A study on efficient log visualization using d3 component against apt: How to visualize security logs efficiently? J Lee, J Jeon, C Lee, J Lee, J Cho, K Lee 2016 International Conference on Platform Technology and Service (PlatCon), 1-6, 2016 | 17 | 2016 |
Spillover effect of ransomware: economic analysis of web vulnerability market J Lee, K Lee Research Briefs on Information and Communication Technology Evolution 3, 193-203, 2017 | 4 | 2017 |
An implementation of log visualization system combined SCADA Honeypot J Lee, J Jeon, C Lee, J Lee, J Cho International Conference on Advanced Communication Technology (ICACT), 2016 | 3 | 2016 |
Study on scenario-based personnel risk analysis I Cho, J Lee, K Lee Research Briefs on Information and Communication Technology Evolution 1, 110-123, 2015 | 3 | 2015 |
How to detect unknown malicious code efficiently? J Lee, H Kim, H Yoon, K Lee Computing, Communication and Security (ICCCS), 2015 International Conference …, 2015 | 2 | 2015 |
Advanced Unknown Malicious Code Detection Model H Kim, J Lee, H Yoon, K Lee Research Briefs on Information and Communication Technology Evolution 1, 82-92, 2015 | 1 | 2015 |
Apparatus and method of detecting abnormal financial transaction JHL Kyung Ho Lee, Da Hee Choi, Jae Hee Lee, Jun Hyoung Oh, Young In You ... US Patent US11763308B2, 2018 | | 2018 |
Study on Security Risk and Its Countermeasures of O2O Service JH Kim, WS Cho, JM Lee, JO Park, JH Lee 2017 International Conference on Platform Technology and Service (PlatCon), 1-4, 2017 | | 2017 |
3 차원 벡터 시각화를 활용한 효과적인 위험 수준 평가 이주영, 조인현, 이재희, 이경호 정보보호학회논문지 25 (6), 1595-1606, 2015 | | 2015 |