Heejo Lee
Heejo Lee
Professor of Computer Science, Korea University
Verified email at korea.ac.kr - Homepage
Cited by
Cited by
Cyber–Physical Security of a Smart Grid Infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE, 1-15, 2012
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
K Park, H Lee
ACM SIGCOMM computer communication review 31 (4), 15-26, 2001
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
K Park, H Lee
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
Botnet detection by monitoring group activities in DNS traffic
H Choi, H Lee, H Lee, H Kim
7th IEEE International Conference on Computer and Information Technology …, 2007
Detection and categorization of malicious URLs
BB Zhu, H Choi, H Lee
US Patent 8,521,667, 2013
BotGAD: detecting botnets by capturing group activities in network traffic
H Choi, H Lee, H Kim
Proceedings of the Fourth International ICST Conference on COMmunication …, 2009
Detecting Malicious Web Links and Identifying Their Attack Types.
H Choi, BB Zhu, H Lee
WebApps 11 (11), 218, 2011
Identifying botnets by capturing group activities in DNS traffic
H Choi, H Lee
Computer Networks 56 (1), 20-33, 2012
Detecting metamorphic malwares using code graphs
J Lee, K Jeong, H Lee
Proceedings of the 2010 ACM symposium on applied computing, 1970-1977, 2010
Vuddy: A scalable approach for vulnerable code clone discovery
S Kim, S Woo, H Lee, H Oh
2017 IEEE Symposium on Security and Privacy (SP), 595-614, 2017
Fast detection and visualization of network attacks on parallel coordinates
H Choi, H Lee, H Kim
computers & security 28 (5), 276-288, 2009
Ttm: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks
P Van Tran, LX Hung, YK Lee, S Lee, H Lee
2007 4th IEEE Consumer Communications and Networking Conference, 593-598, 2007
PsyBoG: A scalable botnet detection method for large-scale DNS traffic
J Kwon, J Lee, H Lee, A Perrig
Computer Networks 97, 48-73, 2016
Method of sharing state between stateful inspection firewalls on mep network
JH Kim, SW Bahk, HJ Lee
US Patent App. 10/709,255, 2005
Enforcing access control using risk assessment
NN Diep, LX Hung, Y Zhung, S Lee, Y Lee, H Lee
Fourth European Conference on Universal Multiservice Networks (ECUMN'07 …, 2007
Apparatus and method for monitoring network using the parallel coordinate system
HS Choi, HJ Lee
US Patent App. 11/324,698, 2007
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
XH Le, S Lee, I Butun, M Khalid, R Sankar, M Kim, M Han, YK Lee, H Lee
Journal of Communications and Networks 11 (6), 599-606, 2009
Transmission time-based mechanism to detect wormhole attacks
T Van Phuong, NT Canh, YK Lee, S Lee, H Lee
The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007), 172-178, 2007
The system can't perform the operation now. Try again later.
Articles 1–20