Security enhancement in InfiniBand architecture M Lee, EJ Kim, M Yousif 19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005 | 53 | 2005 |
I2SEMS: Interconnects-independent security enhanced shared memory multiprocessor systems M Lee, M Ahn, EJ Kim 16th International Conference on Parallel Architecture and Compilation …, 2007 | 36 | 2007 |
Better not to use vulnerability’s reference for exploitability prediction H Yang, S Park, K Yim, M Lee Applied Sciences 10 (7), 2555, 2020 | 24 | 2020 |
A comprehensive framework for enhancing security in InfiniBand architecture M Lee, EJ Kim IEEE Transactions on Parallel and Distributed Systems 18 (10), 1393-1406, 2007 | 20 | 2007 |
Demystifying arm trustzone tee client api using op-tee H Yang, M Lee The 9th International Conference on Smart Media and Applications, 325-328, 2020 | 12 | 2020 |
A source identification scheme against DDoS attacks in cluster interconnects M Lee, EJ Kim, CW Lee Workshops on Mobile and Wireless Networking/High Performance Scientific …, 2004 | 12 | 2004 |
Efficient data packet compression for cache coherent multiprocessor systems BS An, M Lee, KH Yum, EJ Kim 2012 Data Compression Conference, 129-138, 2012 | 11 | 2012 |
Extension and design of secure dynamic updates in domain name systems YC Shim, HW Shim, MH Lee, OH Byeon Fifth Asia-Pacific Conference on... and Fourth Optoelectronics and …, 1999 | 11 | 1999 |
Research on the trend of utilizing Emulab as cyber security research framework M Lee, WJ Seok Journal of The Korea Institute of Information Security & Cryptology 23 (6 …, 2013 | 10 | 2013 |
An overview of security issues in cluster interconnects M Lee, EJ Kim, KH Yum, M Yousif Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID …, 2006 | 9 | 2006 |
True random number generator (trng) utilizing fm radio signals for mobile and embedded devices in multi-access edge computing K Lee, M Lee Sensors 19 (19), 4130, 2019 | 8 | 2019 |
Fast secure communications in shared memory multiprocessor systems M Lee, M Ahn, EJ Kim IEEE Transactions on Parallel and distributed Systems 22 (10), 1714-1721, 2011 | 8 | 2011 |
Design of an intelligent system for autonomous groundwater management M Lee JoC 5 (1), 26-31, 2014 | 7 | 2014 |
First Report of Bacterial Leaf Blight of Carrot Caused by Xanthomonas hortorum pv. carotae in Korea IS Myung, MJ Yoon, JY Lee, GD Kim, MH Lee, EY Hwang, HS Shim Plant Disease 98 (2), 275-275, 2014 | 6 | 2014 |
Security Enhancement in Infiniband Architecture, Apr. 2005 M Lee IEEE 19, 1-18, 0 | 6 | |
SGXDump: a repeatable code-reuse attack for extracting SGX enclave memory HJ Yoon, MH Lee Applied Sciences 12 (15), 7655, 2022 | 5 | 2022 |
Emulearner: Deep learning library for utilizing Emulab GB Song, MH Lee Journal of information and communication convergence engineering 16 (4), 235-241, 2018 | 5 | 2018 |
Design and Implementation of Safe Naming Service Client CS Lim, MH Lee, WJ Seok, WH Byone KIPS Journal 6, 254-266, 1999 | 5 | 1999 |
Automatic system for measuring security risk of Android application from third party app store B Jang, J Lee, M Lee Security and Communication Networks 9 (16), 3190-3196, 2016 | 4 | 2016 |
Stealthy information leakage from android smartphone through screenshot and OCR Y Kim, HJ Yoon, MH Lee International Conference on Chemical, Material and Food Engineering, 784-787, 2015 | 4 | 2015 |