Seungsoo Lee

Orcid: 0000-0002-6883-1869

According to our database1, Seungsoo Lee authored at least 33 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing.
IEEE Trans. Inf. Forensics Secur., 2024

Fatriot: Fault-tolerant MEC architecture for mission-critical systems using a SmartNIC.
J. Netw. Comput. Appl., 2024

Unified approach to artificial compressibility and local low Mach number preconditioning.
J. Comput. Phys., 2024

Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective.
Comput. Networks, 2024

Automated construction safety reporting system integrating deep learning-based real-time advanced detection and visual question answering.
Adv. Eng. Softw., 2024

BotFence: A Framework for Network-Enriched Botnet Detection and Response With SmartNICs.
IEEE Access, 2024

KubeAegis: A Unified Security Policy Management Framework for Containerized Environments.
IEEE Access, 2024

KubeRosy: A Dynamic System Call Filtering Framework for Containers.
IEEE Access, 2024

2023
Secure Inter-Container Communications Using XDP/eBPF.
IEEE/ACM Trans. Netw., April, 2023

Efficient Collaboration Between Radiologists Using the PACS-Integrated Refer Function to Reduce Communication Times.
J. Imaging Inform. Medicine, 2023

Kunerva: Automated Network Policy Discovery Framework for Containers.
IEEE Access, 2023

2022
A Framework for Policy Inconsistency Detection in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2022

Case Study: Improving the Quality of Dairy Cow Reconstruction with a Deep Learning-Based Framework.
Sensors, 2022

FuzzDocs: An Automated Security Evaluation Framework for IoT.
IEEE Access, 2022

Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Multilabel Image Classification with Deep Transfer Learning for Decision Support on Wildfire Response.
Remote. Sens., 2021

SW2D-GPU: A two-dimensional shallow water model accelerated by GPGPU.
Environ. Model. Softw., 2021

2020
Application of Convolutional Neural Network for Spatiotemporal Bias Correction of Daily Satellite-Based Precipitation.
Remote. Sens., 2020

A comprehensive security assessment framework for software-defined networks.
Comput. Secur., 2020

BASTION: A Security Enforcement Network Stack for Container Networks.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Improving the Performance of Serial Arc Detection using VMD and Deep Neural Network.
Proceedings of the 62nd IEEE International Midwest Symposium on Circuits and Systems, 2019

2018
Hyper-resolution 1D-2D urban flood modelling using LiDAR data and hybrid parallelization.
Environ. Model. Softw., 2018

RE-CHECKER: Towards Secure RESTful Service in Software-Defined Networking.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018

2017
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2017

DELTA: A Security Assessment Framework for Software-Defined Networks.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
The Smaller, the Shrewder: A Simple Malicious Application Can Kill an Entire SDN Environment.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

2015
Enabling security functions with SDN: A feasibility study.
Comput. Networks, 2015

SPIRIT: A Framework for Profiling SDN.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

2012
A cache management scheme to support offline environment in cloud system.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2005
Traffic Grooming Algorithm Using Shortest EDPs Table in WDM Mesh Networks.
Proceedings of the Computational Science, 2005

2004
Ranking the sequences of fuzzy values.
Inf. Sci., 2004

Comparison Of Type-2 Fuzzy Values With Satisfaction Function.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2004


  Loading...