발행물

전체 논문

67

11

Extraction of Creation-Time for Recovered Files on Windows FAT32 File System
Wan Yeon Lee, Kyong Hoon Kim, Heejo Lee
Applied Science, 2019

12

Software systems at risk: an empirical study of cloned vulnerabilities in practice
Seulbae Kim, Heejo Lee
Computers & Security, 2018

13

Entropy analysis to classify unknown packing algorithms for malware detection
Munkhbayar Bat-Erdene, Hyundo Park, Hongzhe Li, Heejo Lee, Mahn-soo Choi
Int'l Journal of Information Security, 2017

14

Packer Detection for Multi-Layer Executables Using Entropy Analysis
Munkhbayar Bat-Erdene, Taebeom Kim, Hyundo Park, Heejo Lee
Entropy, 2017

15

Coordination of Anti-Spoofing Mechanisms in Partial Deployments
Hyok An, Heejo Lee, Adrian Perrig
Journal of Communications and Networks, 2016

16

Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code
Hongzhe Li, Jaesang Oh, Heejo Lee
IEICE Trans. on Information and Systems, 2016

17

Integrity verification of the ordered data structures in manipulated video content
Jieun Song, Kiryong Lee, Wan Yeon Lee, Heejo Lee
Digital Investigation, 2016

18

Broken Integrity Detection of Video Files in Video Event Data Recorders
Choongin Lee, Jehyun Lee, Youngbin Pyo, Heejo Lee
KSII Trans. on Internet and Information Systems, 2016

19

SIGMATA: Storage Integrity Guaranteeing Mechanism against Tampering Attempts for Video Event Data Recorders
Hyuckmin Kwon, Seulbae Kim, Heejo Lee
Journal of Systemics, Cybernetics and Informatics, 2016

20

mpmpering Attempts for Video Event Data Recorders
Sangwook LEE, Ji Eun SONG, Wan Yeon LEE, Young Woong KO, Heejo LEE
IEICE Trans. on Information and Systems, 2015