Suivre
Hyunwoo Lee
Hyunwoo Lee
Korea Institute for Energy Technology (KENTECH)
Adresse e-mail validée de kentech.ac.kr - Page d'accueil
Titre
Citée par
Citée par
Année
maTLS: How to Make TLS middlebox-aware?
H Lee, Z Smith, J Lim, G Choi, S Chun, T Chung, TT Kwon
The Network and Distributed System Security (NDSS) conference, 2019
472019
Position estimation of robotic mobile nodes in wireless testbed using GENI
A Abdelhadi, F Rechia, A Narayanan, T Teixeira, R Lent, D Benhaddou, ...
2016 Annual IEEE Systems Conference (SysCon), 1-6, 2016
332016
TLS 1.3 in practice: How TLS 1.3 contributes to the internet
H Lee, D Kim, Y Kwon
Proceedings of the Web Conference 2021, 70-79, 2021
292021
A preliminary study on disaster waste detection and volume estimation based on 3D spatial information
HT Yoo, H Lee, S Chi, BG Hwang, J Kim
Computing in Civil Engineering 2017, 428-435, 2017
202017
D2TLS: delegation-based DTLS for cloud-based IoT services
E Cho, M Park, H Lee, J Choi, TT Kwon
Proceedings of the International Conference on Internet of Things Design and …, 2019
122019
MQTLS: toward secure MQTT communication with an untrusted broker
H Lee, J Lim
2019 International Conference on Information and Communication Technology …, 2019
102019
ICN-OMF: A control, management framework for Information-Centric Network testbed
L Hyunwoo, D Kim, J Suh, T Taekyoung
2015 International Conference on Information Networking (ICOIN), 416-417, 2015
92015
Vwanalyzer: A systematic security analysis framework for the voice over wifi protocol
H Lee, I Karim, N Li, E Bertino
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
72022
Analyzing spatial differences in the TLS security of delegated web services
J Lee, H Lee, J Jeong, D Kim, TT Kwon
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
62021
AppSniffer: Towards robust mobile app fingerprinting against VPN
S Oh, M Lee, H Lee, E Bertino, H Kim
Proceedings of the ACM Web Conference 2023, 2318-2328, 2023
42023
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks
H Lee, A Mudgerikar, A Kundu, N Li, E Bertino
European Symposium on Research in Computer Security, 549-568, 2022
42022
Towards Efficient Privacy-Preserving Deep Packet Inspection
W Wang, H Lee, Y Huang, E Bertino, N Li
European Symposium on Research in Computer Security, 166-192, 2023
32023
Enabling sdn experimentation with wired and wireless resources: The smartfire facility
K Choumas, T Korakis, H Lee, D Kim, J Suh, TT Kwon, P Martinez-Julia, ...
Cloud Computing: 6th International Conference, CloudComp 2015, Daejeon …, 2016
32016
Machine Learning Techniques for Cybersecurity
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Springer Nature, 2023
22023
Enabling SDN experimentation with wired and wireless resources: The smartFIRE facility
J Suh, TT Kwon, P Martinez-Julia, A Skarmeta, T You, L Baron, S Fdida, ...
Cloud Computing: 6th International Conference, Cloud-Comp 2015, Daejeon …, 2016
22016
RAON: A recursive abstraction of SDN control-plane for large-scale production networks
M Kwak, H Lee, J Shin, J Suh, T Taekyoung
2015 International Conference on Information Networking (ICOIN), 426-427, 2015
22015
How to decentralize the internet: A focus on data consolidation and user privacy
J Song, H Jung, S Chun, H Lee, M Kang, M Park, E Cho
Computer Networks 234, 109911, 2023
12023
ZTLS: A DNS-based Approach to Zero Round Trip Delay in TLS handshake
S Lim, H Lee, H Kim, H Lee, T Kwon
Proceedings of the ACM Web Conference 2023, 2360-2370, 2023
12023
A Pro-Active Defense Framework for IoT Systems
E Bertino, H Lee, M Huang, C Katsis, Z Shen, B Ribeiro, D De Mello, ...
2023 IEEE 9th International Conference on Collaboration and Internet …, 2023
2023
Challenges in the Use of ML for Security
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 131-143, 2023
2023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20