{"id":1546,"date":"2023-02-05T16:12:35","date_gmt":"2023-02-05T07:12:35","guid":{"rendered":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/?page_id=1546"},"modified":"2023-03-08T18:14:51","modified_gmt":"2023-03-08T09:14:51","slug":"journal","status":"publish","type":"page","link":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/journal\/","title":{"rendered":"Publication-Journal"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1546\" class=\"elementor elementor-1546\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b5fb0ec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b5fb0ec\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-211dd39\" data-id=\"211dd39\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b23e95 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3b23e95\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.1 - 15-02-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Publication<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd04285 elementor-widget elementor-widget-heading\" data-id=\"fd04285\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Welcome to Network Mangement Lab.<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9ce29e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ce29e1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e571299\" data-id=\"e571299\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a46699d elementor-widget elementor-widget-shortcode\" data-id=\"a46699d\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\r\n<!DOCTYPE HTML PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\">\r\n<HTML lang='ko'><HEAD><TITLE>My Publications<\/TITLE>\r\n\r\n<META http-equiv=Content-Type content=\"text\/html; charset=utf-8\">\r\n<META content=\"Microsoft FrontPage 5.0\" name=GENERATOR>\r\n\t<style type='text\/css'>\r\n\t\t\tli:hover{background: #F5F5F5;}\r\n    <\/style>\r\n\r\n<\/HEAD>\r\n\r\n\r\n\r\n\r\n<BODY >\r\n\r\n<!------------------------------------------------------------------>\r\n<h3 style='border-bottom:2px solid; line-height : 50px; margin-bottom: 30px;'><font color='#000000'> International Journal <font size=2> : 48<\/font><\/font><\/h3>\r\n\r\n\r\n<ol><li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Ui-Jun Baek, Yoon-Seong Jang, Ju-Sung Kim, Yang-Seo Choi and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.05-Deep Ensemble_Learning_for_Application_Traffic_Classification-Sensors.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Deep Ensemble Learning for Application Traffic Classification Using Differential Model Selection Technique<\/span><\/a>\", <span style=\"color: black;  \">Sensors Vol.26 No.9, May 2025, pp. 1-17.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Jee-Tae Park, Yang-Seo Choi, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.04-Multi-Level_Pre-training-IEEE.Access.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Multi-Level Pre-training for Encrypted Network Traffic Classification<\/span><\/a>\", <span style=\"color: black;  \">IEEE Access Vol.13, Apr. 2025, pp.68643 - 68659.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Ui-Jun Baek,  Jee-Tae Park, Yoon-Seong Jang, Ju-Sung Kim, Yang-Seo Choi and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.02-Filter-and-Refine Approach_Traffic_Classification-ICT_Express.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A Filter-and-Refine Approach to Lightweight Application Traffic Classification<\/span><\/a>\", <span style=\"color: black;  \">ICT Express vol.11 is.1, Feb. 2025, pp. 1-6.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\"> Chang-Yui Shin, Yang-Seo Choi, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.01-Data_Augmentation-Based_Enhancement-IEEE.Access.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Data Augmentation-Based Enhancement for Efficient Network Traffic Classification<\/span><\/a>\", <span style=\"color: black;  \">IEEE Access Vol.13, Jan. 2025, pp.6006-6028.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.04-Multi-Task_Learning_for_Encrypted_Network_Traffic_Classification-Applied_Science.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification<\/span><\/a>\", <span style=\"color: black;  \">Applied Science Vol. 14, Apr. 2024, pp. 1-23.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\"> Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.09-Multi-Modal-Signature_SaaS_Behavior_Detection-IEEE.Access.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">User Behavior Detection Using Multi-Modal Signatures of Encrypted Network Traffic<\/span><\/a>\", <span style=\"color: black;  \">IEEE Access Vol. 11, Sep. 2023, pp. 97353-97372 .<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Ui-Jun Baek, Boseon Kim, Jee-Tae Park, Jeong-Woo Choi,  Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.08-Multi-task_Classification_Method-Electronics.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A Multi-task Classification Method for Application Traffic Classification Using Task Relationships<\/span><\/a>\", <span style=\"color: black;  \">Electronics Vol.12, No.17, Aug. 2023, pp. 1-18.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\"> Chang-Yui Shin, Jee-Tae Park, Ui-Jun Baek  and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.07-DistilBERT-based_Application_Traffic_Classifciation-IEEE.Access.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A Feasible and Explainable Network Traffic Classifier Utilizing DistilBERT<\/span><\/a>\", <span style=\"color: black;  \">IEEE Access Vol. 11, Jul. 2023, pp. 70216-70237.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Huru Hasanova, Muhammad Tufail, Ui-Jun Baek, Jee-Tae Park, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.07-blockchain-enabled_heart_disease_prediction-CEE.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A novel blockchain-enabled heart disease prediction mechanism using machine learning<\/span><\/a>\", <span style=\"color: black;  \">Computers & Electrical Engineering Vol.101, Jul. 2022, pp. 1-13.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Jee-Tae Park, Ui-Jun Baek, Min-Seong Lee, Young-Hoon Goo, Sung-Ho Lee and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.10-Flow-based_Malicious_Traffic_Detection-TIIS.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Flow based Sequential Grouping System for Malicious Traffic Detection<\/span><\/a>\", <span style=\"color: black;  \">KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS Vol.15, No. 10, Oct. 2021, pp. 3771-3792.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Young-Hoon Goo, Kyu-Seok Shim,  Min-Seob Lee, Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.07_Message_Keyword_Extraction_Approach-IJNM.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A Message Keyword Extraction Approach by Accurate Identification of Field Boundaries<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol.31, No.07, , Jul. 2021, pp. 1-20.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Young-Hoon Goo, Kyu-Seok Shim,  Ui-Jun Baek, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.11-Two-pathway_Model_for_Enhanced_APRE-TIIS.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Two-pathway Model for Enhancement of Protocol Reverse Engineering<\/span><\/a>\", <span style=\"color: black;  \">KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS Vol. 14, No. 11, Nov. 2020, pp. 4310-4330.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Hongtaek Ju, Raouf Boutaba, Burkhard Stiller, Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.09-Editorial_for_special_issue_on_challenges_and_opportunities_of_Blockchain_and_cryptocurrency-IJNM.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Editorial for special issue on challenges and opportunities of Blockchain and Cryptocurrency<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol.30, No.05, , Sep. 2020, pp. 1-20.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Kyu-Seok Shim, Young-Hoon Goo, Min-Seob Lee, Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.06_Clustering_method_for_ICS-APRE-IJNM.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Clustering Method in Protocol Reverse Engineering for Industrial Protocols<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol.30, No.6, , Jun. 2020, pp. 1-15.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Myung-Sup Kim, Haruo Oishi, Jiun-Long Huang, Hongtaek Ju, Kiyohito Yoshihara, Chih-Wei Yi, Taesang Choi,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.08-Managing_a_World_of_Things-JNSM.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Managing a World of Things: A Report on APNOMS2017<\/span><\/a>\", <span style=\"color: black;  \">Journal of Network and Systems Management, Vol.27 No.2, , April. 2019, pp.541-549.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.03-APRE-IEEE.Access.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Protocol Specification Extraction based on Contiguous Sequential Pattern Algorithm<\/span><\/a>\", <span style=\"color: black;  \">IEEE Access Vol. 7, Mar. 2019, pp. 36057-36074.<\/span> [<font color=#0096FF>SCI<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Kyu-Seok Shim, Young-Hoon Goo, Dongcheul Lee, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.03-Automatic_Payload_Signature_Update_System-TIIS.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet  Applications<\/span><\/a>\", <span style=\"color: black;  \">KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS Vol. 13, No. 3, Mar. 2019, pp. 1284-1297.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Huru Hasanova, Ui-jun Baek, Mu-gon Shin, Kyunghee Cho, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.01-Survey_on_Blockchain_Vulnerabilities-IJNM.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A Survey on Blockchain Cybersecurity Vulnerabilities and Possible Countermeasures<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol.29, No.2, , Jan. 2019, pp. 1-36.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Baraka D. Sija, Kyu-Seok Shim and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.04-CSP_based_Traffic_Classification-TIIS.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services<\/span><\/a>\", <span style=\"color: black;  \">KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS Vol. 12, No. 04, Apr. 2018, pp. 1572-1593.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Kyu-Seok Shim, Sung-Ho Yoon, Baraka D. Sija, Jun-Sang Park, Kyunghee Cho, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.03-Behavior_Signature_Extraction-IJNM.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Effective Behavior Signature Extraction Method using Sequence Pattern Algorithm for Traffic Identification<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol.28, No.02, , Mar. 2018, pp. 1-15.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Baraka D. Sija, Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.02-Survey_on_APRE-SCN.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A Survey of Automatic Protocol Reverse Engineering Approaches, Methods and Tools on the Inputs and Outputs View<\/span><\/a>\", <span style=\"color: black;  \">Security and Communication Networks Vol. 2018, ID. 8370341, Feb. 2018, pp. 1-17.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Kyu-Seok Shim, Jae\u2010Hyun Ham, Baraka D. Sija, and  Myung\u2010Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.04-Payload_Size_Sequence_Signature-IJNM.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Application traffic classification using payload size sequence  signature<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol. 27, No. 5, , Sep. 2017, pp. 1-17.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Dongeun Suh, Seokwon Jang, Sol Han, Sangheon Pack, Myung-Sup Kim, Taehong Kim, and Chang-Gyu Lim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.04-SDN-HA-IEEE_ComMag.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Towards Highly Available and Scalable Software Defined Networks for Service Provider<\/span><\/a>\", <span style=\"color: black;  \">IEEE Communications Magazine, Vol. 55, No. 4, April 2017, pp.100-107.<\/span> [<font color=#0096FF>SCI<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Filip De Turck, Joon\u2010Myung Kang, Hyunseung Choo, Myung-Sup Kim, Baek\u2010Young Choi, Remi Badonnel, James Won\u2010Ki Hong,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.03-Softwarization -IJNM.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Softwarization of networks, clouds, and internet of things<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol. 27, No. 3, , Mar. 2017, pp.1-2.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\"> Kyu-Seok Shim, Sung-Ho Yoon,  Su-Kang Lee, and  MyungSup Kim ,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.02-SigBox-JISE.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification<\/span><\/a>\", <span style=\"color: black;  \">Journal of Information Science and Engineering, Vol. 33, No. 2, , Feb. 2017, pp. 541-573.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Sung-Ho Yoon, Jun-Sang Park, Baraka D. Sija, Mi-Jung Choi, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.01-Header_Signature_Maintenance-IJNM.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Header Signature Maintenance for Internet Traffic Identification <\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol. 27, No. 1, , Jan. 2017, pp. 1-15.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Jun-Sang Park, Sung-Ho Yoon, Su-Kang Lee, Youngjoon Won, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.09-Classifcation_based_on_Locality-JISE.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Performance Improvement of Traffic Classification based on Application Traffic Locality<\/span><\/a>\", <span style=\"color: black;  \">Journal of Information Science and Engineering, Vol. 32, No. 5, , Sep. 2016, pp. 1241-1259.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Myung-Sup Kim, Noriaki Kamiyama, Chih-Wei Yi, Won-Kyu Hong, Toshio Tonouchi, Chien Chen, Wang-Cheol Song,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.02-Managing_a_Very_Connected_World-JNSM.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Managing a Very Connected World: A Report on APNOMS2015<\/span><\/a>\", <span style=\"color: black;  \">Journal of Network and Systems Management, Vol.24 No.3, , Jul. 2016, pp.754-763.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Sung-Ho Yoon, Jun-Sang Park, Ji-Yeok Choi, Youngjoon Won, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.11_HTTP_Traffic_Classification-IEICE.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">HTTP Traffic Classification based on Hierarchical Signature Structure <\/span><\/a>\", <span style=\"color: black;  \">IEICE Transactions on Information and Systems, Vol.E98-D, No.11, , Nov. 2015, pp. 1994-1997.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Hyun-Min An, Su-Kang Lee, Jae-Hyun Ham, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.09_Abnormal_TCP_Behavior-JISE.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Traffic Identification based on Applications using Statistical Signature free from Abnormal TCP Behavior<\/span><\/a>\", <span style=\"color: black;  \">JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, Vol.31 No.5, , Sep. 2015, pp. 1669-1692.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Sung-Ho Yoon, Jun-Sang Park, and Myung-Sup Kim ,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.04-Behavior_Signature_for_Fine-grained_Traffic_Identification-AMIS.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Behavior Signature for Fine-grained Traffic Identification<\/span><\/a>\", <span style=\"color: black;  \">Applied Mathematics & Information Sciences Vol. 9, No. 2L, , Apr. 2015, pp. 523-534.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Jun-Sang Park, Sung-Ho Yoon, Youngjoon Won, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.10-Lightweight_Traffic_Classification-IEICE.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A Lightweight Software Model for Signature-based Application-level Traffic Classification System<\/span><\/a>\", <span style=\"color: black;  \">IEICE TRANSACTIONS on Information and Systems, Vol.E97-D, No.10, Oct. 2014, pp. 2697-2705.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Hyo-Sik Ham, Hwan-Hee Kim, Myung-Sup Kim and Mi-Jung Choi,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.09-Linear_SVM-Based_Android_Malware_Detection-JAM.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Linear SVM-based Android Malware Detection For Reliable IoT Services<\/span><\/a>\", <span style=\"color: black;  \">Journal of Applied Mathematics Vol. 2014, Article ID 594501, , Sep. 2014, pp. 1-10.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Jae-Hyun Ham, Hyun-Min An, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.07-PSS_Signature_based_Traffic_Classification-TIIS.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Application Traffic Classification using PSS Signature<\/span><\/a>\", <span style=\"color: black;  \">KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS Vol. 8, No. 7, Jul. 2014, pp. 2261-2280.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Mi-Jung Choi, Jun-Sang Park, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.03-Integrated_Method_for_Traffic_Classification-TIIS.Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">An Integrated Method for Application-level Internet Traffic Classification<\/span><\/a>\", <span style=\"color: black;  \">KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS Vol. 8, No. 3, , Mar. 2014, pp. 838-856 .<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Byungchul Park, Jaeyun Chung,  YoungJoon Won, Myung-Sup Kim, and James Won-Ki Hong,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.08-Fine-grained_Traffic_Classification-IJNM.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Fine-grained Traffic Classification based on Functional Separation<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol. 23, No. 5, Sep. 2013, pp.350-381.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Daihee Park, Jaehak Yu, Jun-Sang Park, and Myung-Sup Kim,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.03-NetCube_A_Comprehensive_Network_Traffic_Analysis_Model_based_on_Multidimensional_OLAP_Data_Cube-IJNM.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">NetCube: A Comprehensive Network Traffic Analysis Model based on Multidimensional OLAP Data Cube<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management, Vol. 23, No. 2, Mar., 2013, pp.101-118.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Jaehak Yu, Hansung Lee, Younghee Im, Myung-Sup Kim , and Daihee Park,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2010\/2010.10 - Real-time Classification of Internet Application Traffic using a Hierarchical Multi-class SVM -TIIS Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Real-time Classification of Internet Application Traffic using a Hierarchical Multi-class SVM<\/span><\/a>\", <span style=\"color: black;  \">KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS Vol. 4, No. 5, , Oct. 2010, pp. 859-876.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Jaehak Yu, Hansung Lee, Myung-Sup Kim, and Daihee Park,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Traffic flooding attack detection with SNMP MIB using SVM - ComCom Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Traffic Flooding Attack Detection with SNMP MIB using SVM<\/span><\/a>\", <span style=\"color: black;  \">Computer Communications Journal, Vol. 31, No. 17, Nov. 20, 2008, pp. 4212-4219.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Young J. Won, Mi-Jung Choi, James Won-Ki Hong, Myung-Sup Kim, Hwawon Hwang, Jun-Hyub Lee, and Sung-Gyoo Lee,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Fault Detection and Diagnosis in IP-based Mission Critical Industrial Process Control Networks - Comsoc Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Fault Detection and Diagnosis in IP-based Mission Critical Industrial Process Control Networks<\/span><\/a>\", <span style=\"color: black;  \">IEEE Communications Magazine, Vol. 46, No. 5, May 2008, pp.172-180.<\/span> [<font color=#0096FF>SCI<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Yu Cheng, Ramy Farha, Myung Sup Kim, Alberto Leon-Garcia, and James Won-Ki Hong,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2006\/2006 - A generic architecture for autonomic service and network management - ComCom Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A generic architecture for autonomic service and network management<\/span><\/a>\", <span style=\"color: black;  \">Computer Communications Journal, Vol. 29, No. 18, Nov. 28, 2006, pp. 3691-3709.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Myung-Sup Kim, Young J. Won, and James W. Hong,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2006\/2006 - Characteristic Analysis of Internet Traffic from the Perspective of Flows - ComCom Journal.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Characteristic Analysis of Internet Traffic from the Perspective of Flows<\/span><\/a>\", <span style=\"color: black;  \">Computer Communications Journal, Vol. 29, No. 10,  Jun. 19, 2006, pp. 1639-1652.<\/span> [<font color=#0096FF>SCIE<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Yu Cheng, Ramy Farha, Ali Tizghadam, Myung Sup Kim, Massoud Hashemi, Alberto Leon-Garcia, and James Won-Ki Hong,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2005\/2005 - Virtual Network Approach to Scalable IP Service Deployment and Efficient Resource Management - IEEE Communications Magazine.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Virtual Network Approach to Scalable IP Service Deployment and Efficient Resource Management<\/span><\/a>\", <span style=\"color: black;  \">IEEE Communications Magazine, Vol. 43, No. 10, Oct. 2005, pp. 76-84.<\/span> [<font color=#0096FF>SCI<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Myung-Sup Kim, Young J. Won, and James Won-Ki Hong,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2005\/2005-Application-Level_Traffic_Monitoring_and_Analysis-ETRI2005.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Application-Level Traffic Monitoring and Analysis on IP Networks<\/span><\/a>\", <span style=\"color: black;  \">ETRI Journal, Vol.27, No.1, Feb. 2005, pp.22-42.<\/span> [<font color=#0096FF>SCI<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Hun-Jeong Kang, Myung-Sup Kim, and James Won-Ki Hong,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2004\/2004 - Streaming Media and Multimedia Conferencing Traffic Analysis Using Payload Examination - ETRI2004.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Streaming Media and Multimedia Conferencing Traffic Analysis Using Payload Examination<\/span><\/a>\", <span style=\"color: black;  \">ETRI Journal, Vol.26, No.3, Jun. 2004, pp.203-217.<\/span> [<font color=#0096FF>SCI<\/font>]<br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Myung-Sup Kim, Mi-Joung Choi, and James W. Hong,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2002\/2002 - A Load Cluster Management System using SNMP and Web - IJNM2002.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A Load Cluster Management System using SNMP and Web<\/span><\/a>\", <span style=\"color: black;  \">International Journal of Network Management (IJNM), Vol. 12, No. 6, Nov. 2002, pp. 367-378.<\/span><br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Myung-Sup Kim and James Won-Ki Hong,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2000\/2000\/2000 - A CORBA-based Framework for the Management of Multimedia Services - ICN2000.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">A CORBA-based Framework for the Management of Multimedia Services<\/span><\/a>\", <span style=\"color: black;  \">Interoperable Communication Networks Journal, Vol. 2, No. 2-4, Jan. 2000, pp. 189-198.<\/span><br>\r\n<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">James W. Hong, Y. M. Shin, Myung-Sup Kim, J. Y. Kim and Y. H. Suh,<\/span> \"<a target=_new href=\"\/publication\/published papers\/1999\/1999 - Design and Implementation of a Distributed Multimedia Collaborative Environment - Cluster1999.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">Design and Implementation of a Distributed Multimedia Collaborative Environment<\/span><\/a>\", <span style=\"color: black;  \">Cluster Computing Journal, Vol. 2, No. 1, Jan. 1999, pp. 45-49.<\/span><br>\r\n<\/ol>\r\n\r\n\r\n\r\n\r\n\r\n<!------------------------------------------------------------------>\r\n<h3 style='border-bottom:2px solid; line-height : 50px; margin-top:80px;margin-bottom: 30px;'><font color='#000000'> Domestic Journal <font size=2> : 81<\/font><\/font><\/h3>\r\n\r\n\t\t\t\t\t\t\t\r\n<ol>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\uc9c0\ubbfc, \uae40\ub780\uc544, \uc7a5\uc724\uc131, \ubc31\uc758\uc900, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.12_WeChat_Behavior_Analysis-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc138\uc158 \ubc0f \ud328\ud0b7 \ubc88\ub4e4 \ub2e8\uc704\uc5d0\uc11c\uc758 WeChat \ud589\uc704 \ubd84\uc11d<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol.28, No.2, Dec., 2025, pp.33-40.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc720\uacbd\ubbfc, \ub0a8\uc2b9\uc6b0, \ubc15\uc7ac\uc6d0, \uc7a5\uc724\uc131, \uae40\uc8fc\uc131, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2025\/2025_12_Monocular_VSLAM-KROS2025.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uac1d\uccb4 \uacbd\uacc4 \uac15\ud654 \uae30\ubc18 \uac1c\uc120\ub41c \uae4a\uc774 \ucd94\uc815 \ubaa8\ub378\uc744 \ud65c\uc6a9\ud55c \ub2e8\uc548 VSLAM<\/span><\/a>\", <span style=\"color: black;  \">\ub85c\ubd07\ud559\ud68c \ub17c\ubb38\uc9c0, Vol.20 No.4, Dec. 01, 2025, pp.1-12.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc720\uacbd\ubbfc, \ub0a8\uc2b9\uc6b0,  \ubc15\uc7ac\uc6d0, \ubc31\uc758\uc900, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2025\/2025_09_Improving_ORB-SLAM_Performance-KROS2025.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">Low-Texture \ud658\uacbd\uc5d0\uc11c \uc801\uc751\ud615 \uc774\ubbf8\uc9c0 \uc99d\uac15 \ubc0f \uc784\uacc4\uac12 \uc870\uc815\uc744 \ud1b5\ud55c ORB-SLAM \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\ub85c\ubd07\ud559\ud68c \ub17c\ubb38\uc9c0, Vol.20 No.3, Sep. 01, 2025, pp.1-12.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\uc8fc\uc131, \uc7a5\uc724\uc131, \ubc31\uc758\uc900, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.02-encryption_detection_traffic_classification-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ube44\uc554\ud638\ud654 \ub370\uc774\ud130 \ud559\uc2b5\uc744 \ud1b5\ud55c \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.50 No.02, Feb. 2025, pp. 304-310.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc7a5\uc724\uc131, \uc774\uc724\uc11c, \ucd5c\uc720\uc9c4, \ubc15\uc120\ubbfc, \uae40\uc8fc\uc131, \ubc31\uc758\uc900, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.04_Multi-Host_Traffic_Collection_System-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub525\ub7ec\ub2dd \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud504\ub85c\uc138\uc2a4 \ub85c\uadf8 \ud65c\uc6a9 \ub2e4\uc911 \ud638\uc2a4\ud2b8 \ub370\uc774\ud130\uc14b \uc218\uc9d1 \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol.27, No.1, Aug., 2024, pp.49-58.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc31\uc758\uc900, \ubc15\uc9c0\ud0dc, \ucd5c\uc815\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.12_DL-based Detection-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc6d0\uaca9 \uc81c\uc5b4 \ucc28\ub7c9 \uc6b4\uc601 \ud658\uacbd\uc5d0\uc11c\uc758 \ub525\ub7ec\ub2dd \uae30\ubc18 \uc911\uac04\uc790 \uacf5\uaca9 \ud0d0\uc9c0 \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol.26, No.2, Dec., 2023, pp.73-83.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc7a5\uc724\uc131, \ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \uae40\uc8fc\uc131, \uc774\ub300\uad6d, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.12_Dataset Usage and Pre-processing Method-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub525\ub7ec\ub2dd \uae30\ubc18\uc758 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \ub370\uc774\ud130\uc14b \uc0ac\uc6a9 \ubc0f \uc804\ucc98\ub9ac \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol.26, No.2, Dec., 2023, pp.33-48.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\ubbfc\uc131, \ubc31\uc758\uc900, \ubc15\uc9c0\ud0dc, \ucd5c\uc815\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.08_3-Step_Sequential_Application_Traffic_Classification-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc559\uc0c1\ube14 \ubaa8\ub378\uc5d0 \uc784\uacc4\uac12\uc744 \uc801\uc6a9\ud55c 3\ub2e8\uacc4 \uc21c\ucc28\uc801 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 26, No. 1, Aug. 2023, pp. 61-68.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \uc2e0\ucc3d\uc758, \ucd5c\uc815\uc6b0, \ud64d\uc724\ud658, \ud638\ud0dc\uaddc, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.08-Flow_Rule-based_SaaS-Behavior_Detection-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">SaaS \uc751\uc6a9\uc758 \uc0ac\uc6a9\uc790 \ud589\uc704 \ud0d0\uc9c0\ub97c \uc704\ud55c \ud50c\ub85c\uc6b0 \uae30\ubc18\uc758 \uace0\ub3c4\ud654\ub41c \uaddc\uce59 \uc0dd\uc131<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.48 No.8, Aug. 2023, pp. 581-588.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc720\uacbd\ubbfc, \ucd5c\uc815\uc6b0, \ubc15\uc7ac\uc6d0, \ub0a8\uc2b9\uc6b0, \ubc31\uc758\uc900, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.07_AI-based_Guide_Robot-KIPE2023.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">AI \uae30\ubc18 \uc2e4\ub0b4 \uc790\uc728 \uc548\ub0b4 \ub85c\ubd07 \uc124\uacc4 \ubc0f \uad6c\ud604<\/span><\/a>\", <span style=\"color: black;  \">\ub300\ud55c\uc124\ube44\uad00\ub9ac\ud559\ud68c\uc9c0 vol.28 no.2, Jul., 2023, pp.43-49.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\ubcf4\uc120,  \ucd5c\uc815\uc6b0,  \ubc15\uc9c0\ud0dc,  \ubc31\uc758\uc900,  \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.05-CNN-based_HTTPS_Traffic_Classification-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">CNN \uae30\ubc18 HTTPS \ud2b8\ub798\ud53d\uc758 \uc11c\ube44\uc2a4 \ubc0f \uc751\uc6a9 \ub2e8\uc704 \ub2e4\uc911 \ub808\uc774\ube14 \ubd84\ub958 <\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.48 No.5, May 2023, pp. 581-588.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ucd5c\uc815\uc6b0, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.12-Indoor_Intruder_Detection_Robot-KISS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc2e4\ub0b4 \ubc29\ubc94 \ub85c\ubd07\uc5d0\uc11c YOLO\uc640 VMD\ub97c \ud65c\uc6a9\ud55c \uc2e4\ub0b4 \uce68\uc785\uc790 \ud0d0\uc9c0<\/span><\/a>\", <span style=\"color: black;  \">\ub300\ud55c\uc124\ube44\uad00\ub9ac\ud559\ud68c Vol.27 No.4, Dec. 2022, pp. 13-19.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc9c0\ud0dc, \uc2e0\ucc3d\uc758, \ubc31\uc758\uc900, \ucd5c\uc815\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.12_Rule-based_User_Action_Detection_System-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \ud1b5\ud55c \uaddc\uce59 \uae30\ubc18 \uc0ac\uc6a9\uc790 \ud589\uc704 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 25, No. 2, Dec. 2022, pp. 51-58.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc2e0\ucc3d\uc758, \ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \ucd5c\uc815\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.12_DistilBert-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uacbd\ub7c9\ud654 \ub370\uc774\ud130\uc640 \ub525\ub7ec\ub2dd \ubaa8\ub378\uc744 \uc801\uc6a9\ud55c \ud6a8\uc728\uc801\uc778 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 25, No. 2, Dec. 2022, pp. 40-50.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\ubbfc\uc131, \ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \ucd5c\uc815\uc6b0, \uc2e0\ucc3d\uc758, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.12-Sequential_Model-based_Classification_Speed_Improvement-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc21c\ucc28\uc801\uc778 \ub370\uc774\ud130 \ucc98\ub9ac\ub97c \ud1b5\ud55c \ub525 \ub7ec\ub2dd \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\ub958\uc18d\ub3c4 \uac1c\uc120<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.47 No.12, Dec. 2022, pp. 2096-2103.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\ubbfc\uc131, \ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \ucd5c\uc815\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.11-VPN_Non-VPN_Traffic_Classification-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">VPN\/NoN-VPN \ubd84\ub958\ub97c \uc704\ud55c \ud2b8\ub798\ud53d \ud1b5\uacc4 \uc815\ubcf4\uc758 \uc911\uc694\ub3c4 \ubd84\uc11d<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.47 No.11, Nov. 2022, pp. 1-8.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\ubcf4\uc120, \uc774\ubbfc\uc131, \uac15\ubbfc\uaddc, \ubc15\uc9c0\ud0dc,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.08_Residual_Material_Information_Web_System-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc794\ub958\ubb3c\uc9c8\uc815\ubcf4 \uc81c\uacf5\uc744 \uc704\ud55c React \uae30\ubc18 \uc6f9 \uc11c\ube44\uc2a4<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 24, No. 1, Dec. 2021, pp. 29-37.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc2e0\ubb34\uace4,\ubc31\uc758\uc900,\uae40\ubcf4\uc120,\uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.12-Data_Management_System-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub18d\uc57d \ubc0f \ub3d9\ubb3c\uc6a9 \uc758\uc57d\ud488\uc758 \uc794\ub958\ubb3c\uc9c8\uc815\ubcf4 \ud788\uc2a4\ud1a0\ub9ac \ub370\uc774\ud130 \uad00\ub9ac \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 23, No. 2, Dec. 2020, pp. 11-17.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \uc2e0\ubb34\uace4, \uc774\ubbfc\uc131, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.08-Network_Topology_Search-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \uc785\ucd9c\ub7c9 \ubd84\uc11d\uc744 \ud1b5\ud55c \ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub85c\uc9c0 \ud0d0\uc0c9 \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 23, No. 1, Aug. 2020, pp. 1-9.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ucc44\ubcd1\ubbfc, \ubb38\ud638\uc6d0, \uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d, \uc774\ubbfc\uc12d, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.08-APRE-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc0c1\uc138\ud55c \ud504\ub85c\ud1a0\ucf5c \uad6c\uc870\ub97c \ucd94\ub860\ud558\ub294 \ud504\ub85c\ud1a0\ucf5c \ub9ac\ubc84\uc2a4 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1 \ubc29\ubc95\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 22, No. 1, Dec. 2019, pp. 42-51.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc9c0\uc138\ud604, \ubc31\uc758\uc900, \uc2e0\ubb34\uace4, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.08-BitCoin_Transaction_Prediction-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uae30\uacc4\ud559\uc2b5 \uae30\ubc18 \ube44\ud2b8\ucf54\uc778 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub79c\uc7ad\uc158 \uc218 \uc608\uce21\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 22, No. 1, Dec. 2019, pp. 68-76.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc9c0\uc138\ud604, \ubc31\uc758\uc900, \uc2e0\ubb34\uace4, \ucc44\ubcd1\ubbfc, \ubb38\ud638\uc6d0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.06-CNN-based_Application_Traffic_Classification-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud569\uc131 \uacf1 \uc2e0\uacbd\ub9dd \uae30\ubc18 \uc6f9 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 \ubaa8\ub378 \uc124\uacc4 <\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.44 No.05, Jun. 2019, pp. 1113-1120.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \uc774\ubbfc\uc12d, \uc2e0\ubb34\uace4, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.05-Attack_Traffic_Detection_using_Sequential_Grouping-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud50c\ub85c\uc6b0 \uc5f0\uad00\uc131 \uae30\ubc18\uc758 \uc5f0\uc18d\uc801 \uadf8\ub8f9\ud551\uc744 \ud1b5\ud55c \uc545\uc131 \ud2b8\ub798\ud53d \ud0d0\uc9c0 \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.44 No.05, May. 2019, pp. 914-922.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\ubbfc\uc12d, \uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \ubc31\uc758\uc900, \ucc44\ubcd1\ubbfc, \ubb38\ud638\uc6d0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.05-TEXT_Protocol_APRE-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud1b5\uacc4\uc801 \ubd84\uc11d \uae30\ubc18 \ube44\uacf5\uac1c \ud504\ub85c\ud1a0\ucf5c\uc758 \uad6c\ubd84\uc790 \ubc0f \uc815\uc801\ud544\ub4dc \ucd94\ucd9c \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.44 No.05, May. 2019, pp. 904-913.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc31\uc758\uc900 , \uc2e0\ubb34\uace4, \uc9c0\uc138\ud604, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.12-Feature_Selection_in_BitCoin_Network-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ube44\ud2b8\ucf54\uc778 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub79c\uc7ad\uc158 \uc774\uc0c1 \ud0d0\uc9c0\ub97c \uc704\ud55c \ud2b9\uc9d5 \uc120\ud0dd \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 21, No. 2, Dec. 2018, -pp. 10-17.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac\ud6c4\ubcf4<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\ubbfc\uc12d , \uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d , \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.08-APRE_Filed_Extraction-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">Protocol Reverse Engineering\uc5d0\uc11c\uc758 \uc815\uad50\ud55c \uc815\uc801 \ud544\ub4dc\ub97c \ucd94\ucd9c\ud558\ub294 \ubc29\uc548\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 21, No. 1, Aug. 2018, pp. 10-17.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac\ud6c4\ubcf4<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d, \ubc15\uc9c0\ud0dc, \ucc44\ubcd1\ubbfc, \ubb38\ud638\uc6d0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.12-APRE-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uba85\ud655\ud55c \ud504\ub85c\ud1a0\ucf5c \uc0ac\uc591 \ucd94\ucd9c\uc744 \uc704\ud55c \ud504\ub85c\ud1a0\ucf5c \ub9ac\ubc84\uc2a4 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1 \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 20, No. 2, Dec. 2017, pp. 11-23.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac\ud6c4\ubcf4<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc815\uc6b0\uc11d, \uc724\uc815\ud55c, \uae40\uc2e0\uaddc, \uad6c\uc601\ud6c8, \uc774\uc131\ud638, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.08-Structured_ACL-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">SCADA \uc2dc\uc2a4\ud15c\uc758 \uc8fc\uae30\uc131\uacfc \ubc1c\uc0dd\uc21c\uc11c \uc815\ubcf4\ub97c \ubc18\uc601\ud55c Structured ACL \ubaa8\ub378\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 20, No. 1, Aug. 2017, pp. 9-16.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac\ud6c4\ubcf4<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc815\uc6b0\uc11d, \uc724\uc815\ud55c, \uae40\uc2e0\uaddc, \uc2ec\uaddc\uc11d, \uae40\uc131\ubbfc, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-WhiteList_on_SCAD-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">SCADA \ub124\ud2b8\uc6cc\ud06c \ub2e4\uc591\uc131\uc744 \ubc18\uc601\ud55c \ud50c\ub85c\uc6b0 \ud654\uc774\ud2b8 \ub9ac\uc2a4\ud2b8 \uc0dd\uc131<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.42 No.06, Jan. 2017, pp. 1167-1174.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uad6c\uc601\ud6c8, \uc774\uc131\ud638, \uc2ec\uaddc\uc11d, Baraka D. Sija, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.04-Flow_Corrlation_based_Traffic_Classification-KIISE.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud50c\ub85c\uc6b0\uc758 \uc5f0\uad00\uc131 \ubaa8\ub378\uc744 \uc774\uc6a9\ud55c \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\uacfc\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.44 No.04, Apr. 2017, pp. 433-438.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \uc774\uc131\ud638, Baraka D. Sija, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.01-Automatic_Payload_Signature_Update_System-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ucd5c\uc2e0 \ub124\ud2b8\uc6cc\ud06c \uc751\uc6a9 \ubd84\ub958\ub97c \uc704\ud55c \uc790\ub3d9\ud654 \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc5c5\ub370\uc774\ud2b8 \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.42 No.01, Jan. 2017, pp. 1-10.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\uc131\ud638, \uad6c\uc601\ud6c8, \uc774\ubbfc\ud68c, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.12-Sky-Scope-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">Sky-Scope : \uc2a4\uce74\uc774\ud504 \uc751\uc6a9 \ud2b8\ub798\ud53d \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 19, No. 2, Dec. 2016, pp. 26-35.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\ud0dc\ud64d, \uc11c\ub3d9\uc740, \ubc31\uc0c1\ud5cc, \uae40\uba85\uc12d, \uc784\ucc3d\uaddc, \ubc15\uc218\uba85,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.12-ODL_performance_evaluation-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc624\ud508\ub370\uc774\ub77c\uc774\ud2b8 \ucee8\ud2b8\ub864\ub7ec \ud074\ub7ec\uc2a4\ud130 \uc131\ub2a5 \ubd84\uc11d \ubc0f \ucd5c\uc801 \uc6b4\uc601 \ubc29\uc548 \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.41 No.12, Dec. 2016, pp. 1801-1810.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uad6c\uc601\ud6c8,  \ucd5c\uc120\uc624, \uc774\uc218\uac15, \uae40\uc131\ubbfc, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.12-Cascading_Cyber_Attack_Tracking-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc774\uc6a9\ud55c \uc5f0\uc1c4\uc801 \uc0ac\uc774\ubc84\uacf5\uaca9 \ud2b8\ub798\ud53d\uc758 \ubc1c\uc0dd\uc6d0 \ucd94\uc801 \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.41 No.12, Dec. 2016, pp. 1-9.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\uc131\ud638, \uae40\uc885\ud604, \uad6c\uc601\ud6c8, Baraka D. Sija, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.10-Signature_Quality_Evaluation-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \ud488\uc9c8 \ud3c9\uac00\ub97c \ud1b5\ud55c \uace0\ud6a8\uc728 \uc751\uc6a9 \uc2dc\uadf8\ub2c8\uccd0 \ud0d0\uc0c9<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.41 No.10, Oct. 2016, pp. 1-8.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\uc131\ubbfc, \uc2ec\uaddc\uc11d, Baraka D. Sija, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.08-K-Slice-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">K-Slice : SDN\/SFA \uae30\ubc18 \ud14c\uc2a4\ud2b8\ubca0\ub4dc \ub124\ud2b8\uc6cc\ud06c \uc5f0\ub3d9 \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 19, No. 1, Aug. 2016, pp. 1-11.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d, \uc815\uc6b0\uc11d, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.12-SnorGen_Web_System-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">SnorGen: \uc6f9 \uae30\ubc18 \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131 \uc2dc\uc2a4\ud15c <\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 18, No. 2, Dec. 2015, pp. 1-11.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\uc131\ubbfc, \ubc15\uc900\uc0c1, \uc724\uc131\ud638, \uae40\uc885\ud604, \ucd5c\uc120\ud638, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.11-SSL_TLS_Traffic_Identification-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">SSL\/TLS \uae30\ubc18 \uc554\ud638\ud654 \ud2b8\ub798\ud53d\uc758 \uc11c\ube44\uc2a4 \uc2dd\ubcc4 \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.40 No.11, Nov. 2015, pp.2160-2168.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc815\uc6b0\uc11d, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.07-Signature_Matching_Type-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc2dc\uadf8\ub2c8\uccd0 \ub9e4\uce6d \uc720\ud615 \ubd84\ub958\ub97c \ud1b5\ud55c \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uc758 \ucc98\ub9ac \uc18d\ub3c4 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.40 No.07, Jul. 2015, pp.1-8.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc548\ud604\ubbfc, \uc774\uc218\uac15, \uc2ec\uaddc\uc11d, \uae40\uc775\ud55c, \uc9c4\uc11c\ud6c8, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.03-bigdata_traffic_analysis-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud559\ub0b4 \ub9dd \uc790\uc6d0 \ud6a8\uc728\ud654\ub97c \uc704\ud55c \ube45 \ub370\uc774\ud130 \ud2b8\ub798\ud53d \ubd84\uc11d <\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.40 No.03, Mar. 2015, pp.541-550.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\uc131\ud638, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, \uc11d\uc6b0\uc9c4,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.03-optimization_of_payload_matching_sequence-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \ub9e4\uce6d \uc21c\uc11c \ucd5c\uc801\ud654\ub97c \ud1b5\ud55c \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 \uc18d\ub3c4 \ud5a5\uc0c1 <\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.40 No.03, Mar. 2015, pp.575-585.<\/span> [<font color=#0096FF>KCI\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc2ec\uaddc\uc11d, \uc724\uc131\ud638, \uc815\uc6b0\uc11d, \uc774\uc131\ud638, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.12-Torrent_Hunter-KNOM.Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">Torrent Hunter: \ud1a0\ub80c\ud2b8 \ud2b8\ub798\ud53d \uc644\uc804 \ubd84\uc11d\uc744 \uc704\ud55c \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 17, No. 2, Dec. 2014, pp. 34-46.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\uc218\uac15, \uc548\ud604\ubbfc, \uc2ec\uaddc\uc11d, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.08-out_of_order_retransmission-KNOM.Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud328\ud0b7 \uc5ed\uc804 \ubc0f \uc911\ubcf5 \ubb38\uc81c\ub97c \ud574\uacb0\ud55c \ud1b5\uacc4\uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 17, No. 1, Aug. 2014, pp. 1-10.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\uc218\uac15, \uc548\ud604\ubbfc, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.06-TCP_packet_retransmission_and_out_of_order-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub798\ud53d \uc218\uc9d1\uc9c0\uc810\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 TCP\ud328\ud0b7\uc911\ubcf5 \ubc0f \uc5ed\uc804\ubb38\uc81c \ud574\uacb0 \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.39B No.06, Jun. 2014, pp.350-359.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ucd5c\uc9c0\ud601, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.04-Speed_Improvement_of_HTTP_Traffic_Classification-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc2dc\uadf8\ub2c8\uccd0 \uacc4\uce35 \uad6c\uc870\uc5d0 \uae30\ubc18\ud55c HTTP \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uc758 \ucc98\ub9ac \uc18d\ub3c4 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.39B No.04, Apr. 2014, pp.191-199.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc724\uc131\ud638, \uc548\ud604\ubbfc, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.02-Classification_Scheme-KIPS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub2e4\uac01\uc801\uc774\uace0 \uacc4\uce35\uc801\uc778 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud2b8\ub798\ud53d \ubd84\ub958 \uccb4\uacc4\uc5d0 \uad00\ud55c \uc5f0\uad6c <\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub17c\ubb38\uc9c0 \ucef4\ud4e8\ud130 \ubc0f \ud1b5\uc2e0\uc2dc\uc2a4\ud15c \uc81c3\uad8c \uc81c2\ud638, Feb. 2014, pp. 47-56.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc548\ud604\ubbfc, \ud568\uc7ac\ud604, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.12-cross-order-KNOM.Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">Cross-order \ubb38\uc81c\ub97c \ud574\uacb0\ud55c PSS \uc2dc\uadf8\ub2c8\uccd0 \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 16, No. 2, Dec. 2013, pp. 1-11.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc548\ud604\ubbfc, \ud568\uc7ac\ud604, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.08-Statistical_Information_based_Traffic_Identification_System-KIPS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud1b5\uacc4 \uc815\ubcf4 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \ubc29\ubc95\ub860\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub17c\ubb38\uc9c0 \ucef4\ud4e8\ud130 \ubc0f \ud1b5\uc2e0\uc2dc\uc2a4\ud15c Vol.2 No.8, Aug. 2013, pp.335-342.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\ucca0\uc2e0, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.08-Automatic_Payload_Signature_Generation_System-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131 \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.38B No.08, Aug. 2013, pp.615-622.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ucd5c\uc9c0\ud601, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.08-Web_Application_Awareness-KIPS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">HTTP Host\ub97c \uc774\uc6a9\ud55c \uc6f9 \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158 \uc778\uc2dd\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub17c\ubb38\uc9c0 \ucef4\ud4e8\ud130 \ubc0f \ud1b5\uc2e0\uc2dc\uc2a4\ud15c Vol.2 No.8, Aug. 2013, pp.327-334.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.07-Header_Signature_Maintenance-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 16, No. 1, Jul. 2013, pp. 11-23.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc900\uc0c1, \uc724\uc131\ud638, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.07-Performance_Improment_based_on_Application_Locality-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ud2b8\ub798\ud53d\uc758 \uc9c0\uc5ed\uc131\uc744 \uc774\uc6a9\ud55c \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.38B No.7, Jul. 2013, pp.519-525.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc724\uc131\ud638, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.05-Behavior_based_Signature_Extraction_Method_for_Internet_Application_Traffic_Identification-KICS.Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud589\uc704\uae30\ubc18 \uc2dc\uadf8\ub2c8\uccd0 \ucd94\ucd9c \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.38B No.05, May 2013, pp.368-376.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\uacbd\ub95c, \uae40\uba85\uc12d, \uae40\ud615\uc911,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2012\/2012.12-SSH_Traffic_Identification-KICS_Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">EM \ud074\ub7ec\uc2a4\ud130\ub9c1\uc744 \uc774\uc6a9\ud55c SSH \ud2b8\ub798\ud53d \uc2dd\ubcc4<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.37B No.12, Dec. 2012, pp.1160-1167.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ud5c8\ubbfc,\uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2012\/2012.11-Research_on_the_Identification_of_Network_Access_Type_of_End-Hosts_for_Effective_Network_Management-KICS_Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud6a8\uc728\uc801\uc778 \ub124\ud2b8\uc6cc\ud06c \uc790\uc6d0 \uad00\ub9ac\ub97c \uc704\ud55c \ud638\uc2a4\ud2b8\uc758 \uc811\uc18d \uc720\ud615 \ud310\ubcc4\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.37B No.11, Nov. 2012, pp.965-974.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc548\ud604\ubbfc, \ucd5c\uc9c0\ud601, \ud568\uc7ac\ud604, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2012\/2012.12-A_Method_to_resolve_the_Limit_of_Traffic_Classification_caused_by_Abnormal_TCP_Session-KNOM_Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">TCP \uc138\uc158\uc758 \uc774\uc0c1\ub3d9\uc791\uc73c\ub85c \uc778\ud55c \ud2b8\ub798\ud53d \ubd84\uc11d \ubc29\ubc95\ub860\uc758 \ud55c\uacc4\uc640 \ud574\uacb0 \ubc29\uc548<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 15, No. 1, Jul. 2012, pp. 31-39.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc724\uc131\ud638, \ubc15\uc900\uc0c1,  \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2012\/2012.05-Performance_Improvement_of_a_Real-time_Traffic_Identification_System_on_a_Multi-core_CPU_Environment-KICS_Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uba40\ud2f0 \ucf54\uc5b4 \ud658\uacbd\uc5d0\uc11c \uc2e4\uc2dc\uac04 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c \ucc98\ub9ac\uc18d\ub3c4 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 '12-05 Vol.37B No.5, May 2012, pp. 348-356.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc9c4\ucc3d\uaddc, \uae40\uba85\uc12d, \ucd5c\ubbf8\uc815,<\/span> \"<a target=_new href=\"\/publication\/published.papers\/2011\/2011.12 - HTTP Traffic Classification - KNOM Review.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">HTTP \ud5e4\ub354\ub97c \uc774\uc6a9\ud55c \uc11c\ubc84\ubcc4(\uc0ac\uc774\ud2b8\uce21\uba74) \ubd84\ub958 <\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 14, No. 2, Dec. 2011, pp. 1-9.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ucd5c\ubbf8\uc815, \uc9c4\ucc3d\uaddc, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2011\/2011.11 - Classification of Client-side Application-level HTTP Traffic - KICS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">HTTP \ud2b8\ub798\ud53d\uc758 \ud074\ub77c\uc774\uc5b8\ud2b8\uce21 \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158\ubcc4 \ubd84\ub958<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.36 No.11, Nov. 2011, pp.1277-1284.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\ud604\uc2e0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2011\/2011.05 - \uc2e4\uc2dc\uac04 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc6b4\uc601\uccb4\uc81c \ud310\ubcc4\ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c - KISC Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc2e4\uc2dc\uac04 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc6b4\uc601\uccb4\uc81c \ud310\ubcc4\ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c \ub17c\ubb38\uc9c0 Vol.36 No.5, May 2011, pp. 443-450.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\uc0c1\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2011\/2011.08 - \uc624\ud1a0\ub9c8\ud0c0\ub97c \uc774\uc6a9\ud55c \uba54\uc2e0\uc800 \ud2b8\ub798\ud53d\uc758 \uae30\ub2a5\ubcc4 \ubd84\ub958\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc624\ud1a0\ub9c8\ud0c0\ub97c \uc774\uc6a9\ud55c \uba54\uc2e0\uc800 \ud2b8\ub798\ud53d\uc758 \uae30\ub2a5\ubcc4 \ubd84\ub958\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0 Vol.36 No.8, Aug. 2011, pp.921-928.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc724\uc131\ud638, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2011\/2011.12 - \ud5e4\ub354 \uae30\ubc18 \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c - KSII Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud5e4\ub354 \uae30\ubc18 \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">\ud55c\uad6d\uc778\ud130\ub137\uc815\ubcf4\ud559\ud68c Vol.12 No.6, 12. 2011, pp. 19-33.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc9c4\uc644,  \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2011\/2011.08 - \ud1b5\uacc4 \uc2dc\uadf8\ub2c8\uccd0 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uc758 \uc131\ub2a5 \ud5a5\uc0c1 - KIPS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud1b5\uacc4 \uc2dc\uadf8\ub2c8\uccd0 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub17c\ubb38\uc9c0 C \uc81c18-C\uad8c \uc81c4\ud638, Aug. 2011, pp. 243-250.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc724\uc131\ud638, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - \ud50c\ub85c\uc6b0 \uc0c1\uad00\uad00\uacc4\ub97c \ud1b5\ud55c \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc758 \uc131\ub2a5 \ud5a5\uc0c1\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud50c\ub85c\uc6b0 \uc0c1\uad00\uad00\uacc4\ub97c \ud1b5\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0B Vol.36 No.6, Jun. 2011, pp. 600-607.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc900\uc0c1, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - \ud0d0\uc0c9\uacf5\uac04 \ucd5c\uc801\ud654\ub97c \ud1b5\ud55c \uc2dc\uadf8\ub2c8\uccd0\uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c \uc131\ub2a5 \ud5a5\uc0c1 - KSII Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud0d0\uc0c9\uacf5\uac04 \ucd5c\uc801\ud654\ub97c \ud1b5\ud55c \uc2dc\uadf8\ub2c8\uccd0\uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\uc778\ud130\ub137\uc815\ubcf4\ud559\ud68c \ub17c\ubb38\uc9c0  Vol.12 No.3, Jun. 2011, pp. 89-99.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc774\uc0c1\uc6b0, \uc774\ud604\uc2e0, \ucd5c\ubbf8\uc815, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2011\/2011.02 - \ub3d9\uc791\ud615\ud0dc \ubd84\uc11d\uc744 \ud1b5\ud55c Skype \uc751\uc6a9 \ud2b8\ub798\ud53d\uc758 \uc2e4\uc2dc\uac04 \ud0d0\uc9c0 \ubc29\ubc95 - KICS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub3d9\uc791\ud615\ud0dc \ubd84\uc11d\uc744 \ud1b5\ud55c Skype \uc751\uc6a9 \ud2b8\ub798\ud53d\uc758 \uc2e4\uc2dc\uac04 \ud0d0\uc9c0 \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0 Vol.36 No.2, , Feb. 2011, pp.131-140.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\uc9c0\ud61c, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2010\/2010.12 - DNS \ud328\ud0b7 \uae30\ubc18 \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uc0dd\uc131 \ubc0f \uc11c\ube44\uc2a4 \ubcc4 \ud2b8\ub798\ud53d \ubd84\ub958\uc5d0 \uad00\ud55c \uc5f0\uad6c - KNOM Review Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">DNS \ud328\ud0b7 \uae30\ubc18 \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uc0dd\uc131 \ubc0f \uc11c\ube44\uc2a4 \ubcc4 \ud2b8\ub798\ud53d \ubd84\ub958\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 13, No. 2, Dec. 2010, pp. 34-42.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc900\uc0c1, \uc724\uc131\ud638, \ubc15\uc9c4\uc644, \uc774\ud604\uc2e0, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2010\/2010.09 - Performance Improvement of the Payload Signature based Traffic Classification System - KICS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\ucc98 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0 Vol.35 No.9, , Sep. 2010, pp.1287-1294.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc624\uc601\uc11d, \ubc15\uc900\uc0c1, \uc724\uc131\ud638, \ubc15\uc9c4\uc644, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2010\/2010.08 - Multi-Level basd Application Traffic Classification Method - KICS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uba40\ud2f0 \ub808\ubca8 \uae30\ubc18\uc758 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d \ubc29\ubc95<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0 Vol.35 No.8, Aug. 2010, pp.1170-1178.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc724\uc131\ud638, \ubc15\uc9c4\uc644, \ubc15\uc900\uc0c1, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2010\/2010.04 - Fixed IP-port based Application-Level Internet Traffic Classification - KIPS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uace0\uc815 IP-port \uae30\ubc18 \uc751\uc6a9 \ub808\ubca8 \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub17c\ubb38\uc9c0 C \uc81c17-C\uad8c \uc81c2\ud638, , Apr. 2010, pp. 205-214.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc720\uc7ac\ud559, \uc774\ud55c\uc131, \uc784\uc601\ud76c, \uae40\uba85\uc12d, \ubc15\ub300\ud76c,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2010\/2010 - Hierarchical Internet Application Traffic Classification using a Multi-class SVM - KIIS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ub2e4\uc911 \ud074\ub798\uc2a4 SVM\uc744 \uc774\uc6a9\ud55c \uacc4\uce35\uc801 \uc778\ud130\ub137 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ud2b8\ub798\ud53d\uc758 \ubd84\ub958<\/span><\/a>\", <span style=\"color: black;  \">\ud55c\uad6d\uc9c0\ub2a5\uc2dc\uc2a4\ud15c\ud559\ud68c \ub17c\ubb38\uc9c0 \uc81c 20\uad8c 1\ud638, 2010.02.25, pp. 7-14.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc900\uc0c1, \ubc15\uc9c4\uc644, \uc724\uc131\ud638, \uc774\ud604\uc2e0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2010\/2010 - Development of Signature Generation and Update System for Application-level Traffic Classification - KIPS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ub808\ubca8 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \uc2dc\uadf8\ub2c8\uccd0 \uc0dd\uc131 \ubc0f \uac31\uc2e0 \uc2dc\uc2a4\ud15c \uac1c\ubc1c<\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub17c\ubb38\uc9c0 C \uc81c17-C\uad8c \uc81c1\ud638, , Feb. 2010, pp. 99-108.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc9c4\uc644, \uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Statistic Signature based Application Traffic Classification - KICS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud1b5\uacc4 \uc2dc\uadf8\ub2c8\uccd0 \uae30\ubc18\uc758 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0 Vol.34 No.11, , Nov. 2009, pp.1234-1244.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc900\uc0c1, \uc724\uc131\ud638, \ubc15\uc9c4\uc644, \uc774\ud604\uc2e0, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Research on the Performance Improvement of Application-Level Traffic Classification System using Payload Signature - KNOMReview.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uae30\ubc18 \uc751\uc6a9 \ub808\ubca8 \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c \uc131\ub2a5 \ud5a5\uc0c1\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 12, No. 2, Dec. 2009, pp. 12-21.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\ubc15\uc900\uc0c1, \uae40\uc131\uc724, \ubc15\ub300\ud76c, \ucd5c\ubbf8\uc815, \uae40\uba85\uc12d,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System - KIPS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">SNMP \uae30\ubc18\uc758 \uc2e4\uc2dc\uac04 \ud2b8\ub798\ud53d \ud3ed\uc8fc \uacf5\uaca9 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c \uc124\uacc4 \ubc0f \uad6c\ud604<\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub17c\ubb38\uc9c0 C \uc81c16-C\uad8c \uc81c1\ud638, , Feb. 2009, pp.13-20.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc720\uc7ac\ud559, \ubc15\uc900\uc0c1, \uc774\ud55c\uc131, \uae40\uba85\uc12d, \ubc15\ub300\ud76c,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Traffic Flooding Attack Detection on SNMP MIB Using SVM - KIPS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">SVM\uc744 \uc774\uc6a9\ud55c SNMP MIB\uc5d0\uc11c\uc758 \ud2b8\ub798\ud53d \ud3ed\uc8fc \uacf5\uaca9 \ud0d0\uc9c0<\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub17c\ubb38\uc9c0 C, \uc81c15-C\uad8c \uc81c5\ud638, Oct. 2008, pp. 351-358.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc815\uad11\ubcf8 , \ucd5c\ubbf8\uc815 , \uae40\uba85\uc12d, \uc6d0\uc601\uc900 , \ud64d\uc6d0\uae30,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Traffic Classification Using Machine Learning Algorithms in Practical Network Monitoring Environments - KICS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">\uc2e4\uc81c \ub124\ud2b8\uc6cc\ud06c \ubaa8\ub2c8\ud130\ub9c1 \ud658\uacbd\uc5d0\uc11c\uc758 ML \uc54c\uace0\ub9ac\uc998\uc744 \uc774\uc6a9\ud55c \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\", <span style=\"color: black;  \">\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0 Vol.33 No.8, , Aug. 2008, pp.707-718.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\uba85\uc12d, \uae40\uc131\uc724, \ubc15\uc900\uc0c1, \ucd5c\uacbd\uc900,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Enterprise Network Weather Map System using SNMP - KIPS Journal.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">SNMP\ub97c \uc774\uc6a9\ud55c Enterprise Network Weather Map \uc2dc\uc2a4\ud15c<\/span><\/a>\", <span style=\"color: black;  \">\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub17c\ubb38\uc9c0 C, \uc81c15-C\uad8c \uc81c2\ud638, Apr. 2008, pp. 93-102.<\/span> [<font color=#0096FF>\ud559\uc9c4\ub4f1\uc7ac<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uc815\uad11\ubcf8, \ucd5c\ubbf8\uc815, \uae40\uba85\uc12d, \uc6d0\uc601\uc900, \ud64d\uc6d0\uae30,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - Internet Application Traffic Classification using Machine - KNOMReview2007.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">ML \uc54c\uace0\ub9ac\uc998\uc744 \uc801\uc6a9\ud55c \uc778\ud130\ub137 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review, Vol. 10, No. 2, Dec. 2007, pp. 39 - 52.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">\uae40\uba85\uc12d, \uc6d0\uc601\uc900, \uc774\ud615\uc870, \ud64d\uc6d0\uae30,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2004\/2004 - Flow-based Internet Application Traffic Characteristic Analysis - KNOM2004.pdf\"><span style=\"color:black; font-weight:500; font-family:'Noto Sans KR';\">Flow \uae30\ubc18\uc758 \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ud2b9\uc131 \ubd84\uc11d<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review,  Vol. 7, No. 1, Aug. 2004, pp. 20-31.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black ; font-weight:400;\">Hyo-Jin Lee, Myung-Sup Kim, James W. Hong, and Gil-Haeng Lee,<\/span> \"<a target=_new href=\"\/publication\/published papers\/2002\/2002 - QoS Parameters to Network Performance Metrics Mapping for SLA Monitoring - KONM2002.pdf\"><span style=\"color:black; font-weight:600; font-family:'Noto Sans KR';\">QoS Parameters to Network Performance Metrics Mapping for SLA Monitoring<\/span><\/a>\", <span style=\"color: black;  \">KNOM Review,  Vol. 5, No. 2, Dec. 2002, pp. 42-53.<\/span><\/ol> \r\n\r\n<\/BODY>\r\n<\/HTML>\r\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Publication Welcome to Network Mangement Lab.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"folder":[],"class_list":["post-1546","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Publication Welcome to Network Mangement Lab.","_links":{"self":[{"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/pages\/1546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/comments?post=1546"}],"version-history":[{"count":31,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/pages\/1546\/revisions"}],"predecessor-version":[{"id":3306,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/pages\/1546\/revisions\/3306"}],"wp:attachment":[{"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/media?parent=1546"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/folder?post=1546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}