Kyungroul Lee
Orcid: 0000-0003-1477-7569
According to our database1,
Kyungroul Lee
authored at least 60 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability.
Sensors, February, 2024
2023
Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing.
Sensors, April, 2023
Sensors, March, 2023
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.
Sensors, 2023
2022
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.
Entropy, 2022
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT.
Digit. Commun. Networks, 2022
2021
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey.
Wirel. Commun. Mob. Comput., 2021
Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT.
IEEE Access, 2021
Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
2020
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service.
Secur. Commun. Networks, 2020
Facilitating User Authorization from Imbalanced Data Logs of Credit Cards Using Artificial Intelligence.
Mob. Inf. Syst., 2020
Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication.
Entropy, 2020
CoRR, 2020
Vulnerability analysis on the image-based authentication: Through the WM_INPUT message.
Concurr. Comput. Pract. Exp., 2020
2019
True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing.
Sensors, 2019
Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems.
IEEE Access, 2019
Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication.
IEEE Access, 2019
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
2018
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services.
J. Sensors, 2018
TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network.
IEEE Access, 2018
Vulnerability analysis of secure USB: based on the fingerprint authentication of product B.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Advances on Broadband and Wireless Computing, 2018
2017
Secur. Commun. Networks, 2017
A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function.
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the Big Data Technologies and Applications - 8th International Conference, 2017
2016
An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers.
Comput. Stand. Interfaces, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016
2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
2013
J. Internet Serv. Inf. Secur., 2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
2012
Secur. Commun. Networks, 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Internet Serv. Inf. Secur., 2012
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols.
Comput. Math. Appl., 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010