maTLS: How to Make TLS middlebox-aware? H Lee, Z Smith, J Lim, G Choi, S Chun, T Chung, TT Kwon The Network and Distributed System Security (NDSS) conference, 2019 | 47 | 2019 |
Position estimation of robotic mobile nodes in wireless testbed using GENI A Abdelhadi, F Rechia, A Narayanan, T Teixeira, R Lent, D Benhaddou, ... 2016 Annual IEEE Systems Conference (SysCon), 1-6, 2016 | 33 | 2016 |
TLS 1.3 in practice: How TLS 1.3 contributes to the internet H Lee, D Kim, Y Kwon Proceedings of the Web Conference 2021, 70-79, 2021 | 30 | 2021 |
A preliminary study on disaster waste detection and volume estimation based on 3D spatial information HT Yoo, H Lee, S Chi, BG Hwang, J Kim Computing in Civil Engineering 2017, 428-435, 2017 | 20 | 2017 |
D2TLS: delegation-based DTLS for cloud-based IoT services E Cho, M Park, H Lee, J Choi, TT Kwon Proceedings of the International Conference on Internet of Things Design and …, 2019 | 12 | 2019 |
MQTLS: toward secure MQTT communication with an untrusted broker H Lee, J Lim 2019 International Conference on Information and Communication Technology …, 2019 | 10 | 2019 |
ICN-OMF: A control, management framework for Information-Centric Network testbed L Hyunwoo, D Kim, J Suh, T Taekyoung 2015 International Conference on Information Networking (ICOIN), 416-417, 2015 | 9 | 2015 |
Vwanalyzer: A systematic security analysis framework for the voice over wifi protocol H Lee, I Karim, N Li, E Bertino Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 7 | 2022 |
Analyzing spatial differences in the TLS security of delegated web services J Lee, H Lee, J Jeong, D Kim, TT Kwon Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 6 | 2021 |
AppSniffer: Towards robust mobile app fingerprinting against VPN S Oh, M Lee, H Lee, E Bertino, H Kim Proceedings of the ACM Web Conference 2023, 2318-2328, 2023 | 4 | 2023 |
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks H Lee, A Mudgerikar, A Kundu, N Li, E Bertino European Symposium on Research in Computer Security, 549-568, 2022 | 4 | 2022 |
Towards Efficient Privacy-Preserving Deep Packet Inspection W Wang, H Lee, Y Huang, E Bertino, N Li European Symposium on Research in Computer Security, 166-192, 2023 | 3 | 2023 |
Enabling sdn experimentation with wired and wireless resources: The smartfire facility K Choumas, T Korakis, H Lee, D Kim, J Suh, TT Kwon, P Martinez-Julia, ... Cloud Computing: 6th International Conference, CloudComp 2015, Daejeon …, 2016 | 3 | 2016 |
Machine Learning Techniques for Cybersecurity E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Springer Nature, 2023 | 2 | 2023 |
Enabling SDN experimentation with wired and wireless resources: The smartFIRE facility J Suh, TT Kwon, P Martinez-Julia, A Skarmeta, T You, L Baron, S Fdida, ... Cloud Computing: 6th International Conference, Cloud-Comp 2015, Daejeon …, 2016 | 2 | 2016 |
RAON: A recursive abstraction of SDN control-plane for large-scale production networks M Kwak, H Lee, J Shin, J Suh, T Taekyoung 2015 International Conference on Information Networking (ICOIN), 426-427, 2015 | 2 | 2015 |
How to decentralize the internet: A focus on data consolidation and user privacy J Song, H Jung, S Chun, H Lee, M Kang, M Park, E Cho Computer Networks 234, 109911, 2023 | 1 | 2023 |
ZTLS: A DNS-based Approach to Zero Round Trip Delay in TLS handshake S Lim, H Lee, H Kim, H Lee, T Kwon Proceedings of the ACM Web Conference 2023, 2360-2370, 2023 | 1 | 2023 |
A Pro-Active Defense Framework for IoT Systems E Bertino, H Lee, M Huang, C Katsis, Z Shen, B Ribeiro, D De Mello, ... 2023 IEEE 9th International Conference on Collaboration and Internet …, 2023 | | 2023 |
Challenges in the Use of ML for Security E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 131-143, 2023 | | 2023 |