝÀÇ ½Ç½Ã°£ ³×Æ®¿öÅ© Æ®·¡ÇÈ ºÐ¼® Ç÷§Æû ¼³°è
À̵¿È¯£¬ ¹ÚÁ¤Âù£¬ À¯Âù°ï£¬ À±È£»ó
Á¤º¸º¸È£ÇÐȸ³í¹®Áö 23 (4), 721-728, 2013
52013
On the Design of a Big Data based Real-Time Network Traffic Analysis Platform
D Lee, JC Park, C Yu, H Yun
Journal of the Korea Institute of Information Security & Cryptology 23 (4 ¡¦, 2013
42013
OFSA: Optimum Frame-Slotted Aloha for RFID Tag Collision Arbitration
D Lee, J Choi, W Lee
KSII Transactions on Internet and Information Systems (TIIS) 5 (11), 1929-1945, 2011
42011
On the Calculation of the Maximal MOT Throughput in T-DMB
J Choi, D Lee, J Yu, K Kim, W Lee
IEEE Transactions on Consumer Electronics 53 (3), 877-884, 2007
42007
Software-Friendly Subjective Bayesian Networks: Reasoning within a Software-Centric Mission Impact Assessment Framework
S Matsumoto, JF Ferrari, HJ Yoon, AR Thukkaraju, D Lee, MK Ahn, ...
2023 26th International Conference on Information Fusion (FUSION), 1-8, 2023
22023
Research on method of cyber attack modeling in constructive M&S network environment
MK Ahn, DH Lee, D Kim, YH Kim
The Fall Conference of the KIMST, 773-774, 2015
22015
Measuring technical effectiveness in cyber warfare
KIMH JOON, D Lee, MK Ahn, YH Kim, KS Noh
Korea Computer Congress, 143-145, 2015
22015
º£ÀÌÁö¾È ³×Æ®¿öÅ©¸¦ ÀÌ¿ëÇÑ ³»ºÎÀÚ »çÀ̹ö À§Çù ¿¹º¸ ½Ã½ºÅÛ
ÀåÈñÁø£¬ À̵¿È¯£¬ ¹ÚÂùÀÏ£¬ À±È£»ó
Çѱ¹±º»ç°úÇбâ¼úÇÐȸ Á¾ÇÕÇмú´ëȸ ³í¹®Áý, 470-473, 2012
22012
UbiComm: An Adaptive Vertical Handoff Decision Scheme for Heterogeneous Wireless Networks
W Lee, E Kim, J Yu, D Lee, J Choi, J Kim, CK Shin
Ubiquitous Computing Systems: Third International Symposium, UCS 2006, Seoul ¡¦, 2006
22006
Interdependent Mission Impact Assessment of an IoT System with Hypergame-heoretic Attack-Defense Behavior Modeling
AR Thukkaraju, HJ Yoon, S Matsumoto, JF Ferrari, D Lee, MK Ahn, ...
2023 31st International Symposium on Modeling, Analysis, and Simulation of ¡¦, 2023
12023
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive
S Lee, D Lee, S Kim
The 4th ACM Conference on Advances in Financial Technologies, 232–243, 2023
12023
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20