TS LAB
Technology & Security LABoratory (기술 보호 연구실)
[2023]
Log4j Vulnerability Analysis and Detection Pattern Production Technology Based on Snort Rules
WH Park IH Lee / BCD 2022: Big Data, Cloud Computing, and Data Science Engineering, https://link.springer.com/chapter/10.100 (2023)
[2022]
Diagnosis of depressive disorder model on facial expression based on fast R-CNN
YS Lee, WH Park / Diagnostics 12 (2), 317 (2022)
Malicious file detection method using machine learning and interworking with MITRE ATT&CK framework
G Ahn, K Kim, W Park, D Shin / Applied Sciences 12 (21), 10761 (2022)
Military Information Leak Response Technology through OSINT Information Analysis Using SNSes
YJ Lee, SJ Park, WH Park / Security and Communication Networks 2022 (2022)
Configuration Method of AWS Security Architecture That Is Applicable to the Cloud Lifecycle for Sustainable Social Network
SJ Park, YJ Lee, WH Park / Security and Communication Networks 2022, 1-12 (2022)
Analysis of Cybersecurity Threats and Vulnerabilities in Metaverse Environment
J Choi, K Jaewoo, S Lee, W Park, TK Cho / 융합보안논문지 22 (3), 19-24 (2022)
Log4j Vulnerability Analysis and Detection Pattern Production Technology Based on Snort Rules
WH Park, IH Lee / IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science (2022)
Enhancement of Security Monitoring Model for a Safe Internet of Things (IoT) Environment
WH Park, G Ahn, J Kim, JM Kang, Y Lee / Research Briefs on Information and Communication Technology Evolution 8, 21-34 (2022)
Technical Countermeasures Against Drone Communication Vulnerabilities
W Park, HK Lee / Computer and Information Science 2021-Fall 21, 119-129 (2022)
[2021]
A Study on the Next Generation Security Control Model for Cyber Threat Detection in the Internet of Things (IoT) Environment
W Park, GH Ahn / 2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter) (2021)
Vulnerability of Remote Control Apps based on Attack Scenario
YJ Park, S Lee, W Park / Research Briefs on Information and Communication Technology Evolution 7, 188-196 (2021)
Changes of Cyber Hacking Attack Aspect of North Korea Cyber-Attack Groups Applying MITRE ATT&CK
GH Ahn, S Lee, W Park / Research Briefs on Information and Communication Technology Evolution 7, 75-88 (2021)
Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy
H Kim, J Lee, W Park / Convergence Security Journal 21 (3), 25-30 (2021)
Possibility of Information Leakage through Analysis of Chinese Antivirus Software
W Park / Journal of the Korea Institute of Information and Communication Engineering (2021)
Enhancing on Security Monitoring & Control Redundancy Facilities Config uration & Operation in the COVDI-19 Pandemic Environment
D Kang, J Lee, W Park / Convergence Security Journal 21 (1), 25-31 (2021)
Security Enhancement through Comparison of Domestic and Overseas Cloud Security Policies
S Lee, M Park, S Lee, W Park / Proceedings of the Korean Institute of Information and Commucation Sciences (2021)
A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow
TH Lee, WH Park, KH Kook / Convergence Security Journal 21 (2), 11-18 (2021)
[2020]
Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment
GH Ahn, H Lee, WH Park, JW Kang / Convergence Security Journal 20 (4), 135-141 (2020)
Comparative Analysis of Cyber Attacks of Korea Government and Policy Countermeasures
H Kwon, Y Lee, W Park / Convergence Security Journal 20 (5), 19-26 (2020)
A Study on Concurrency Control Scheme for Scalability of Blockchain
YH Kang, W Park / Convergence Security Journal 20 (3), 71-78 (2020)
[2019]
Improvement of Shift Work System due to Reduction of Working Hours for Efficient Security Monitoring & Control
WH Park, YS Lee, KJ Kim / Convergence Security Journal 19 (4), 143-150 (2019)
A Study on the Trend Analysis Based on Personal Information Threats Using Text Mining
YH Kim, TH Lee, JM Kim, WH Park, KH Koo / Convergence Security Journal 19 (2), 29-38 (2019)
[2018]
Study on Improved Detection Rule Formation via Information Leakage Malware Analysis
WH Park, KC Yang, DH Lee, KNJ Kim / Convergence Security Journal 8 (4), 1-8 (2018)
[2017]
Performance comparison and detection analysis in snort and suricata environment
W Park, S Ahn / Wireless Personal Communications 94, 241-252 (2017)
Enhancing education curriculum of cyber security based on NICE
W Park, S Ahn / KIPS Transactions on Computer and Communication Systems 6 (7), 321-328 (2017)
An enhancement of optimized detection rule of security monitoring and control for detection of cyberthreat in location-based mobile system
WH Park, BH Kang / Mobile Information Systems 2017 (2017)
Special Issue on Mobile Sensor Networks: Advanced Technologies and Their Applications
H Kim, D Lee, W Park / Wireless Personal Communications 94, 1-3 (2017)
[2016]
An exploratory research on advanced smart media security design for sustainable intelligence information system
W Park, O Na, H Chang / Multimedia Tools and Applications 75, 6059-6070 (2016)
Enhancing industrial security management system for multimedia environment
CS Lee, W Park / Multimedia Tools and Applications 75, 14597-14615 (2016)
[2015]
New detection method and countermeasure of cyber attacks in mix networks
KC Park, H Shin, WH Park, J In Lim / Multimedia Tools and Applications 74, 6509-6518 (2015)
Vulnerability of rechargeable RFID tag card based on NFC
WH Park, DH Kim, D Lee / International Journal of Control and Automation 8 (4), 9-14 (2015)
Vulnerability of information disclosure in data transfer section for constructing a safe smart work infrastructure
GI Heo, YJ Park, WH Park / Multimedia Tools and Applications 74, 8831-8847 (2015)
A Study on Insider Behavior Scoring System to Prevent Data Leaks
YH Lim, JS Hong, KH Kook, WH Park / 융합보안논문지 15 (5), 77-86 4 (2015)
Small business technological assets protection factors analysis using logistic regression analysis
JS Hong, WH Park, Y Kim, KH Kook / Journal of Society for e-Business Studies 20 (3) (2015)
Improvement of evidence collection module using live response technology on a windows system
WH Park, DH Lee / Multimedia Tools and Applications 74, 6453-6464 (2015)
Analysis and countermeasure of malicious code in small businesses
JS Hong, WH Park, KH Kook / Convergence Security Journal 15 (7), 55-62 (2015)
Naming Scheme for Standardization of Detection Rule on Security Monitoring Threat Event
WH Park, Y Kim, YW Lim, S Ahn / Convergence Security Journal 15 (4), 83-90 (2015)
[2014]
A study on cyber threat prediction based on intrusion detection event for APT attack detection
YH Kim, WH Park / Multimedia tools and applications 71, 685-698 (2014)
Fraud and financial crime detection model using malware forensics
AC Kim, S Kim, WH Park, DH Lee / Multimedia tools and applications 68, 479-496 (2014)
Detection System Model of Zombie PC using Live Forensics Techniques
JS Hong, N Park, WH Park / Journal of Society for e-Business Studies 17 (3) (2014)
Improved Security Monitoring and Control Using Analysis of Cyber Attack in Small Businesses
JS Hong, YH Lim, WH Park, KH Kook / Journal of Society for e-Business Studies 19 (4) (2014)
A Comparative Study on Function and Performance of Snort and Suricata
MK Jeong, S Ahn, WH Park / Convergence Security Journal 14 (5), 3-8 (2014)
[2013]
A study on the live forensic techniques for anomaly detection in user terminals
AC Kim, WH Park, DH Lee / International Journal of Security and Its Applications 7 (1), 181-188 (2013)
Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection
J Choi, W Kim, W Park, K Kook / The Journal of Korean Institute of Communications and Information Sciences (2013)
A Study on Trend and Detection Technology for Cyber Threats in Mobile Environment
WH Park, DH Kim, MS Kim, N Park / 2013 International Conference on IT Convergence and Security (ICITCS), 1-4 (2013)
Cyber threat prediction model using security monitoring system event
N Park, WH Park / IT Convergence and Security 2012, 233-239 (2013)
Naval Combat Management System Secure Coding Rule Selection Using Warfare System SW Secure Coding Rule Selection Evaluation Model
J Choi, W Kim, W Park, K Kook / Journal of Security Engineering 10 (4), 417-428 (2013)
Detection and traceback of illegal users based on anonymous network in BitTorrent environment
YH Lim, DH Lee, WH Park, KH Kook / Wireless personal communications 73, 319-328 (2013)
Countermeasures of privacy disclosure vulnerability in data transfer section
GI Heo, JW Kang, WH Park / Journal of Information Technology Services 12 (1), 163-171 (2013)
Vulnerability of information disclosure in data transfer section for safe smartwork infrastructure
DH Kim, JH Gong, WH Park, N Park / 2013 International Conference on Information Science and Applications (ICISA) (2013)
Younghwan Im, Kwangho Kook, Developing Method for Secure Coding Rule for Command & Control Warfare System Embeded Software (2013)
J Choi, W Kim, W Park / 7th Information Science/Information Processing Society Joint Symposium (2013)
A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method
AC Kim, WH Park, DH Lee / IT Convergence and Security 2012, 93-99 (2013)
A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent
GII Heo, NH Kim, AR Jo, SI Choi, WH Park / IT Convergence and Security 2012, 169-175 (2013)
[2012]
Defense SW Secure Coding Application Method for Cyberwarfare Focused on the warfare System Embedded SW Application Level
J Choi, W Kim, W Park, K Kook / Journal of Korea Association of Defense Industry Studies 19 (2), 91-103 (2012)
A Hybrid Vulnerability of NFC Technology in Smart Phone
CM Park, N Park, WH Park / Convergence Security Journal 12 (4), 3-8 (2012)
The Mobile Security Diagnostic System against Smart-phone Threat
WB Cheon, JH Lee, WH Park, TM Chung / Journal of the Korea Institute of Information Security & Cryptology 22 (3) (2012)
A study on malware detection system model based on correlation analysis using live response techniques
YH Lim, HR Ryu, KS Choi, CW Park, WH Park, KH Kook / 2012 International Conference on Information Science and Applications, 1-6 (2012)
A Study of ESMTC (Enterprise Security Management System Based on Threshold Classification)
KH Choi, WH Park, KJ Kim / 2012 International Conference on Information Science and Applications, 1-6 (2012)
A Study on New Selective Agent Attack Technology in Windows System
YW Kim, YH Lim, WH Park / Journal of Korea Multimedia Society 15 (2), 226-233 (2012)
The Mobile Security Diagnostic System against Smart-phone Threat
WB Cheon, JH Lee, WH Park, TM Chung / 학술자료 1–80 (2012)
[2011]
The new vulnerability of service set identifier (SSID) using QR code in android phone
WB Cheon, K il Heo, WG Lim, WH Park, TM Chung / 2011 international conference on information science and applications, 1-6 (2011)
A study on analysis of malicious codes similarity using N-gram and vector space model
D Lee, WH Park, KJ Kim / 2011 International Conference on Information Science and Applications, 1-4 (2011)
A study on the countermeasure of cyber attacks using anonymous network
JH Lee, KJ Ahn, WH Park, JI Lim / Convergence Security Journal 11 (3), 31-37 (2011)
Design and Implementation of ATP (Advanced Persistent Threat) Attack Tool Using HTTP Get Flooding Technology
WB Cheon, WH Park, TM Chung / The Journal of Korean association of computer education 14 (6), 65-73 (2011)
A study on improvement of the evidence collection module in windows forensic
WH Park, D Lee, KJ Kim / 2011 International Conference on Information Science and Applications, 1-4 (2011)
Analysis of Malicious Codes Similarity Using N-Gram and VSM in Windows Environment
DH Lee, KJ Kim, WH Park / International Information Institute (Tokyo). Information 14 (11), 3749 (2011)
Performance Improvement for Increased Communication Speed in Anonymous Network using GeoIP
KC Park, YH Lim, JI Lim, WH Park / The Journal of Society for e-Business Studies 16 (4), 75-85 (2011)
[2010]
A study on risk analysis and assessment of damages to cyber attack
WH Park / 2010 International Conference on Information Science and Applications, 1-6 (2010)
A Study on Enforce the Policy of User Certification in Public Certificate System
IB Kim, JY Hwang, WH Park / Convergence Security Journal 10 (4), 69-76 (2010)
Agent Attacks Using a TTL Transformation of Windows Registry
WH Park, KC Park, K il Heo, KH Kook / 2010 International Conference on Information Science and Applications, 1-7 (2010)
A Study on Detection and Responding Technology through Windows Malware Analysis
WG Lim, JH Lee, SJ Lim, WH Park, KH Kook / Convergence Security Journal 10 (1), 19-27 (2010)
Malware Analysis and Policy Counterplan Against a Transformation of HTTP Header Information
WG Lim, GI Heo, WH Park, KH Kook / Convergence Security Journal 10 (2), 43-49 (2010)
A study on protection model of propagation through smartphone malware analysis
SJ Lim, JH Lee, H Kang, WH Park, KH Kook / Convergence Security Journal 10 (1), 1-8 (2010)
Jamming Vulnerability on Aviation Communication System by Smart-phone with Frequency Modulation
IB Kim, YY Kim, WH Park / Convergence Security Journal 10 (4), 49-59 (2010)
A Study on The Utilization and Secure Plan of Security in Social Media
WB Cheon, WH Park, TM Chung / Convergence Security Journal 10 (3), 1-7 (2010)
A Study on the Improvement of the Malware Evidence Collection Module Based On Windows
GI Heo, CU Park, WH Park, KH Kuk / Convergence Security Journal 10 (3), 61-68 (2010)
A Study on the New Vulnerability of Inducing Service Charge Doctoring SSID of Smartphone Based on Android
GI Heo, HR Yoo, CU Park, WH Park / Convergence Security Journal 10 (4), 21-30 (2010)
[2009]
A Study on Model for Assessment of Economic Damages Due to Cyber Terror
H Kang, KC Park, WH Park, KH Kuk / Journal of Infoamtion and Security 9 (3), 25-33 (2009)
A study on the analysis and detection method for protecting malware spreading via E-mail
KC Yang, SY Lee, WH Park, KC Park, JI Lim / Journal of the Korea Institute of Information Security & Cryptology 19 (1) (2009)
[2008]
A study on prediction of mass sql injection worm propagation using the markov chain
WH Park, YJ Kim, DH Lee, KNJ Kim / Convergence Security Journal 8 (4), 173-181 (2008)