Follow
Jaehee Lee
Jaehee Lee
Verified email at microsoft.com
Title
Cited by
Cited by
Year
A study on efficient log visualization using d3 component against apt: How to visualize security logs efficiently?
J Lee, J Jeon, C Lee, J Lee, J Cho, K Lee
2016 International Conference on Platform Technology and Service (PlatCon), 1-6, 2016
172016
Spillover effect of ransomware: economic analysis of web vulnerability market
J Lee, K Lee
Research Briefs on Information and Communication Technology Evolution 3, 193-203, 2017
42017
An implementation of log visualization system combined SCADA Honeypot
J Lee, J Jeon, C Lee, J Lee, J Cho
International Conference on Advanced Communication Technology (ICACT), 2016
32016
Study on scenario-based personnel risk analysis
I Cho, J Lee, K Lee
Research Briefs on Information and Communication Technology Evolution 1, 110-123, 2015
32015
How to detect unknown malicious code efficiently?
J Lee, H Kim, H Yoon, K Lee
Computing, Communication and Security (ICCCS), 2015 International Conference …, 2015
22015
Advanced Unknown Malicious Code Detection Model
H Kim, J Lee, H Yoon, K Lee
Research Briefs on Information and Communication Technology Evolution 1, 82-92, 2015
12015
Apparatus and method of detecting abnormal financial transaction
JHL Kyung Ho Lee, Da Hee Choi, Jae Hee Lee, Jun Hyoung Oh, Young In You ...
US Patent US11763308B2, 2018
2018
Study on Security Risk and Its Countermeasures of O2O Service
JH Kim, WS Cho, JM Lee, JO Park, JH Lee
2017 International Conference on Platform Technology and Service (PlatCon), 1-4, 2017
2017
3 차원 벡터 시각화를 활용한 효과적인 위험 수준 평가
이주영, 조인현, 이재희, 이경호
정보보호학회논문지 25 (6), 1595-1606, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–9