Cyber–Physical Security of a Smart Grid Infrastructure Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli Proceedings of the IEEE, 1-15, 2012 | 1320 | 2012 |
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets K Park, H Lee ACM SIGCOMM computer communication review 31 (4), 15-26, 2001 | 961 | 2001 |
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack K Park, H Lee Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 635 | 2001 |
Group-based trust management scheme for clustered wireless sensor networks RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008 | 453 | 2008 |
Botnet detection by monitoring group activities in DNS traffic H Choi, H Lee, H Lee, H Kim 7th IEEE international conference on computer and information technology …, 2007 | 415 | 2007 |
Vuddy: A scalable approach for vulnerable code clone discovery S Kim, S Woo, H Lee, H Oh 2017 IEEE symposium on security and privacy (SP), 595-614, 2017 | 368 | 2017 |
Detection and categorization of malicious URLs BB Zhu, H Choi, H Lee US Patent 8,521,667, 2013 | 282 | 2013 |
Detecting malicious web links and identifying their attack types H Choi, BB Zhu, H Lee 2nd USENIX Conference on Web Application Development (WebApps 11), 2011 | 219 | 2011 |
BotGAD: detecting botnets by capturing group activities in network traffic H Choi, H Lee, H Kim Proceedings of the Fourth International ICST Conference on COMmunication …, 2009 | 186 | 2009 |
Identifying botnets by capturing group activities in DNS traffic H Choi, H Lee Computer Networks 56 (1), 20-33, 2012 | 181 | 2012 |
Detecting metamorphic malwares using code graphs J Lee, K Jeong, H Lee Proceedings of the 2010 ACM symposium on applied computing, 1970-1977, 2010 | 159 | 2010 |
Verismart: A highly precise safety verifier for ethereum smart contracts S So, M Lee, J Park, H Lee, H Oh 2020 IEEE Symposium on Security and Privacy (SP), 1678-1694, 2020 | 135 | 2020 |
PsyBoG: A scalable botnet detection method for large-scale DNS traffic J Kwon, J Lee, H Lee, A Perrig Computer Networks 97, 48-73, 2016 | 133 | 2016 |
Apparatus and method for monitoring network using the parallel coordinate system HS Choi, HJ Lee US Patent App. 11/324,698, 2007 | 130 | 2007 |
Fast detection and visualization of network attacks on parallel coordinates H Choi, H Lee, H Kim computers & security 28 (5), 276-288, 2009 | 123 | 2009 |
Method of sharing state between stateful inspection firewalls on mep network JH Kim, SW Bahk, HJ Lee US Patent App. 10/709,255, 2005 | 119 | 2005 |
TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks P Van Tran, LX Hung, YK Lee, S Lee, H Lee 2007 4th IEEE Consumer Communications and Networking Conference, 593-598, 2007 | 98 | 2007 |
Enforcing access control using risk assessment NN Diep, LX Hung, Y Zhung, S Lee, YK Lee, H Lee Fourth European Conference on Universal Multiservice Networks (ECUMN'07 …, 2007 | 92 | 2007 |
Achieving network level privacy in wireless sensor networks RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song Sensors 10 (3), 1447-1472, 2010 | 80* | 2010 |
Generic unpacking using entropy analysis G Jeong, E Choo, J Lee, M Bat-Erdene, H Lee 2010 5th International Conference on Malicious and Unwanted Software, 98-105, 2010 | 79 | 2010 |