Heejo Lee
Heejo Lee
Professor of Computer Science, Korea University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Cyber–Physical Security of a Smart Grid Infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE, 1-15, 2012
10662012
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
K Park, H Lee
ACM SIGCOMM computer communication review 31 (4), 15-26, 2001
9122001
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
K Park, H Lee
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
6232001
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
3962008
Botnet detection by monitoring group activities in DNS traffic
H Choi, H Lee, H Lee, H Kim
7th IEEE International Conference on Computer and Information Technology …, 2007
3712007
Detection and categorization of malicious URLs
BB Zhu, H Choi, H Lee
US Patent 8,521,667, 2013
1762013
BotGAD: detecting botnets by capturing group activities in network traffic
H Choi, H Lee, H Kim
Proceedings of the Fourth International ICST Conference on COMmunication …, 2009
1562009
Detecting Malicious Web Links and Identifying Their Attack Types.
H Choi, BB Zhu, H Lee
WebApps 11 (11), 218, 2011
1552011
Identifying botnets by capturing group activities in DNS traffic
H Choi, H Lee
Computer Networks 56 (1), 20-33, 2012
1462012
Detecting metamorphic malwares using code graphs
J Lee, K Jeong, H Lee
Proceedings of the 2010 ACM symposium on applied computing, 1970-1977, 2010
1402010
Vuddy: A scalable approach for vulnerable code clone discovery
S Kim, S Woo, H Lee, H Oh
2017 IEEE Symposium on Security and Privacy (SP), 595-614, 2017
1352017
Fast detection and visualization of network attacks on parallel coordinates
H Choi, H Lee, H Kim
computers & security 28 (5), 276-288, 2009
1112009
Ttm: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks
P Van Tran, LX Hung, YK Lee, S Lee, H Lee
2007 4th IEEE Consumer Communications and Networking Conference, 593-598, 2007
972007
PsyBoG: A scalable botnet detection method for large-scale DNS traffic
J Kwon, J Lee, H Lee, A Perrig
Computer Networks 97, 48-73, 2016
922016
Method of sharing state between stateful inspection firewalls on mep network
JH Kim, SW Bahk, HJ Lee
US Patent App. 10/709,255, 2005
922005
Enforcing access control using risk assessment
NN Diep, LX Hung, Y Zhung, S Lee, Y Lee, H Lee
Fourth European Conference on Universal Multiservice Networks (ECUMN'07 …, 2007
852007
Apparatus and method for monitoring network using the parallel coordinate system
HS Choi, HJ Lee
US Patent App. 11/324,698, 2007
812007
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
68*2010
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
XH Le, S Lee, I Butun, M Khalid, R Sankar, M Kim, M Han, YK Lee, H Lee
Journal of Communications and Networks 11 (6), 599-606, 2009
642009
Transmission time-based mechanism to detect wormhole attacks
T Van Phuong, NT Canh, YK Lee, S Lee, H Lee
The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007), 172-178, 2007
632007
The system can't perform the operation now. Try again later.
Articles 1–20