Heejo Lee
Orcid: 0000-0002-5831-0787
According to our database1,
Heejo Lee
authored at least 158 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
IEEE Access, 2023
V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023
2022
Int. J. Inf. Sec., 2022
IEEE Access, 2022
Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites.
IEEE Access, 2022
IEEE Access, 2022
MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components.
Proceedings of the 31st USENIX Security Symposium, 2022
How to divide a permission token in the delegation process of blockchain-based access control for IoT.
Proceedings of the IEEE International Systems Conference, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Vehicle Speed Measurement Methodology Robust to Playback Speed-Manipulated Video File.
IEEE Access, 2021
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities.
Proceedings of the 30th USENIX Security Symposium, 2021
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Design and Performance Evaluation of Crime Type and Crime Risk Score Estimation Technique for Fast and Efficient Response of Severe Crimes.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Enhancing the Reliability of IoT Data Marketplaces through Security Validation of IoT Devices.
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020
2018
Comput. Secur., 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Int. J. Inf. Sec., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
2016
J. Commun. Networks, 2016
KSII Trans. Internet Inf. Syst., 2016
Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code.
IEICE Trans. Inf. Syst., 2016
Digit. Investig., 2016
Concurr. Comput. Pract. Exp., 2016
Comput. Networks, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
2015
A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control.
Wirel. Networks, 2015
IEEE J. Sel. Top. Signal Process., 2015
Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations.
IEICE Trans. Inf. Syst., 2015
Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11(4), 224-233].
Digit. Investig., 2015
Comput. Secur., 2015
Comput. Commun., 2015
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015
2014
Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection.
Comput. Secur., 2014
Comput. Commun., 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks.
Comput. Secur., 2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Dynamic classification of packing algorithms for inspecting executables using entropy analysis.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the Information Security Practice and Experience, 2013
Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Comput. Networks, 2012
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis.
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Minimum-Energy Semi-Static Scheduling of a Periodic Real-Time Task on DVFS-Enabled Multi-Core Processors.
IEICE Trans. Inf. Syst., 2011
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
Proceedings of the Information Security Practice and Experience, 2011
2010
BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks.
Sensors, 2010
KSII Trans. Internet Inf. Syst., 2010
Inf. Sci., 2010
IEICE Trans. Commun., 2010
IEICE Trans. Inf. Syst., 2010
MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks.
Ann. des Télécommunications, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
2009
IEEE Trans. Parallel Distributed Syst., 2009
Maximum-Utility Scheduling of Operation Modes With Probabilistic Task Execution Times Under Energy Constraints.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2009
Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Sensors, 2009
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
J. Commun. Networks, 2009
Reducing Payload Inspection Cost Using Rule Classification for Fast Attack Signature Matching.
IEICE Trans. Inf. Syst., 2009
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks.
IEICE Trans. Commun., 2009
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
CoRR, 2009
Comput. Secur., 2009
Proceedings of the 2009 International Conference on Information Networking, 2009
Proceedings of the 2009 International Conference on Information Networking, 2009
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009
Proceedings of the 4th International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2009), 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
A connection management protocol for stateful inspection firewalls in multi-homed networks.
J. Commun. Networks, 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks.
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 2008 IEEE International Performance, 2008
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 2008 International Conference on Information Networking, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs.
IEEE J. Sel. Areas Commun., 2007
Evaluation of authentication interworking methods among multiple WLAN service providers.
Int. J. Commun. Syst., 2007
IEICE Trans. Commun., 2007
IEICE Trans. Commun., 2007
IEICE Trans. Commun., 2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 2007
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments.
Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 2007
A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007
A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments.
Proceedings of the IEEE International Conference on Pervasive Services, 2007
A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007
Proceedings of the Topics in Cryptology, 2007
Contextual Risk-Based Access Control.
Proceedings of the 2007 International Conference on Security & Management, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
2006
IEICE Trans. Commun., 2006
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006
Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006
Proceedings of the Information Networking, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006
2005
Proceedings of the Intelligence and Security Informatics, 2005
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities.
Proceedings of the Information Networking, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
2003
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems.
IEEE Trans. Parallel Distributed Syst., 2003
Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization.
Parallel Comput., 2003
2001
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets.
Proceedings of the ACM SIGCOMM 2001 Conference on Applications, 2001
On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001
1997
Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
IEEE Trans. Computers, 1997
1995
Proceedings of the 2nd International Workshop on Real-Time Computing Systems and Applications, October 25, 1995
Proceedings of the Digest of Papers: FTCS-25, 1995