The SCEAS System
Navigation Menu

Search the dblp DataBase


Heejo Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee, Yoojae Won
    One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:163- [Conf]
  2. Soo Kim, Heejo Lee, Wan Yeon Lee
    Improving Resiliency of Network Topology with Enhanced Evolving Strategies. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:149- [Conf]
  3. Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig
    BASE: an incrementally deployable mechanism for viable IP spoofing prevention. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:20-31 [Conf]
  4. Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee
    Human Identification Through Image Evaluation Using Secret Predicates. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:67-84 [Conf]
  5. Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    Enforcing Access Control Using Risk Assessment. [Citation Graph (0, 0)][DBLP]
    ECUMN, 2007, pp:419-424 [Conf]
  6. Jong Kim, Heejo Lee, Sunggu Lee
    Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. [Citation Graph (0, 0)][DBLP]
    FTCS, 1995, pp:174-183 [Conf]
  7. Hyunsang Choi, Heejo Lee
    PCAV: Internet Attack Visualization on Parallel Coordinates. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:454-466 [Conf]
  8. Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:357-360 [Conf]
  9. O-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim, Sang Cheon Kim, Gun Woo Nam, Joong Gil Park
    HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:652-661 [Conf]
  10. Hyundo Park, Heejo Lee
    Detecting Unknown Worms Using Randomness Check. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:775-784 [Conf]
  11. Heejo Lee, Kihong Park
    On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:338-347 [Conf]
  12. Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee
    Defending a Web Browser Against Spying with Browser Helper Objects. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:638-639 [Conf]
  13. Heejo Lee, Jong Kim
    Attack Resiliency of Network Topologies. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:638-641 [Conf]
  14. Heejo Lee, Kenji Toda, Jong Kim, Kenji Nishida, Eiichi Takahashi, Yoshinori Yamaguchi
    Performance comparison of real-time architectures using simulation. [Citation Graph (0, 0)][DBLP]
    RTCSA, 1995, pp:150-0 [Conf]
  15. Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee
    Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization. [Citation Graph (0, 0)][DBLP]
    SAC (2), 2000, pp:641-648 [Conf]
  16. Kihong Park, Heejo Lee
    On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2001, pp:15-26 [Conf]
  17. Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee
    Cascade Damage Estimation Model for Internet Attacks. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:163-164 [Conf]
  18. Pho Duc Giang, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:698-703 [Conf]
  19. Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam
    SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:60-65 [Conf]
  20. Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee
    Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 2003, v:29, n:1, pp:135-159 [Journal]
  21. Jong Kim, Heejo Lee, Sunggu Lee
    Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1997, v:46, n:4, pp:499-505 [Journal]
  22. Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee
    Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:4, pp:394-407 [Journal]
  23. Wan Yeon Lee, Heejo Lee, Hyogon Kim
    Energy-Aware QoS Adjustment of Multimedia Tasks with Uncertain Execution Time. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:709-712 [Conf]
  24. Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    Activity-based Access Control Model to Hospital Information. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2007, pp:488-496 [Conf]
  25. Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2007, pp:482-487 [Conf]
  26. Changhee Lee, Heejo Lee
    A password stretching method using user specific salts. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:1215-1216 [Conf]
  27. Hyogon Kim, Sangki Yun, Heejo Lee, Inhye Kang, Kyu-Young Choi
    A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  28. Hassan Jameel, Heejo Lee, Sungyoung Lee
    Using Image Attributes for Human Identification Protocols [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  29. Botnet Detection by Monitoring Group Activities in DNS Traffic. [Citation Graph (, )][DBLP]

  30. Reducing Payload Scans for Attack Signature Matching Using Rule Classification. [Citation Graph (, )][DBLP]

  31. BARI: A Distributed Key Management Approach for Wireless Body Area Networks. [Citation Graph (, )][DBLP]

  32. Contextual Risk-Based Access Control. [Citation Graph (, )][DBLP]

  33. Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations. [Citation Graph (, )][DBLP]

  34. PROBE: A Process Behavior-Based Host Intrusion Prevention System. [Citation Graph (, )][DBLP]

  35. Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. [Citation Graph (, )][DBLP]

  36. Distinguishing between FE and DDoS Using Randomness Check. [Citation Graph (, )][DBLP]

  37. Detecting metamorphic malwares using code graphs. [Citation Graph (, )][DBLP]

  38. Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models. [Citation Graph (, )][DBLP]

  39. HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. [Citation Graph (, )][DBLP]

  40. Image-Feature Based Human Identification Protocols on Limited Display Devices. [Citation Graph (, )][DBLP]

  41. On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. [Citation Graph (, )][DBLP]

  42. Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation. [Citation Graph (, )][DBLP]

  43. Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores. [Citation Graph (, )][DBLP]

  44. Cyber Threat Trend Analysis Model Using HMM. [Citation Graph (, )][DBLP]

  45. Network Level Privacy for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  46. Bayesian memory-based reputation system. [Citation Graph (, )][DBLP]

  47. Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  48. A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  49. Transmission Time-Based Mechanism to Detect Wormhole Attacks. [Citation Graph (, )][DBLP]

  50. MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks. [Citation Graph (, )][DBLP]

  51. Fast detection and visualization of network attacks on parallel coordinates. [Citation Graph (, )][DBLP]

  52. Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002