RFID handbook: applications, technology, security, and privacy SA Ahson, M Ilyas CRC press, 2017 | 619 | 2017 |
Q + -Algorithm: An Enhanced RFID Tag Collision Arbitration Algorithm D Lee, K Kim, W Lee International Conference on Ubiquitous Intelligence and Computing, 23-32, 2007 | 80 | 2007 |
HARMer: Cyber-attacks automation and evaluation SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim IEEE Access 8, 129397-129414, 2020 | 54 | 2020 |
A Time‐Optimal Anti‐collision Algorithm for FSA‐Based RFID Systems D Lee, J Choi, W Lee, S Pack, DZ Du, S Hong ETRI journal 33 (3), 458-461, 2011 | 18 | 2011 |
Genetic algorithmic topology control for two-tiered wireless sensor networks D Lee, W Lee, J Kim Computational Science–ICCS 2007: 7th International Conference, Beijing …, 2007 | 14 | 2007 |
Cy-through: toward a cybersecurity simulation for supporting live, virtual, and constructive interoperability D Lee, D Kim, MK Ahn, W Jang, W Lee IEEE Access 9, 10041-10053, 2021 | 10 | 2021 |
A practical framework for cyber defense generation, enforcement and evaluation SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim Computer Networks 208, 108878, 2022 | 9 | 2022 |
ICSTASY: an integrated cybersecurity training system for military personnel D Lee, D Kim, C Lee, MK Ahn, W Lee IEEE Access 10, 62232-62246, 2022 | 7 | 2022 |
Method for determining optimal frame size for tag collision prevention in RFID system H Jang, W Lee, D Lee, J Lee, S Kang, Y Yoon, J Han US Patent 8,610,544, 2013 | 7 | 2013 |
빅데이터 기반의 실시간 네트워크 트래픽 분석 플랫폼 설계 이동환, 박정찬, 유찬곤, 윤호상 정보보호학회논문지 23 (4), 721-728, 2013 | 5 | 2013 |
On the Design of a Big Data based Real-Time Network Traffic Analysis Platform D Lee, JC Park, C Yu, H Yun Journal of the Korea Institute of Information Security & Cryptology 23 (4 …, 2013 | 4 | 2013 |
OFSA: Optimum Frame-Slotted Aloha for RFID Tag Collision Arbitration D Lee, J Choi, W Lee KSII Transactions on Internet and Information Systems (TIIS) 5 (11), 1929-1945, 2011 | 4 | 2011 |
On the Calculation of the Maximal MOT Throughput in T-DMB J Choi, D Lee, J Yu, K Kim, W Lee IEEE Transactions on Consumer Electronics 53 (3), 877-884, 2007 | 4 | 2007 |
Software-Friendly Subjective Bayesian Networks: Reasoning within a Software-Centric Mission Impact Assessment Framework S Matsumoto, JF Ferrari, HJ Yoon, AR Thukkaraju, D Lee, MK Ahn, ... 2023 26th International Conference on Information Fusion (FUSION), 1-8, 2023 | 2 | 2023 |
Research on method of cyber attack modeling in constructive M&S network environment MK Ahn, DH Lee, D Kim, YH Kim The Fall Conference of the KIMST, 773-774, 2015 | 2 | 2015 |
Measuring technical effectiveness in cyber warfare KIMH JOON, D Lee, MK Ahn, YH Kim, KS Noh Korea Computer Congress, 143-145, 2015 | 2 | 2015 |
베이지안 네트워크를 이용한 내부자 사이버 위협 예보 시스템 장희진, 이동환, 박찬일, 윤호상 한국군사과학기술학회 종합학술대회 논문집, 470-473, 2012 | 2 | 2012 |
UbiComm: An Adaptive Vertical Handoff Decision Scheme for Heterogeneous Wireless Networks W Lee, E Kim, J Yu, D Lee, J Choi, J Kim, CK Shin Ubiquitous Computing Systems: Third International Symposium, UCS 2006, Seoul …, 2006 | 2 | 2006 |
Interdependent Mission Impact Assessment of an IoT System with Hypergame-heoretic Attack-Defense Behavior Modeling AR Thukkaraju, HJ Yoon, S Matsumoto, JF Ferrari, D Lee, MK Ahn, ... 2023 31st International Symposium on Modeling, Analysis, and Simulation of …, 2023 | 1 | 2023 |
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive S Lee, D Lee, S Kim The 4th ACM Conference on Advances in Financial Technologies, 232–243, 2023 | 1 | 2023 |