Publication

Journal/Conference Papers

  • Li, Jin, et al. "A Time-Sensitive Networking Traffic Scheduling Method Based on Q-Learning Routing Optimization." 2024 18th International Conference on Ubiquitous Information Management and Communication (IMCOM). IEEE, 2024.
  • Ahn, Seonggwan, Thummin Lee, and Keecheon Kim. "A study on improving security of ics through honeypot and arp spoofing." 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019.
  • Ahn, Seonggwan, Thummin Lee, and Keecheon Kim. "A study on improving security of ics through honeypot and arp spoofing." 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019.
  • Lee, Thummim, Sangwon Kim, and Keechoen Kim. "A research on the vulnerabilities of PLC using search engine." 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019.
  • Du, Sang Gyun, Jong Won Lee, and Keecheon Kim. "Proposal of GRPC as a new northbound API for application layer communication efficiency in SDN." Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication. 2018.
  • Park, Sun-young, and Keecheon Kim. "A study on the processing and reinforcement of message digest through two-dimensional array masking." 2018 International Conference on Information Networking (ICOIN). IEEE, 2018.
  • Wei, Min, et al. "Secure Framework and Key Agreement Mechanism for OPC-UA in Industrial IoT." Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication. 2018.
  • Kim, Keecheon, Jung Hyun An, and Joseph Yoo. "A design of IL-CyTIS for automated cyber threat detection." 2018 International Conference on Information Networking (ICOIN). IEEE, 2018.
  • Jin, Jungha, Minyoung Shin, and Keecheon Kim. "An Efficient Routing Protocol with Multihop in Ad-hoc Sensor Network in SDN Environment."
  • Park, Sung-Su, Sang Gyun Du, and Keecheon Kim. "Application of a HID certificate issue algorithm for strengthening private information security over the V2V environment." 2017 International Conference on Information Networking (ICOIN). IEEE, 2017.
  • Wei, Min, Zhen Wang, and Keecheon Kim. "An implementation of security mechanism in chip for industrial wireless networks." 2017 International Conference on Information Networking (ICOIN). IEEE, 2017.
  • Kim, Green, Junghyun An, and Keecheon Kim. "A study on authentication mechanism in SEaaS for SDN." Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication. 2017.
  • Tan, Sery Vuth, Minh Yuk Choi, and Kee Cheon Kim. "The New Mechanism to Detect and Prevent BlackHole Attacks on AODV-Based MANET." Advanced Materials Research 684 (2013): 547-550.
  • Sok, Phearin, Sueng Hwan Lee, and Kee Cheon Kim. "DPRoPHET Routing in Delay Tolerant Network." Advanced Materials Research 684 (2013): 543-546.
  • Heo, Ju Seung, Ki Sang Ok, and Kee Cheon Kim. "Public Key Techniques for Prevention of Resource Exhaustion Attack in Wireless Sensor Networks." Advanced materials research 740 (2013): 159-163.
  • Jo, Mi Young, Green Kim, and KeeCheon Kim. "A Research on the Regional Management Methods Using the Agents for Software Defined Network." Advanced Science Letters 22.11 (2016): 3464-3468.
  • Choi, Jiwon, and Keecheon Kim. "Single sign on system architecture based on SAML in web service environment using ENUM system." Asia-Pacific Network Operations and Management Symposium. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007.
  • Park, Hansol, et al. "Design and experimental validation of UAV control system software based on the TMO structuring scheme." Software Technologies for Embedded and Ubiquitous Systems: 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papers 5. Springer Berlin Heidelberg, 2007.
  • Lee, Dongkeun, Keecheom Lim, and Moonhae Kim. "Hierarchical route optimization for nested mobile network." 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.. Vol. 1. IEEE, 2004.
  • Kim, Keecheon. "Multi-agent deep q network to enhance the reinforcement learning for delayed reward system." Applied Sciences 12.7 (2022): 3520.
  • Kim, Keecheon. "Enhancing Reinforcement Learning Performance in Delayed Reward System Using DQN and Heuristics." IEEE Access 10 (2022): 50641-50650.
  • Kim, Sang-Won, and Kee-Cheon Kim. "Traffic Type Recognition Method for Unknown Protocol—Applying Fuzzy Inference." Electronics 10.1 (2020): 36.
  • Jung, Tackhyun, Sangwon Kim, and Keecheon Kim. "Deepvision: Deepfakes detection using human eye blinking pattern." IEEE Access 8 (2020): 83144-83154.
  • Jin, Jungha, and Keecheon Kim. "3D CUBE algorithm for the key generation method: Applying deep neural network learning-based." IEEE Access 8 (2020): 33689-33702.
  • Wei, Min, et al. "An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things." International Journal of Distributed Sensor Networks 14.1 (2018): 1550147718754793.
  • Kim, Youngse, Ung Heo, and Keecheon Kim. "Improved hash and transmission method for larger packets in the RADIUS protocol." Security and Communication Networks 9.18 (2016): 4839-4851.
  • Kim, Green, et al. "A lightweight authentication mechanism in MIP networks." Security and Communication Networks 9.17 (2016): 4272-4284.
  • Wei, Min, and Keecheon Kim. "An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks." International Journal of Distributed Sensor Networks 12.11 (2016): 1550147716676094.
  • Kim, Jongwan, Dukshin Oh, and Keecheon Kim. "QMBRi: Inverse quantization of minimum bounding rectangles for spatial data compression." Computing and Informatics 32.4 (2013): 679-696.
  • Wei, Min, and Keecheon Kim. "An effective mechanism against intrusion attack using aggregate traffic prediction for wireless industrial networks." Information: an international Interdisciplinary journal 15.11 (2012): 4457-4462.
  • Kim, Jongwan, Dukshin Oh, and Keecheon Kim. "Indexing of tagged moving objects over localized trajectory with time intervals in RFID systems." IEICE TRANSACTIONS on Information and Systems 93.9 (2010): 2639-2642.
  • Lee, Sang-min, and Keecheon Kim. "An effective path recovery mechanism for AODV using candidate node." International Symposium on Parallel and Distributed Processing and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.
  • Kim, Insu, and Keecheon Kim. "Design of authentication mechanism using PANA CTP in FMIPv6 environment." International Symposium on Parallel and Distributed Processing and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.
  • Yoo, Jae-Pil, and Kee-Cheon Kim. "Dynamic anchor based mobility management scheme for mobile IP networks." International Symposium on Parallel and Distributed Processing and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.
  • Choi, Jiwon, and Keecheon Kim. "Icon-URI structure with ENUM system for mobile device." International Symposium on Parallel and Distributed Processing and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.
  • Lee, Dongkeun, and Keecheon Kim. "Fast IPv6 address auto-configuration using proxy for mobile environment." International Symposium on Ubiquitious Computing Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.
  • Lee, Dongkeun, and Keecheon Kim. "Fast IPv6 addressing technique for mobile ad hoc networks." International Conference on Ubiquitous Intelligence and Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.
  • Kim, Keecheon, et al. "Hierarchical route optimization in mobile network and performance evaluation." International Conference on Embedded Software and Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005.
  • Lee, Dongkeun, et al. "IPv6 stateless address auto-configuration in mobile ad-hoc network." Asia-Pacific Web Conference. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.
  • Lee, Dongkeun, Keecheon Kim, and Sunyoung Han. "Design of Mobile Network Route Optimization Based on the Hierarchical Algorithm." Computational Science and Its Applications–ICCSA 2004: International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I 4. Springer Berlin Heidelberg, 2004.
  • Hong, Sungjune, et al. "Personal Service on Application Level Active Network for Ubiquitous Computing Environments." International Conference on Information Networking. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004.
  • Pil Yoo, Jae, Kee Choen Kim, and Hyun Seung Choo. "Cellular packet network supporting multi-level hierarchical regional registration." CDMA International Conference. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002.
  • Kim, Chinchol, et al. "The differentiated call processing based on the simple priority-scheduling algorithm in SIP6." International Conference on Computational Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002.
  • Hong, Juhee, et al. "Workload scheduler with fault tolerance for MMSC." Computational Science—ICCS 2002: International Conference Amsterdam, The Netherlands, April 21–24, 2002 Proceedings, Part I 2. Springer Berlin Heidelberg, 2002.
  • Kim, Chinchol, et al. "Design and implementation of the VoIPv6 supporting the differentiated call processing." Information Networking: Wired Communications and Management: International Conference, ICOIN 2002 Cheju Island, Korea, January 30–February 1, 2002 Revised Papers, Part I. Springer Berlin Heidelberg, 2002.
  • Yong Youn, Hee, et al. "A New Incremental Rerouting for Handoff inWireless ATM Networks." The Human Society and the Internet Internet-Related Socio-Economic Issues: First International Conference, Human. Society@ Internet 2001 Seoul, Korea, July 4–6, 2001 Proceedings 1. Springer Berlin Heidelberg, 2001.
  • Wei, Min, and Keecheon Kim. "Intrusion detection scheme using traffic prediction for wireless industrial networks." Journal of Communications and Networks 14.3 (2012): 310-318.
  • Wei, Min, Keecheon Kim, and Ping Wang. "A mutual authentication scheme with key agreement for industrial wireless network." Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication. 2011.
  • Lee, Woosin, et al. "Packet forwarding based on reachability information for VANETs." Information Networking. Towards Ubiquitous Networking and Services: International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers. Springer Berlin Heidelberg, 2008.
  • Sun, Shimin, et al. "Zone-based greedy perimeter stateless routing for VANET." 2009 International Conference on Information Networking. IEEE, 2009.
  • Jung, Yunho, and Keecheon Kim. "Movement Awareness position-based routing protocol for Intersection of Urban Environment." 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications. IEEE, 2008.
  • Lee, Jung-Eun, and Keecheon Kim. "Diamond-shaped routing method for reliable data transmission in wireless sensor networks." 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications. IEEE, 2008.
  • Choe, Jisul, and Keecheon Kim. "EADD: Energy aware directed diffusion for wireless sensor networks." 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications. IEEE, 2008.
  • Lee, Sangmin, et al. "An Effective Encryption Mechanism using Selective algorithm for Video Telephony." (2007): 210-214.
  • Kim, Insu, and Keecheon Kim. "Secure session management mechanism in voip service." Frontiers of High Performance Computing and Networking ISPA 2007 Workshops: ISPA 2007 International Workshops SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN Niagara Falls, Canada, August 28-September 1, 2007 Proceedings 5. Springer Berlin Heidelberg, 2007.
  • Yang, Kwangmo, and Keecheon Kim. "A frame-based selective encryption method for real time video transmission on VoIP." International Symposium on Parallel and Distributed Processing and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007.
  • Lee, Sangmin, and Keecheon Kim. "An effective local repair scheme using candidate node and hello message in AODV." International Symposium on Parallel and Distributed Processing and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007.
  • Yoo, Jae-Pil, Kee-cheon Kim, and SunYoung Han. "Independent zone setup scheme for re-configurable wireless network." Computational Science—ICCS 2003: International Conference Melbourne, Australia and St. Petersburg, Russia June 2–4, 2003 Proceedings, Part II 3. Springer Berlin Heidelberg, 2003.
  • Kang, Hyunsik, and Keecheon Kim. "Design of mobile IP extension for nested mobile network." Computational Science and Its Applications—ICCSA 2003: International Conference Montreal, Canada, May 18–21, 2003 Proceedings, Part II 3. Springer Berlin Heidelberg, 2003.
  • Yoo, Jae-Pil, et al. "Secure and scalable mobile IP registration scheme using PKI." Computational Science and Its Applications—ICCSA 2003: International Conference Montreal, Canada, May 18–21, 2003 Proceedings, Part II 3. Springer Berlin Heidelberg, 2003.
  • Yoo, Jae-Pil, Kee-cheon Kim, and SunYoung Han. "Independent zone setup scheme for re-configurable wireless network." Computational Science—ICCS 2003: International Conference Melbourne, Australia and St. Petersburg, Russia June 2–4, 2003 Proceedings, Part II 3. Springer Berlin Heidelberg, 2003.
  • Kim, Sangwon, Thummim Lee, and Keecheon Kim. "Research on the traffic type recognition technique for advanced network control using Floodlight." 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM). IEEE, 2020.
  • Han, Keunhee, Minyoung Shin, and Keecheon Kim. "CRYPTOPERIOD COUNTER (CC) AND DERIVED KEY PER ACCESS FOR REAL TIME (DEKART)." PONTE International Journal of Science and Research 75.5 (2019).
  • Jin, Jungha, Yewon Oh, and Keecheon Kim. "A Lightweight Block Cipher Algorithm for Secure SDN Environment." International Journal of Advanced Research in Engineering 4.4 (2018): 1-6.
  • Kim, Jun-Tae, Jungha Jin, and Keecheon Kim. "A study on an energy-effective and secure consensus algorithm for private blockchain systems (PoM: Proof of Majority)." 2018 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2018.
  • Nam, Kiho, and Keecheon Kim. "A Study on SDN security enhancement using open source IDS/IPS Suricata." 2018 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2018.
  • Kim, Jonghoon, Jungha Jin, and Keecheon Kim. "Multiple Studies Using License Plate Recognition System HD CCTV." 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2016.
  • Kim, Green, and Keecheon Kim. "A study on the adaptation of the firefly algorithm for the synchronization between multiple controllers in SDN environment." 2016 International Conference on Information Networking (ICOIN). IEEE, 2016.
  • Kim, Woobin, Jungha Jin, and Keecheon Kim. "A Routing Protocol Method that sets up Multi-hops in the Ad-hoc network." Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. 2016.
  • Jo, Mi Young, and Keecheon Kim. "A research on the regional routing scheme based mobile agent for SDN." 2016 International Conference on Information Networking (ICOIN). IEEE, 2016.
  • Sok, Phearin, and Keecheon Kim. "Prophet routing based on distance mechanism in disruption-tolerant network." Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication. 2014.
  • Sok, Phearin, Seryvuth Tan, and Keecheon Kim. "PRoPHET routing protocol based on neighbor node distance using a community mobility model in delay tolerant networks." 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. IEEE, 2013.
  • Tan, Seryvuth, and Keecheon Kim. "Secure Route Discovery for preventing black hole attacks on AODV-based MANETs." 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. IEEE, 2013.
  • Sok, Phearin, and Keecheon Kim. "Distance-based PRoPHET routing protocol in disruption tolerant network." 2013 International conference on ICT convergence (ICTC). IEEE, 2013.
  • Heo, Juseung, et al. "The new lightweight encryption mechanism for large media signal processing system in global content delivery network." Information Technology and Computer Application Engineering: Proceedings of the International Conference on Information Technology and Computer Application Engineering (ITCAE 2013). CRC Press, 2013.
  • Thanh, Pham Ngoc, and Keecheon Kim. "Implementation of open two-factor authentication service applied to virtual private network." The International Conference on Information Networking 2013 (ICOIN). IEEE, 2013.
  • Thanh, Pham Ngoc, and Keecheon Kim. "An enhanced mechanism with cryptographic computation cost reduction in AAA-mobile IP architecture." Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication. 2013.
  • Thanh, Pham Ngoc, and Keecheon Kim. "A methodology for implementation and integration Two-Factor Authentication into VPN." 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC). IEEE, 2012.
  • Min, Wei, Keecheon Kim, and Wang Ping. "A traffic management scheme using multi-channel sniffer for secure wireless networks." Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication. 2012.
  • Wei, Min, Keecheon Kim, and Ping Wang. "Research on a mutual authentication scheme for wireless sensor networks." The International Conference on Information Network 2012. IEEE, 2012.
  • Wei, Min, et al. "Research and implementation on the security scheme of industrial wireless network." The International Conference on Information Networking 2011 (ICOIN2011). IEEE, 2011.
  • Jung, Yunho, et al. "Network Coding Scheme for Enhanced Data Throughput in VANET." 17th ITS World CongressITS JapanITS AmericaERTICO. 2010.
  • Wang, Heng, et al. "An adaptive deterministic scheduling scheme for WIA-PA industrial wireless networks." 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE). Vol. 2. IEEE, 2010.
  • Min, Wei, et al. "Research and implementation of the security method based on WIA-PA standard." 2010 International Conference on Electrical and Control Engineering. IEEE, 2010.
  • Jin, Yan, Miyoung Jo, and Keecheon Kim. "Optimization for Routing Protocol based on Location Information in VANET." Proceedings of the Korea Information Processing Society Conference. Korea Information Processing Society, 2010.
  • Kim, Jong-Hyun, Kee-Cheon Kim, and Woo-Young Jung. "Grid-based Location Service Spot scheme for optimized routing path on VANET." The Journal of The Korea Institute of Intelligent Transport Systems 9.1 (2010): 76-90.
  • Kim, Jonghyun, et al. "Efficient Routing Scheme Using Circular Node for VANET." Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications. IEEE, 2009.
  • Choi, Jiwon, and Keecheon Kim. "A Study on Icon-URI Structure compatible with the ENUM System for Mobile Device." 2006 International Conference on Computational Intelligence and Security. Vol. 2. IEEE, 2006.
  • Lee, Dongkeun, et al. "Distributed ipv6 addressing technique for mobile ad-hoc networks." Proceedings of the 2006 ACM symposium on Applied computing. 2006.
  • Kim, Insu, and Keecheon Kim. "Local authentication mechanism for micro mobility in wireless active network environment." 2006 8th International Conference Advanced Communication Technology. Vol. 2. IEEE, 2006.
  • Lee, Dongkeun, et al. "IPv6 stateless address auto-configuration in mobile ad-hoc network (T-DAD) and performance evaluation." Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks. 2005.

Patents

  • 사이버 위협 정보에 대한 통합 표현 규격 데이터 생성 방법 및 장치(APPARATUS AND METHOD FOR GENERATING INTEGRATED REPRESENTATION SPECIFICATION DATA FOR CYBER THREAT INFORMATION), 출원번호10-2017-0171242, 등록번호10-2017-0171242
  • GANs을 이용한 보안 로그 데이터의 이상 탐지 방법 및 이를 수행하는 장치들(METHOD OF DETECTING ABNORMALITY OF SECURITY LOG DATA USING GENERATIVE ADVERSARIAL NETWORKS AND APPARATUSES PERFORMING THE SAME), 출원번호10-2018-0021993, 등록번호10-2018-0021993
  • 주파수 계수기반 스테고분석에 안전한 제이팩 스테가노그래피 소프트웨어, 출원번호C-2019-043973, 등록번호C-2019-043973
  • 테트리스 게임 대상 강화학습 소프트웨어, 출원번호C-2019-043974, 등록번호C-2019-043974
  • LPWAN 환경의 네트워크 시뮬레이션 소프트웨어, 출원번호C-2019-041113, 등록번호C-2019-041113
  • LPWAN 환경에서의 SVM 기반의 Smart IPS/IDS 시스템, 출원번호C-2019-041112, 등록번호C-2019-041112
  • SDN의 보안 인증을 강화하기 위하여 FIDO UAF에 사용자를 식별하기 위한 Open ID IDP를 적용하는 인증 방법 및 인증 장치(AN AUTHENTICATING APPARATUS AND AN AUTHENTICATING METHOD APPLYING OPEN ID IDP FOR IDEN, 출원번호10-2017-0169602, 등록번호10-2017-0169602
  • 홈 IoT 환경에서의 보안성 제공 장치 및 방법(APPARATUS AND METHOD FOR PROVIDING SECURITY IN HOME IoT), 출원번호10-2017-0169752, 등록번호10-2017-0169752
  • SDN에서 애플리케이션 레이어의 통신을 위한 노스바운드 API로써의 gRPC(A GENERAL REMOTE PROCEDURE CALL AS A NORTHBOUND APPLICATION PROGRAMMING INTERFACE FOR COMMUNICATION IN AN APPLICATION LAYER OF A SOF, 출원번호10-2017-0169575, 등록번호10-2017-0169575
  • 이미지 벡터 처리를 이용한 해시 암호화 방법 및 장치(A METHOD AND APPARATUS FOR HASH ENCRYPTION USING IMAGE VECTOR PROCESSING), 출원번호10-2017-0092764, 등록번호10-2017-0092764
  • 반딧불 알고리즘 기반 에이전트 관리 방법 및 장치(AGENT MANAGEMENT METHOD AND APPARATUS BASED ON FIREFLY ALGORITHM), 출원번호10-2018-0021960, 등록번호10-2018-0021960
  • SDN 콘트롤러에서 키 관리 서버를 이용한 보안 통신 방법 및 이를 수행하는 장치(SECURITY COMMUNICATION METHOD USING KEY MANAGEMENT SERVER IN SOFTWARE DEFINED NETWORK CONTROLLER AND APPARATUS FOR PERFOMING, 출원번호10-2017-0169745, 등록번호10-2017-0169745
  • ECU 보안 유지를 위한 인증서 기반 차량 보안 방법 및 장치, 출원번호10-2017-0055424, 등록번호10-1982917
  • SDN 환경에서 애드-혹 센서 네트워크 내의 패킷 전송 방법 및 장치, 출원번호10-2018-0021979, 등록번호10-1972696
  • 차량의 인증서 생성 방법 및 장치, 출원번호10-2017-0011014, 등록번호10-1954507
  • SDN 내 어플리케이션 및 컨트롤러 간의 인증 방법 및 이를 수행하는 어플리케이션 컨트롤러, 출원번호10-20170011209, 등록번호10-1945094
  • 전송계층 프로토콜 상태 및 Spec 추출 소프트웨어, 출원번호C-2019-002671, 등록번호C-2019-002671
  • 전송계층 프로토콜 상태 추론 소프트웨어, 출원번호C-2019-002672, 등록번호C-2019-002672
  • 사용자 인증 및 인증 요청 방법 및 이를 수행하는 장치, 출원번호10-2017-0011178, 등록번호10-1943183
  • 지역적 라우팅 제어 및 동기화 생체 모방 알고리즘 SW, 출원번호C-2018-039536, 등록번호C-2018-039536
  • 자율 제어 네트워크 환경에서의 노드/에이전트 관리 생체모방 알고리즘 성능평가 NSV(엔에스브이) 프로그램, 출원번호C-2018-039537, 등록번호C-2018-039537
  • 군집화 머신러닝을 통한 LoRa(로라 통신) 패킷 Anomaly(이상) 탐지 알고리즘, 출원번호C-2018-039534, 등록번호C-2018-039534
  • LPWAN(근거리 로라 통신) 전용망 환경에 적합한 IDS/IPS(침입 탐지/차단) 소프트웨어, 출원번호C-2018-039535, 등록번호C-2018-039535
  • 지역적 라우팅 제어 및 동기화 생체 모방 알로기즘 SW(소프트워어), 출원번호C-2018-039536, 등록번호C-2018-039536
  • 자율 제어 네트워크 환경에서의 노드/에이전트 관리 생체모방 알고리즘 성능평가 NSV 프로그램, 출원번호C-2018-039537, 등록번호C-2018-039537
  • 아두이노 나노를 활용한 식물 생장 지원 서비스 제공 SW, 출원번호C-2018-039530, 등록번호C-2018-039530
  • 패킷 전송 방법 및 오픈플로우 스위치, 출원번호10-2017-0011073, 등록번호10-1924712
  • 번호판 인식 방법 및 번호판 인식 장치(METHOD AND APPARATUS FOR RECOGNIZING LICENSE PLATE), 출원번호10-2017-0010468, 등록번호10-2017-0010468
  • 번호판 인식 방법 및 번호판 인식 장치, 출원번호10-2017-0010468, 등록번호10-1851492
  • 데이터 암호화 방법 및 장치, 및 데이터 복호화 방법 및 장치, 출원번호10-2016-0022286, 등록번호10-1824315
  • 저전력광역통신망(LPWAN)에서의 선택적 암호화 인증(SEA) 시스템을 위한 건국경량암호화(KULAS) 소프트웨어, 출원번호C-2017-034572, 등록번호C-2017-034572
  • 자율 제어 네트워크 환경에서의 노드/에이전트 관리 네트워크시뮬레이터시각화(NSV) 프로그램, 출원번호C-2017-034573, 등록번호C-2017-034573
  • 자율 제어 네트워크 환경에서의 노드 제어용 생체모방 동기화 알고리즘 SW, 출원번호C-2017-034574, 등록번호C-2017-034574
  • 저전력광역통신(LPWAN) 보안 강화를 위해 기기 주소(Device Address)의 클래싱을 이용한 선택적 암호화 인증(SEA) 소프트웨어, 출원번호C-2017-034571, 등록번호C-2017-034571
  • 침해사고 대응 블록체인 소프트웨어, 출원번호C-2017-034055, 등록번호C-2017-034055
  • 침해사고 대응 데이터마이닝 소프트웨어, 출원번호C-2017-034054, 등록번호C-2017-034054
  • 블록체인을 이용한 랜섬웨어 방지 방법 및 장치(A METHOD AND APPARATUS FOR PREVENTING RANSOMWARE USING BLOCKCHAIN), 출원번호10-2017-0171443, 등록번호10-2017-0171443
  • 스트리밍 데이터 전송시 적용 가능한 AES 256 기반의 경량 암호화 알고리즘, 출원번호C-2017-017039, 등록번호C-2017-017039
  • 스트리밍 데이터 전송시 선택적 부분 암호화 알고리즘 적용 송수신 소프트웨어, 출원번호C-2017-017040, 등록번호C-2017-017040
  • 콘트롤러 동기화 방법 및 콘트롤러, 출원번호10-2016-0022290, 등록번호10-1741359
  • 자율 제어 네트워크 환경에서의 노드 자율 관리 프로그램, 출원번호C-2017-001020, 등록번호C-2017-001020
  • 자율 제어 네트워크 환경에서의 노드 관리 에이전트 프로그램, 출원번호C-2017-001021, 등록번호C-2017-001021
  • 애드-혹 네트워크 내의 패킷 전송 방법 및 장치, 출원번호10-2016-0022596, 등록번호10-1661879
  • 디바이스 노드간의 인증 방식 경량화 및 보안성 강화 프로그램, 출원번호C-2016-017392, 등록번호C-2016-017392
  • AES 기반 경량화 암호 알고리즘 SW, 출원번호C-2016-017328, 등록번호C-2016-017328
  • OTP 적용 키관리 방식의 경량 암/복호화 프로그램, 출원번호C-2016-017327, 등록번호C-2016-017327
  • 콘텐츠 전송 네트워크 서비스 제공 장치 및 그 방법, 출원번호10-2015-0027172, 등록번호10-1615476
  • 콘텐츠 전송 네트워크에서의 데이터 보안 장치 및 그 방법, 출원번호10-2015-0027172, 등록번호10-1609095
  • 보안성이 향상된 암복호화 장치 및 방법, 출원번호10-2014-0084365, 등록번호10-1566416
  • 긴급메시지 전송 장치 및 방법과 긴급 메시지 전송 장치의 시험 장치 및 시험 방법, 출원번호10-2013-0160001, 등록번호10-1553022
  • 모바일 환경의 공간 스카이라인을 위한 가시권 이웃 질의 방법, 출원번호10-2013-0059525, 등록번호10-1516631
  • VPN에서 이중 인증을 구현하기 위한 장치 및 이의 동작 방법, 출원번호10-2014-0038635, 등록번호10-1510290
  • 보안 루트 생성 장치 및 방법, 출원번호10-2013-0156472, 등록번호10-1508322
  • 안전한 무선 네트워크를 위한 멀티 채널 스니퍼 활용에 따른 트래픽 관리 시스템 및 그 방법, 출원번호10-2013-0018231, 등록번호10-1479672
  • 멀티 해시 키 프레임을 이용한 스크램블링 암호화 시스템, 출원번호10-2013-0160732, 등록번호10-1476164
  • 블랙홀 공격 탐지 장치 및 방법, 출원번호10-2013-0156471, 등록번호10-1472914
  • 인터미디어트 드라이버를 이용한 변종 악성코드 탐지 및 차단 시스템 및 그 방법, 출원번호10-2013-0032351, 등록번호10-1446280
  • 산업 무선 네트워크에서 통합 트래픽 예측을 활용한 효과적인 침입 공격 대응 시스템 및 그 방법, 출원번호10-2013-0036651, 등록번호10-1437405
  • 무선 센서 네트워크에서의 평면 라우팅 방법, 출원번호10-2007-0133701, 등록번호10-1421160
  • 무선 VoIP망에서 이동성 지원 장치 및 방법, 출원번호10-2007-0133715, 등록번호10-1372883
  • 이동 애드혹 네트워크에서 지오캐스트 기반의 멀티케스트 라우팅 경로 최적화 시스템 및 그 방법, 출원번호2011-0088044, 등록번호10-1310785
  • 산업무선네트워크에서 키에 의한 상호 인증 시스템 및 그 방법, 출원번호10-2011-0082007, 등록번호10-1267415
  • SIP를 이용한 VoIP 서비스에서의 인바이트 플러딩 공격 탐지 및 방어 시스템 및 그 방법, 출원번호10-2011-0090278, 등록번호10-1231035
  • 차량의 진행 방향과 속도를 고려한 차량 안전 통신 시스템 및 그 방법, 출원번호10-2011-0088037, 등록번호10-1218562
  • A layered intrusion detection security system for sensor networks, 출원번호201210123476.5, 등록번호201210123476.5
  • 위치정보관리방법 및 장치, 출원번호10-2009-0087170, 등록번호10-1136925
  • 그리드 기반으로 위치 정보를 제공하는 방법, 시스템 및 컴퓨터 판독 가능한 기록 매체, 출원번호2009-0104498, 등록번호10-1114437
  • 네트워크 코딩을 기반으로 멀티미디어 데이터를 전송하는 방법, 출원번호10-2009-0104506, 등록번호101091167
  • 위치정보 기반의 메시지 전송범위 제한 방법, 출원번호10-2010-0028382, 등록번호101079734
  • 센서 네트워크에서의 라우팅 방법, 출원번호10-2009-0089812, 등록번호101038543
  • 유무선 통신망에서 ENUM 시스템을 이용하여 호 설정율 중개하는 방법 및 시스템, 출원번호2008-0010313, 등록번호10-0929123
  • 프록시 주소 자동 설정을 이용한 경로 최적화 방법, 출원번호10-20080041735, 등록번호10-0921488
  • 중첩구조네트워크이동성(NEMO)망 환경에서 다중 터널링 발생을 방지하는 계층적 MIPV6 기반의 경로 최적화 기법, 출원번호10-2005-0124005, 등록번호10-2005-0124055
  • 애드 혹 네트워크에서 어드레스 할당 방법, 출원번호10-2004-0071709, 등록번호10-2004-0071709
  • 엠피엘에스 도메인 망에서의 모바일 아이피 수용 방법(Method for accepting mobile IP in MPLS domain network), 출원번호10-2000-0059745, 등록번호100384887
  • 키워드네임을 이용한 위치 관련 정보 제공 시스템 및 그 방법, 출원번호10-2004-0091331, 등록번호10-2001-048447
  • 레이블 변경 프로토콜(Label swapping protocol), 출원번호10-2001-0013504, 등록번호10-2001-0013504
  • Mobile IP를 수용하는 IMT-2000교환망의 MPLS구조, 출원번호2000-59745, 등록번호2000-59745
  • 엠진 도약 코드를 이용하는 기지국 비동기 방법 및 초기 동기획득 방법(A Fast Search Algorithm for Inter-cell Asynchronous W-CDMA System using Code Hopping Method, 출원번호10-0260457-0000, 등록번호10-0260457-0000
  • 짧은 주기 확장형 골드 코드를 이용하는 광대역 부호 분할 다중접속 방식용 기지국 비동기 방법(METHOD FOR ASYNCHRONIZING BASE STATION OF WIDE BAND CDMA SYSTEM USING SHORT PERIOD EXTENDED GOLD CODE, 출원번호10-0257808-0000, 등록번호10-0257808-0000
  • 코드 분할 다중 접속 이동 전화망의 단문 서비스를 이용한 차량위치 추적 시스템 및 차량 위치 추적 방법(), 출원번호10-1997-0059372, 등록번호10-1997-0059372

Books

  • 2022. 07. 01 컴퓨터 네트워킹 하향식 접근
  • 2012. 12. 01 CCENT/CCNA ICND1 640-822
  • 2004. 02. 27 The Wireless Mobile Internet(무선이동인터넷)
  • 2004. 02. 20 컴퓨터 및 정보통신 기초