Follow
Heejo Lee
Heejo Lee
Professor of Computer Science, Korea University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Cyber–Physical Security of a Smart Grid Infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE, 1-15, 2012
13632012
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
K Park, H Lee
ACM SIGCOMM computer communication review 31 (4), 15-26, 2001
9702001
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
K Park, H Lee
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
6402001
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
4582008
Botnet detection by monitoring group activities in DNS traffic
H Choi, H Lee, H Lee, H Kim
7th IEEE international conference on computer and information technology …, 2007
4292007
Vuddy: A scalable approach for vulnerable code clone discovery
S Kim, S Woo, H Lee, H Oh
2017 IEEE symposium on security and privacy (SP), 595-614, 2017
4132017
Detection and categorization of malicious URLs
BB Zhu, H Choi, H Lee
US Patent 8,521,667, 2013
2822013
Detecting malicious web links and identifying their attack types
H Choi, BB Zhu, H Lee
2nd USENIX Conference on Web Application Development (WebApps 11), 2011
2272011
BotGAD: detecting botnets by capturing group activities in network traffic
H Choi, H Lee, H Kim
Proceedings of the Fourth International ICST Conference on COMmunication …, 2009
1892009
Identifying botnets by capturing group activities in DNS traffic
H Choi, H Lee
Computer Networks 56 (1), 20-33, 2012
1852012
Verismart: A highly precise safety verifier for ethereum smart contracts
S So, M Lee, J Park, H Lee, H Oh
2020 IEEE Symposium on Security and Privacy (SP), 1678-1694, 2020
1682020
Detecting metamorphic malwares using code graphs
J Lee, K Jeong, H Lee
Proceedings of the 2010 ACM symposium on applied computing, 1970-1977, 2010
1622010
PsyBoG: A scalable botnet detection method for large-scale DNS traffic
J Kwon, J Lee, H Lee, A Perrig
Computer Networks 97, 48-73, 2016
1382016
Apparatus and method for monitoring network using the parallel coordinate system
HS Choi, HJ Lee
US Patent App. 11/324,698, 2007
1292007
Fast detection and visualization of network attacks on parallel coordinates
H Choi, H Lee, H Kim
computers & security 28 (5), 276-288, 2009
1242009
Method of sharing state between stateful inspection firewalls on mep network
JH Kim, SW Bahk, HJ Lee
US Patent App. 10/709,255, 2005
1192005
TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks
P Van Tran, LX Hung, YK Lee, S Lee, H Lee
2007 4th IEEE Consumer Communications and Networking Conference, 593-598, 2007
1002007
Enforcing access control using risk assessment
NN Diep, LX Hung, Y Zhung, S Lee, YK Lee, H Lee
Fourth European Conference on Universal Multiservice Networks (ECUMN'07 …, 2007
942007
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
81*2010
Generic unpacking using entropy analysis
G Jeong, E Choo, J Lee, M Bat-Erdene, H Lee
2010 5th International Conference on Malicious and Unwanted Software, 98-105, 2010
802010
The system can't perform the operation now. Try again later.
Articles 1–20