{"id":1563,"date":"2023-02-05T16:19:31","date_gmt":"2023-02-05T07:19:31","guid":{"rendered":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/?page_id=1563"},"modified":"2023-03-08T18:13:38","modified_gmt":"2023-03-08T09:13:38","slug":"conference","status":"publish","type":"page","link":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/conference\/","title":{"rendered":"Publication-Conference"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1563\" class=\"elementor elementor-1563\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b5fb0ec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b5fb0ec\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-211dd39\" data-id=\"211dd39\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b23e95 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3b23e95\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.1 - 15-02-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Publication<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd04285 elementor-widget elementor-widget-heading\" data-id=\"fd04285\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Welcome to Network Mangement Lab.<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9ce29e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ce29e1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e571299\" data-id=\"e571299\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a46699d elementor-widget elementor-widget-shortcode\" data-id=\"a46699d\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\r\n<!DOCTYPE HTML PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\">\r\n<HTML><HEAD><TITLE>My Publications<\/TITLE>\r\n\r\n<META http-equiv=Content-Type content=\"text\/html; charset=utf-8\">\r\n<META content=\"Microsoft FrontPage 5.0\" name=GENERATOR>\r\n\r\n\t<style type='text\/css'>\r\n\t\t\tli:hover{background: #F5F5F5;}\r\n    <\/style>\r\n<\/HEAD>\r\n\r\n<BODY bgColor='#ffffff'>\r\n\r\n \r\n<!------------------------------------------------------------------>\r\n<h3 style='border-bottom:2px solid; line-height : 50px; margin-bottom: 30px;'><font color='#000000'> International Conference <font size=2> : 81<\/font><\/font><\/h3>\r\n\r\n\t\t\t\t\t\t\t\r\n<ol>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Yoon-Seong Jang, Ui-Jun Baek, Jimin Kim, Yangseo Choi, ChangYui Shin, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2026\/2026.05-Session-Cluster_Sequence-NOMS2026.pdf\"><span style=\"color:black; font-weight:700 \">Transformer-based Attack Traffic Detection and Classification in Session-Cluster Sequence Level<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE\/IFIP Network Operations and Management Symposium (NOMS) 2026, Seoul, Korea, May. 18-22, 2026, pp.1-6.<\/span> [\uac8c\uc81c\uc608\uc815]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Gyeong-Min Yu, Tae-Woong Kwon, Ui-Jun Baek, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2026\/2026.05-TSHiRT-NOMS2026.pdf\"><span style=\"color:black; font-weight:700 \">\t TSHiRT : Traffic Session Hierarchical Representation from Transformer<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE\/IFIP Network Operations and Management Symposium (NOMS) 2026, Seoul, Korea, May. 18-22, 2026, pp.1-8.<\/span> [\uac8c\uc81c\uc608\uc815]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Seung-Woo Nam, Gyeong-Min Yu, Jae-Won Park, Yoon-Seong Jang, Ju-Sung Kim and Myung-Sup Kim , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.09-Improving_Oscillation_Navigation_in_Complex_Environments-APNOMS2025.pdf\"><span style=\"color:black; font-weight:700 \">Improving Oscillation & Navigation in Complex Environments Based on ROS2 Through Path Modification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2025, Kaohsiung,Taiwan, Sep. 22-24, 2025, pp. 1-4.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Yoon-Seong Jang, Ji-Min Kim, Ju-Sung Kim, Ui-Jun Baek, Yangseo Choi,  Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.09-Multi-Task_Classification_of_Encrypted_Traffic_Sequences-APNOMS2025.pdf\"><span style=\"color:black; font-weight:700 \">Multi-Task Detection and Classification of Encrypted Traffic Sequences via Session2Token Embedding<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2025, Kaohsiung,Taiwan, Sep. 22-24, 2025, pp. 1-4.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ui-Jun Baek,  Min-Seong Lee, Jee Tae Park,  Jeong-Woo Choi , Chang-Yui Shin, Ju-Sung Kim, Yoon-Seong Jang and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.05-MISCNN+-NOMS2024.pdf\"><span style=\"color:black; font-weight:700 \">Lightweight Multi-Input Shape CNN-based Application Traffic Classification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE\/IFIP Network Operations and Management Symposium (NOMS) 2024, Seoul, Korea, May. 6-10, 2024, pp.1-4.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ui-Jun Baek, Jee-Tae Park, Jeong-Woo Choi, Seung-Woo Nam, Jae-Won Park, Gyeong-Min Yu, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.11-CNN-based_Application_Traffic_Classification-ISIPS2023.pdf\"><span style=\"color:black; font-weight:700 \">Multi-Input Shape CNN-based Application Traffic Classification<\/span><\/a>\",<span style=\"color:black; \"> 17th International collaboration Symposium on Information, Production and Systems (ISIPS 2023), Fukuoka, Japan, Nov. 15-17, 2023, pp.45-48.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jee Tae Park, Ui-Jun Baek, Chang-Yui Shin, Min-Seong Lee, Jeong-Woo Choi and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.09-Network_User_Action_Detection-APNOMS2023.pdf\"><span style=\"color:black; font-weight:700 \">Network User Action Detection Based on PSD Signature Through Encrypted Traffic Analysis<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2023, Sejong, Korea, Sep. 6-8, 2023, pp.318-321.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Min-Seong Lee, Jee Tae Park, Ui-Jun Baek, Chang-Yui Shin,  Jeong-Woo Choi and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.09-Lightweight-Heavyweight_Hybrid_Approach-APNOMS2023.pdf\"><span style=\"color:black; font-weight:700 \">Lightweight-Heavyweight Hybrid Approach for Application Traffic Classification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2023, Sejong, Korea, Sep. 6-8, 2023, pp.314-317.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ui-Jun Baek, Min-Seong Lee, Jee Tae Park, Jeong-Woo Choi, Chang-Yui Shin, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.09-Preprocessing_of_Open_Traffic_Dataset -APNOMS2023.pdf\"><span style=\"color:black; font-weight:700 \">Preprocessing and Analysis of an Open Dataset in Application Traffic Classification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2023, Sejong, Korea, Sep. 6-8, 2023, pp.227-230.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jee-Tae Park, Ui-Jun Baek, Chang-Yui Shin, Min-Seong Lee, Jeong-Woo Choi and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.10-Automatic_Rule_Generation_Method-ICTC2022.pdf\"><span style=\"color:black; font-weight:700 \">Automatic Rule Generation Method for User Action Detection from Traffic Data<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 13th International Conference on ICT Convergence (ICTC 2022), Jeju, Korea, Oct. 19-21, 2022, pp.2037-2040.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ui-Jun Baek, Boseon Kim, Jee-Tae Park, Jeong-Woo Choi and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.09-MISCNN-APNOMS2022.pdf\"><span style=\"color:black; font-weight:700 \">MISCNN: A Novel Learning Scheme for CNN-Based Network Traffic Classification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2022, Takamatsu, Japan, Sep. 28-30, 2022, pp.1-6.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jee-Tae Park,  Min-Seong Lee, Ui-Jun Baek, Chang-Yui Shin, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.09-Rule-base_SaaS_behavior_detection_system-APNOMS2022.pdf\"><span style=\"color:black; font-weight:700 \">Rule-Based User Behavior Detection System for SaaS Application<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2022, Takamatsu, Japan, Sep. 28-30, 2022, pp.1-4.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Young-Hoon Goo, Kyu-Seok Shim, Ui-Jun Baek, Jee-Tae Park, Mu-Gon Shin, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.09-APRE_on_TCPIP_Reference_Model-APNOMS2020.pdf\"><span style=\"color:black; font-weight:700 \">An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP\/IP Reference Model<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2020, Daegu, Korea, Sep. 23-25, 2020, pp.43-48.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ui-Jun Baek, Mu-Gon Shin, Min-Seong Lee, Boseon Kim, Jee-Tae Park, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.09-Time_Series_Clustering_for_Bitcoin_Prices_Prediction-APNOMS2020.pdf\"><span style=\"color:black; font-weight:700 \">Comparison of Distance Measurement in Time Series Clustering for Predicting Bitcoin Prices<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2020, Daegu, Korea, Sep. 23-25, 2020, pp.267-270.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Mu-Gon Shin, Ui-Jun Baek, Kyu-Seok Shim, Jee-Tae Park, Sung-Ho Yoon, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.09-Block_Clustering_on_Bitcoin-APNOMS2019.pdf\"><span style=\"color:black; font-weight:700 \">Block Analysis in Bitcoin System Using Clustering with Dimension Reduction<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2019, Matsue, Japan, Sep. 18-20, 2019, pp.1-6.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ui-Jun Baek, Se-Hyun Ji, Jee-Tae Park, Min-Seob Lee, Jun-Sang Park, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.09-DDoS_Attach_Detection_on_Bitcoin-APNOMS2019.pdf\"><span style=\"color:black; font-weight:700 \">DDoS Attack Detection on Bitcoin Ecosystem Using Deep-Learning<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2019, Matsue, Japan, Sep. 18-20, 2019, pp.1-6.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Se-Hyun Ji, Ui-Jun Baek, Mu-Gon Shin, Young-Hoon Goo, Jun-Sang Park, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.09-Feature_Selection_for_Prediction_of_Bitcoin_Transaction_Count-APNOMS2019.pdf\"><span style=\"color:black; font-weight:700 \">Best Feature Selection Using Correlation Analysis for Prediction of Bitcoin Transaction Count<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2019, Matsue, Japan, Sep. 18-20, 2019, pp.1-6.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Min-Seob Lee, Young-Hoon Goo, Kyu-Seok Shim, Sung-Ho Yoon, Se-Hyun Ji, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.09-Text_Protocol_Field_Extraction-APNOMS2019.pdf\"><span style=\"color:black; font-weight:700 \">A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2019, Matsue, Japan, Sep. 18-20, 2019, pp.1-6.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jee-Tae Park, Young-Hoon Goo, Kyu-Seok Shim, Ui-Jun Baek and Myung-Sup Kim , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.10-Attack_Traffic_Detection_using_Flow_Correlation-ICTC2018.pdf\"><span style=\"color:black; font-weight:700 \">Network Attack Traffic Detection for Calculating Correlation of the Flow<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 2018 International Conference on Information and Communication Technology Convergence (ICTC 2018), Jeju, Korea, Oct. 17-19, 2018, pp.928-931.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ui-Jun Baek, Jee-Tae Park, Huru Hasanova, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.10-DL_based_Flow_Grouping-ICTC2018.pdf\"><span style=\"color:black; font-weight:700 \">The Method of Seed Based Grouping Malicious Traffic by Deep-Learning<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 2018 International Conference on Information and Communication Technology Convergence (ICTC 2018), Jeju, Korea, Oct. 17-19, 2018, pp.701-705.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \"> Min-Seob Lee, Kyu-Seok Shim, Young-Hoon Goo, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.10-Field_Extraction_in_APRE-ICTC2018.pdf\"><span style=\"color:black; font-weight:700 \">A Study on the Method to Extract Clear Fields From the Private Protocol<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 2018 International Conference on Information and Communication Technology Convergence (ICTC 2018), Jeju, Korea, Oct. 17-19, 2018, pp.1397-1402.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Kyu-Seok Shim, Young-Hoon Goo, Min-Seob Lee, Huru Hasanova and Myung-Sup Kim , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.10-Traffic_Classification_using_Flow_Clustering-ICTC2018.pdf\"><span style=\"color:black; font-weight:700 \">The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 2018 International Conference on Information and Communication Technology Convergence (ICTC 2018), Jeju, Korea, Oct. 17-19, 2018, pp.1335-1337.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Young-Hoon Goo,  Kyu-Seok Shim,  Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.09-APRE_Framework-ICCNT2018.pdf\"><span style=\"color:black; font-weight:700 \">Automatic Reverse Engineering Method for Extracting Well-trimmed Protocol Specification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 2018 2nd International Conference on Communication and Network Technology (ICCNT 2018), Stockholm, Sweden, Sep. 22, 2018, pp.1-5.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Kyu-Seok Shim, Young-Hoon Goo, Min-Seob Lee, Huru Hasanova and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.04-Tree_Structure_based_APRE-DISSECT2017.pdf\"><span style=\"color:black; font-weight:700 \">Inference of Network Unknown Protocol Structure using CSP(Contiguous Sequence Pattern) Algorithm based on Tree Structure<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the NOMS 2018 - IEEE\/IFIP DISSECT workshop, Taipei, Taiwan, April. 23, 2018, pp.1-4.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jee-Tae Park,  Sung-ho Lee,  Young-Hoon Goo,  Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.04-Seed_based_Sequential_Grouping_Model-AnNet2018.pdf\"><span style=\"color:black; font-weight:700 \">Network Attack Traffic Detection using Seed based Sequential Grouping Model<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the NOMS 2018 - IEEE\/IFIP AnNet workshop, Taipei, Taiwan, April. 23, 2018, pp.1-4.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Young-Hoon Goo,  Kyu-Seok Shim,  Byeong-Min Chae,  Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.04-APRE_Framework-AnNet2017.pdf\"><span style=\"color:black; font-weight:700 \">Framework for Precise Protocol Reverse Engineering Based on Network Traces<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the NOMS 2018 - IEEE\/IFIP AnNet workshop, Taipei, Taiwan, April. 23, 2018, pp.1-4.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Kyu-Seok Shim, Young-Hoon Goo, Sungyun Kim, Mi-Jung Choi and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.09-SigManager-APNOMS2017.pdf\"><span style=\"color:black; font-weight:700 \">SigManager: Automatic Payload Signature Management System for the Classification of Dynamically Changing Internet Applications<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2017, Seoul, Korea, Sep. 27-29, 2017, pp.350-353.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jee-Tae Park, Kyu-Seok Shim, Sung-Ho Lee, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.09-Traffic_Classification_using_Tensorflow-APNOMS2017.pdf\"><span style=\"color:black; font-weight:700 \">Classification of Application Traffic Using Tensorflow Machine Learning<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2017, Seoul, Korea, Sep. 27-29, 2017, pp.391-394.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sung-Ho Lee, Young-Hoon Goo, Jee-Tae Park, Se-Hyun Ji, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.09-Sky-Scope-APNOMS2017.pdf\"><span style=\"color:black; font-weight:700 \">Sky-Scope : Skype Application Traffic Identification System<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2017, Seoul, Korea, Sep. 27-29, 2017, pp.259-262.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Baraka D. Sija , Young-Hoon Goo, Kyu-Seok-Shim, Sungyun Kim, Mi-Jung Choi and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.09-Survey_APRE-APNOMS2017.pdf\"><span style=\"color:black; font-weight:700 \">Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2017, Seoul, Korea, Sep. 27-29, 2017, pp.271-274.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Woo-Suk Jung, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.09-Structured_WhiteList_Generation-APNOMS2017.pdf\"><span style=\"color:black; font-weight:700 \">Structured Whitelist Generation in SCADA Network using PrefixSpan Algorithm<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2017, Seoul, Korea, Sep. 27-29, 2017, pp.326-329.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Young-Hoon Goo, Sung-Ho Lee, Seongyun Choi, Mi-Jung Choi and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.09-Traffic_Grouping_Method-APNOMS2017.pdf\"><span style=\"color:black; font-weight:700 \">A Traffic Grouping Method using the Correlation Model of Network Flow<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2017, Seoul, Korea, Sep. 27-29, 2017, pp.386-390.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sung-ho Lee, Young-Hoon Goo, Baraka D. Sija,  Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.10-Signature_Quality_Evaluation-APNOMS2016.pdf\"><span style=\"color:black; font-weight:700 \">Finding the Highly Efficient Application Signature through Payload Signature Quality Evaluation<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2016, Kanazawa, Japan, Oct. 5-7, 2016.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Young-Hoon Goo, Kyu-Seok Shim, Su-Kang Lee, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.10-Payload_Signature_Structure-APNOMS2016.pdf\"><span style=\"color:black; font-weight:700 \">Payload Signature Structure for Accurate Application Traffic Classification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2016, Kanazawa, Japan, Oct. 5-7, 2016.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Woo-suk Jung, Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.10-Whitelist_Representation-APNOMS2016.pdf\"><span style=\"color:black; font-weight:700 \">Whitelist Representation for FTP Service in SCADA system by using Structured ACL Model <\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2016, Kanazawa, Japan, Oct. 5-7, 2016.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">YooJin Kwon, Myung-Sup Kim, Yong Hun Lim, Jong In Lim , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.08-Smart_Grid_Infrastructure-APNOMS2015.pdf\"><span style=\"color:black; font-weight:700 \">Network and System Management Object Modeling for Smart Grid Infrastructure<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015, Busan, Korea, Aug. 19-21, 2015, pp.588-591.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sung-Ho Lee, Jun-Sang Park, Sung-Ho Yoon, and Myung-Sup Kim , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.08-High_performance_payload_signature-APNOMS2015.pdf\"><span style=\"color:black; font-weight:700 \">High performance payload signature-based Internet traffic classification system <\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015, Busan, Korea, Aug. 19-21, 2015, pp.491-494.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sung-Min Kim, Young-Hoon Goo, Soo-Gil Choi, Mi-Jung Choi and Myung-Sup Kim , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.08-Service_Identification_of_SSL_TLS_Encrypted_Traffic-APNOMS2015.pdf\"><span style=\"color:black; font-weight:700 \">A Method for Service Identification of SSL\/TLS Encrypted Traffic with the Relation of Session ID and Server IP<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015, Busan, Korea, Aug. 19-21, 2015, pp.487-490.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Su-Kang Lee, Sung-Ho Yoon, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.08-Automatic_Header-Signature_Naming_System-APNOMS2015.pdf\"><span style=\"color:black; font-weight:700 \">Research on Automatic Header-Signature Naming System for Internet Service Identification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015, Busan, Korea, Aug. 19-21, 2015, pp.428-431.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sung-Ho Yoon, Kyu-Seok Shim, Su-Kang Lee, and Myung-Sup Kim , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.08-Multi-Level_Application_Traffic_Identification-APNOMS2015.pdf\"><span style=\"color:black; font-weight:700 \">Framework for Multi-Level Application Traffic Identification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015, Busan, Korea, Aug. 19-21, 2015, pp.424-427.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Kyu-Seok Shim, Sung-Ho Yoon, Mi-Jung Choi, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.08-Signature_Management_System-APNOMS2015.pdf\"><span style=\"color:black; font-weight:700 \">Signature Management System to cope with Traffic Changes in Application and Service<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015, Busan, Korea, Aug. 19-21, 2015, pp.192-197.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Woo-suk Jung, Jun-Sang Park, Jae-Hyun Ham, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.08-Payload_Signature_Structure-APNOMS2015.pdf\"><span style=\"color:black; font-weight:700 \">Efficient Payload Signature Structure for Performance Improvement of Traffic Identification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015, Busan, Korea, Aug. 19-21, 2015, pp.180-185.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Kyu-Seok Shim, Su-Kang Lee and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.09-Application_Traffic_Hadoop-APNOMS2014.pdf\"><span style=\"color:black; font-weight:700 \">Application Traffic Classification in Hadoop Distributed Computing Environment<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2014, Hsinchu, Taiwan, Sep. 17-19, 2014.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Su-Kang Lee, Hyun-Min Ahn, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.09-Out-of-order-Retransmission-APNOMS2014.pdf\"><span style=\"color:black; font-weight:700 \">Packet Out-of-order and Retransmission in Statistics-based Traffic Analysis<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2014, Hsinchu, Taiwan, Sep. 17-19, 2014.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Hyun-Min An, Jae-Hyun Ham, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.02-cross-order-ICCTAI2014.pdf\"><span style=\"color:black; font-weight:700 \">Method for Resolving Traffic Classification Limitations caused by Traffic Collection Points<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the3rd International Conference on Computational Techniques and Artificial Intelligence (ICCTAI) 2014, Singapore, Feb. 11-12, 2014, pp.22-26.<\/span> [<font color=#0096FF><\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sung-Ho Yoon, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.01-Behavior_Signature_for_Big_Data_Traffic_Identification-BigComp2014.pdf\"><span style=\"color:black; font-weight:700 \">Behavior Signature for Big Data Traffic Identification <\/span><\/a>\",<span style=\"color:black; \"> Proc. of the International Conference on Big Data and Smart Computing (BigComp) 2014, Bangkok, Thailand, Jan. 15-17, 2014, pp. 261-266.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jun-Sang Park, Sung-Ho Yoon, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.09-Application_Traffic_Temporal_Locality-APNOMS2013.pdf\"><span style=\"color:black; font-weight:700 \">Performance Improvement of the Payload Signature based Traffic Classification System using Application Traffic Temporal Locality<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2013, Hiroshima, Japan, Sep. 25-27, 2013, pp.1-6.<\/span> [<font color=#0096FF>STG award<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Hyun-Min An, Jae-Hyun Ham, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.09-Statistic_Signature-APNOMS2013.pdf\"><span style=\"color:black; font-weight:700 \">Application Traffic Classification using Statistic Signature<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2013, Hiroshima, Japan, Sep. 25-27, 2013.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ji-Hyeok Choi, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.09-Payload_Signature_Hierarchy-APNOMS2013.pdf\"><span style=\"color:black; font-weight:700 \">Improved Processing Speed of Traffic Classification  based on Payload Signature Hierarchy<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2013, Hiroshima, Japan, Sep. 25-27, 2013.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sung-Ho Yoon, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.09-Header_Signature_Maintenance-APNOMS2013.pdf\"><span style=\"color:black; font-weight:700 \">An Efficient Method to Maintain the Header Signature for Internet Traffic Identification <\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2013, Hiroshima, Japan, Sep. 25-27, 2013.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ji-hye Kim, Sung-Ho Yoon, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2012\/2012.09-Study_on_traffic_classification_taxonomy_for_multiliteral_and_hierarchical_traffic_classification-APNOMS2012.pdf\"><span style=\"color:black; font-weight:700 \">Study on traffic classification taxonomy for multiliteral and hierarchical traffic classification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2012, Seoul, Korea, Sep. 25-27, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Hur Min, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2012\/2012.09-Towards_Smart_Phone_Traffic_Classification-APNOMS2012.pdf\"><span style=\"color:black; font-weight:700 \">Towards Smart Phone Traffic Classification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2012, Seoul, Korea, Sep. 25-27, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sung-Ho Yoon, Jun-Sang Park, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.04 - Signature Maintenance for Internet Application Traffic Identification using Header Signatures - ManFI2012.pdf\"><span style=\"color:black; font-weight:700 \">Signature Maintenance for Internet Application Traffic Identification using Header Signatures<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 4th IEEE\/IFIP International Workshop of the Management of the Future Internet (ManFI 2012), Hwaii, USA, Apr. 16, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jaehak Yu, Hansung Lee, Byung-Bog Lee, Myung-Sup Kim, and Daihee Park, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.11 - Traffic Flooding Attack Detection and Classification with SNMP MIB via SVDD and Sparse Representation - ICISCEA2011.pdf\"><span style=\"color:black; font-weight:700 \">Traffic Flooding Attack Detection and Classification with SNMP MIB via SVDD and Sparse Representation<\/span><\/a>\",<span style=\"color:black; \"> Proc. of International Conference on Information System , Computer Engineering & Application (ICISCEA 2011), Singapore , Nov. 28-29, 2011.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Suman Pandey, Mi-Jung Choi, Myung-Sup Kim, and James W. Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.09 - Towards Management of Machine to Machine - APNOMS2011.pdf\"><span style=\"color:black; font-weight:700 \">Towards Management of Machine to Machine Networks<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2011, Taipei, Taiwan, Sep. 21-23, 2011.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Min Hur, Hyun-shin Lee, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.09 - A study Identifying the Connection Type of an End-host to the Network using Round-Trip-Time - APNOMS2011.pdf\"><span style=\"color:black; font-weight:700 \">A study Identifying the Connection Type of an End-host to the Network using Round-Trip-Time<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2011, Taipei, Taiwan, Sep. 21-23, 2011.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sang-Woo Lee, Jun-Sang Park, Hyun-Shin Lee, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.09 - A Study on Smart-phone Traffic Analysis - APNOMS2011.pdf\"><span style=\"color:black; font-weight:700 \">A Study on Smart-phone Traffic Analysis<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2011, Taipei, Taiwan, Sep. 21-23, 2011.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jun-Sang Park, Sung-Ho Yoon, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.04 - Software Architecture for a Lightweight Payload Signature-Based Traffic Classification System - TMA2011.pdf\"><span style=\"color:black; font-weight:700 \">Software Architecture for a Lightweight Payload Signature-based Traffic Classification System<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Traffic Monitoring and Analysis (TMA) Workshop 2011, LNCS6613, Vienna, Austria, Apr. 27, 2011, pp. 136-149.<\/span> [<font color=#0096FF>LNCS SCOPUS<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Sung-Ho Yoon, Jin-Wan Park, Young-Seok Oh, Jun-Sang Park, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Internet Application Traffic Classification using Fixed IP-Port - APNOMS2009.pdf\"><span style=\"color:black; font-weight:700 \">Internet Application Traffic Classification Using Fixed IP-port<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2009, LNCS5787, Jeju, Korea, Sep. 23-25, 2009, pp. 21-30.<\/span> [<font color=#0096FF>LNCS SCOPUS<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Byung-Chul Park, Young Won, Mi-Jung Choi, Myung-Sup Kim, and James W. Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning - APNOMS2008.pdf\"><span style=\"color:black; font-weight:700 \">Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2008, LNCS5297, Beijing, China, Oct. 22-24, 2008, pp. 474-477.<\/span> [<font color=#0096FF>LNCS SCOPUS<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jun-Sang Park,  and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System - APNOMS2008.pdf\"><span style=\"color:black; font-weight:700 \">Design and Implementation of an SNMP-based Traffic Flooding Attack Detection System<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2008, LNCS5297, Beijing, China, Oct. 22-24, 2008, pp. 380-389.<\/span> [<font color=#0096FF>LNCS SCOPUS<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Byung-Chul Park, Young J. Won, Myung-Sup Kim, James W. Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Towards Automated Application Signature Generation for Traffic Identification - NOMS2008.pdf\"><span style=\"color:black; font-weight:700 \">Towards Automated Application Signature Generation for Traffic Identification<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE\/IFIP Network Operations and Management Symposium (NOMS) 2008, Salvador, Bahia, Brazil, Apri. 7-11, 2008, 160-167.<\/span> [<font color=#0096FF>SCOPUS<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Young J. Won, Mi-Jung Choi, Myung-Sup Kim, Hong-Sun Noh, Jun Hyub Lee, Hwa Won Hwang, James Won-Ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - Measurement Analysis of IP-Based Process Control Networks - APNOMS2007.pdf\"><span style=\"color:black; font-weight:700 \">Measurement Analysis of IP-based Process Control Networks<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007, LNCS4773, Sapporo, Japen, Oct. 10-12, 2007, pp. 385-394.<\/span> [<font color=#0096FF>LNCS SCOPUS<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung-Sup Kim and Alberto Leon-Garcia, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - Autonomic Network Resource Management Using Virtual Network Concept - APNOMS2007.pdf\"><span style=\"color:black; font-weight:700 \">Autonomic Network Resource Management using Virtual Network Concept<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007, LNCS4773, Sapporo, Japen, Oct. 10-12, 2007, pp. 254-264.<\/span> [<font color=#0096FF>LNCS SCOPUS<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung-Sup Kim, and James W. Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2006\/2006 - A Hybrid Approach for Accurate Application Traffic Identification - E2EMON2006.pdf\"><span style=\"color:black; font-weight:700 \">A Hybrid Approach for Accurate Application Traffic Identification<\/span><\/a>\",<span style=\"color:black; \"> IEEE\/IFIP Workshop on End-to-End Monitoring Techniques and Services (E2EMON) 2006, Vancouver, Canada, Apr. 3, 2006, pp. 1-8.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ramy Farha, Myung Sup Kim, Alberto Leon-Garcia, and James Won-ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2005\/2005 - Towards an Autonomic Service Architecture - IPOM2005.pdf\"><span style=\"color:black; font-weight:700 \">Towards an Autonomic Service Architecture<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE International Workshop on IP Operations & Management (IPOM) 2005, Barcelona, Spain, Oct. 26-28, 2005, pp. 58-67.<\/span> [<font color=#0096FF>SCIE<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Ramy Farha, Myung Sup Kim, Alberto Leon-Garcia, and James Won-ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2005\/2005 - Autonomic Service Architecture using Virtual Services - APNOMS2005.pdf\"><span style=\"color:black; font-weight:700 \">Autonomic Service Architecture using Virtual Services<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2005, Okinawa, Japan, Sep. 27-30, 2005, pp. 343-354.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung Sup Kim, Ali Tizghadam, Alberto Leon-Garcia, and James Won-ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2005\/2005 - Virtual Network based Autonomic Network Resource Control and Management System - GlobeCom2005.pdf\"><span style=\"color:black; font-weight:700 \">Virtual Network based Autonomic Network Resource Control and Management System<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE GlobeCom 2005, St. Louis, USA, Nov. 28 - Dec. 02, 2005, pp.1075-1079.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2004\/2004 - A Flow-based Method for Abnormal Network Traffic Detection - NOMS2004.pdf\"><span style=\"color:black; font-weight:700 \">A Flow-based Method for Abnormal Network Traffic Detection<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE\/IFIP Network Operations and Management Symposium (NOMS)  2004, Seoul, Korea, Apr. 19-23, 2004, pp. 559-612.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung-Sup Kim, Young J. Won, Hyung-Jo Lee, James W. Hong, and Raouf Boutaba, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2004\/2004 - Flow-based Characteristic Analysis of Internet Application Traffic - E2EMON2004.pdf\"><span style=\"color:black; font-weight:700 \">Flow-based Characteristic Analysis of Internet Application Traffic<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE\/IFIP Workshop on End-to-End Monitoring Techniques and Services (E2EMON) 2004, San Diego, California, USA, Oct. 3, 2004, pp. 62-67.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Seung-Hwa Chung, Deepali Agrawal, Myung-Sup Kim, James W. Hong, and Kihong Park, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2004\/2004 - Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP - E2EMON2004.pdf\"><span style=\"color:black; font-weight:700 \">Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE\/IFIP Workshop on End-to-End Monitoring Techniques and Services (E2EMON) 2004, San Diego, California, USA, Oct. 3, 2004, pp. 68-74.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Hun-Jeong Kang, Seung-Hwa Chung, Seong-Cheol Hong, Myung-Sup Kim, and James Won-Ki, Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2003\/2003 - Towards Flow-based Abnormal Network Traffic Detection - APNOMS2003.pdf\"><span style=\"color:black; font-weight:700 \">Towards Flow-based Abnormal Network Traffic Detection<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2003, Fukuoka, Japan, Oct. 1-3, 2003, pp. 369-380.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Hun-Jeong Kang, Myung-Sup Kim, and James Won-Ki, Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2003\/2003 - A Method on Multimedia Service Traffic Monitoring and Analysis - DSOM2003.pdf\"><span style=\"color:black; font-weight:700 \">A Method on Multimedia Service Traffic Monitoring and Analysis<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IFIP\/IEEE Distributed Systems: Operations and Management (DSOM) 2003, Heidelberg, Germeny, Oct. 20-22, 2003, pp. 93-105.<\/span> [<font color=#0096FF>SCIE<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung-Sup Kim, Hun-Joung Kang, and James Won-Ki, Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2003\/2003 - Towards Peer-to-Peer Traffic Analysis Using Flows - DSOM2003.pdf\"><span style=\"color:black; font-weight:700 \">Towards Peer-to-Peer Traffic Analysis Using Flows<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IFIP\/IEEE Distributed Systems: Operations and Management (DSOM) 2003, Heidelberg, Germeny, Oct. 20-22, 2003, pp. 55-67.<\/span> [<font color=#0096FF>SCIE<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung-Sup Kim and James Won-Ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2002\/2002 - Highly Available and Efficient Load Cluster Management System using SNMP and Web - NOMS2002.pdf\"><span style=\"color:black; font-weight:700 \">Highly Available and Efficient Load Cluster Management System using SNMP and Web<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IEEE\/IFIP Network Operations and Management Symposium (NOMS) 2002, Florence, Italy, Apri. 15-19, 2002, pp. 619-632.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Hun-Jeong Kang, Hong-Taek Ju, Myung-Sup Kim, and James Won-Ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2002\/2002 - Towards Streaming Media Traffic Monitoring and Analysis - APNOMS2002.pdf\"><span style=\"color:black; font-weight:700 \">Towards Streaming Media Traffic Monitoring and Analysis<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2002, Jeju, Korea, Sep. 25-27, 2002, pp. 503-504.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Se-Hee Han, Hong-Taek Ju, Myung-Sup Kim, and James Won-Ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2002\/2002 - Design of Next Generation High-Speed IP Network Traffic Monitoring and Analysis System - APNOMS2002.pdf\"><span style=\"color:black; font-weight:700 \">Design of Next Generation High-Speed IP Network Traffic Monitoring and Analysis System<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2002, Jeju, Korea, Sep. 25-27, 2002, pp. 282-293.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Hyo-Jin Kim, Myung-Sup Kim, James Won-Ki Hong, and Gil-Haeng Lee, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2002\/2002 - Mapping between \ube80 Parameters and Network Performance Metrics for SLA Monitoring - APNOMS2002.pdf\"><span style=\"color:black; font-weight:700 \">Mapping between QoS Parameters and Network Performance Metrics for SLA Monitoring<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2002, Jeju, Korea, Sep. 25-27, 2002, pp. 97-108.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Se-Hee Han, Myung-Sup Kim, Hong-Taek Ju, and J. Won-Ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2002\/2002 - The Arcitecture of NG-MON A Passive Network Monitoring System - DSOM2002.pdf\"><span style=\"color:black; font-weight:700 \">The Arcitecture of NG-MON: A Passive Network Monitoring System<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the IFIP\/IEEE Distributed Systems: Operations and Management (DSOM) 2002, Montreal, Canada, Oct. 21-23, 2002, pp. 16-27.<\/span> [<font color=#0096FF>SCIE<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung-Sup Kim and James Won-Ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2001\/2001 - SNMP and Web-based Load Cluster Management System - APNOMS2001.pdf\"><span style=\"color:black; font-weight:700 \">SNMP and Web-based Load Cluster Management System<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2001, Sydney, Australia, Sep. 26-28, 2001, pp. 268-279.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Jae-Young Kim, Myung-Sup Kim, and James Won-Ki Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2000\/2000 - Management of Differentiated Services Using the SNMP Framework - ICACT2000.pdf\"><span style=\"color:black; font-weight:700 \">Management of Differentiated Services Using the SNMP Framework<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the International Conference on Advanced Communication Technology (ICACT) 2000, Muju, Korea, Feb. 16-18, 2000, pp. 624-629.<\/span><\/ol>\r\n\r\n\r\n\r\n\r\n<!------------------------------------------------------------------>\r\n<h4 style='border-bottom:2px solid; line-height : 50px;  margin-top:80px;margin-bottom: 30px;'><font color='#000000'> Domestic Conference <font size=2> : 272<\/font><\/font><\/h4>\r\n\r\n\t\t\t\t\t\t\t\r\n<ol>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ub780\uc544, \ub0a8\uc2b9\uc6b0, \uc720\uacbd\ubbfc, \uae40\uc8fc\uc131, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2026\/2026.02-CNN-based_CAN_FD_Traffic_Analysis-KICS2026.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">1D CNN\uc744 \ud65c\uc6a9\ud55c CAN FD \uc545\uc131 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2026\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2026 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 4, 2026, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc9c0\ubbfc, \uc7a5\uc724\uc131, \ub0a8\uc2b9\uc6b0, \uc720\uacbd\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2026\/2026.02-packet_bundle-based_Behavior_Analysis-KICS2026.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud328\ud0b7 \ubc88\ub4e4 \uae30\ubc18 \ub124\ud2b8\uc6cc\ud06c \ud589\uc704 \ubd84\uc11d\uc744 \uc704\ud55c \ub525\ub7ec\ub2dd \ubaa8\ub378 \ube44\uad50 \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2026\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2026 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 4, 2026, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc7a5\uc724\uc131, \uae40\uc9c0\ubbfc, \uae40\uc8fc\uc131, \ubc31\uc758\uc900, \ucd5c\uc591\uc11c, \ucd5c\ud0dc\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.11_Transformer-based_Attack_Traffic_Detection-KICS2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub79c\uc2a4\ud3ec\uba38 \uae30\ubc18 \uc138\uc158 \ud074\ub7ec\uc2a4\ud130 \uc2dc\ud000\uc2a4 \ub2e8\uc704 \uacf5\uaca9 \ud2b8\ub798\ud53d \ud0d0\uc9c0 \ubc0f \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud55c\uad6d\uba40\ud2f0\ubbf8\ub514\uc5b4\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025), \ubd80\uc0b0\ub300\ud559\uad50, \ubd80\uc0b0, Nov. 13-15, 2025, pp.1-4.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc8fc\uc131, \uc720\uacbd\ubbfc, \uc7a5\uc724\uc131, \ub0a8\uc2b9\uc6b0, \ubc15\uc7ac\uc6d0, \ucd5c\ud0dc\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.11_Masking-based_Hierarchical_Embedding-KICS2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub9c8\uc2a4\ud0b9 \uae30\ubc18 \uacc4\uce35\uc801 \uc784\ubca0\ub529\uc744 \ud1b5\ud55c \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ubd84\ub958 \ubaa8\ub378\uc758 \uc77c\ubc18\ud654 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025), \ub77c\ud55c\uc140\ub809\ud2b8, \uacbd\uc8fc, Nov. 19-21, 2025, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc9c0\ubbfc, \uc7a5\uc724\uc131, \ubc15\uc7ac\uc6d0, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.06_Hybrid_Abnormal_Traffic_Detection-KICS2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2dc\uadf8\ub2c8\ucc98 \uae30\ubc18 \ud544\ud130\ub9c1\uacfc 2D-CNN\uc744 \ud65c\uc6a9\ud55c \ud558\uc774\ube0c\ub9ac\ub4dc \uc545\uc131 \ud2b8\ub798\ud53d \ud0d0\uc9c0 \uae30\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025), \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc, Jun. 18-20, 2025, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc7a5\uc724\uc131, \uae40\uc9c0\ubbfc, \uae40\uc8fc\uc131, \ubc31\uc758\uc900, \uae40\uba85\uc12d , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.06_CNN-based_Tokenization_for_Traffic_Classificationk-KICS2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">CNN \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\ub958\uae30\uc758 \uc138\uc158 \ub0b4 \ud328\ud0b7 \uc21c\uc11c\ub97c \ubc18\uc601\ud55c \ucc28\ud2b8 \ud615\ud0dc \uc785\ub825 \ubc29\ubc95\ub860<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025), \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc, Jun. 18-20, 2025, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc7ac\uc6d0, \ub0a8\uc2b9\uc6b0, \uc720\uacbd\ubbfc, \uae40\uc131\ud604, \ubc31\uc758\uc900, \uae40\uba85\uc12d , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.06_ROS2-QOS-Analysis-KICS2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">ROS2 QoS \ubc0f \uc8fc\uae30 \ubcc0\ud654\uc5d0 \ub530\ub978 \uc9c0\uc5f0 \ud2b9\uc131 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025), \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc, Jun. 18-20, 2025, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ub0a8\uc2b9\uc6b0,\uc720\uacbd\ubbfc,\ubc15\uc7ac\uc6d0,\uae40\uc131\ud604,\ubc31\uc758\uc900,\uae40\uba85\uc12d , <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.06_DQN_based_CPP-KICS2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">DQN \uae30\ubc18 \ucee4\ubc84\ub9ac\uc9c0 \uacbd\ub85c \uacc4\ud68d\uc5d0\uc11c\uc758 \ud30c\ub77c\ubbf8\ud130 \ubd84\uc11d <\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025), \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc, Jun. 18-20, 2025, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc8fc\uc131, \uc7a5\uc724\uc131, \uae40\uc9c0\ubbfc, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.06_Transformer-Based_Application_Traffic_Classificationk-KICS2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud328\ud0b7 \uad6c\uc870 \ud559\uc2b5\uc744 \ud1b5\ud55c \ud2b8\ub79c\uc2a4\ud3ec\uba38 \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025), \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc, Jun. 18-20, 2025, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uacbd\ubbfc, \ub0a8\uc2b9\uc6b0, \ubc15\uc7ac\uc6d0, \ubc31\uc758\uc900, \uae40\uc9c0\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.04_Monocular_VSLAM-KNOM2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc5e3\uc9c0 \ucef4\ud4e8\ud305 \uae30\ubc18 \ub2e8\uc548 \uae4a\uc774 \ucd94\uc815 \ubaa8\ub4c8\uacfc VSLAM \ud1b5\ud569 \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2025), KISTI, \ub300\uc804, Apr. 24-26, 2025, pp. 37-39.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc7ac\uc6d0, \uc720\uacbd\ubbfc, \ub0a8\uc2b9\uc6b0, \uc7a5\uc724\uc131, \uae40\uc8fc\uc131, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.04_Comparison_of_ROS1_and_ROS2-KNOM2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">ROS1\uacfc ROS2\uc758 \uad6c\uc870\uc801 \ucc28\uc774\uc640 \uc790\uc728\uc8fc\ud589 \uc2dc\uc2a4\ud15c \uc801\uc6a9 \uad00\uc810\uc5d0\uc11c\uc758 \ube44\uad50 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2025), KISTI, \ub300\uc804, Apr. 24-26, 2025, pp. 40-42.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ub0a8\uc2b9\uc6b0, \uc720\uacbd\ubbfc, \ubc15\uc7ac\uc6d0, \uae40\uc131\ud604, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.04_A-star-upgrade_Path_Planning-KNOM2025.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uac1c\uc120\ud55c \ud734\ub9ac\uc2a4\ud2f1 \ud568\uc218\ub97c \uc0ac\uc6a9\ud55c A* \uae30\ubc18 \uc548\uc804\ud55c \uacbd\ub85c \uacc4\ud68d<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2025), KISTI, \ub300\uc804, Apr. 24-26, 2025, pp. 17-19.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc8fc\uc131, \uc7a5\uc724\uc131, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.02-Deep_Learning_Model_for_Model_Selection-KICS2025.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ubbf8\ubd84 \uac00\ub2a5\ud55c \uc885\ub2e8\uac04 \uc559\uc0c1\ube14 \uae30\ubc18\uc758 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 5, 2025, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc7a5\uc724\uc131, \uae40\uc8fc\uc131, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.02-Filter-and-Refine_Model-KICS2025.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Filter-and-Refine \uae30\ubc18 \uacbd\ub7c9\ud654 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \ubaa8\ub378 \uc2e0\ub8b0\ub3c4 \uae30\ubc18 \uc784\uacc4\uac12 \uacb0\uc815 \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 5, 2025, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uacbd\ubbfc, \ub0a8\uc2b9\uc6b0, \ubc15\uc7ac\uc6d0, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.02-Monicular_GS_SLAM-KICS2025.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uae4a\uc774 \ucd94\uc815 \ubaa8\ub378\uacfc \ud1b5\uacc4\uc801 \ud544\ud130\ub9c1\uc744 \ud65c\uc6a9\ud55c \ub2e8\uc548 GS SLAM \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 5, 2025, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc7ac\uc6d0,\ub0a8\uc2b9\uc6b0,\uc720\uacbd\ubbfc,\ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.02-KISS-ICP_Performance_Improvement-KICS2025.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc790\uc728\uc8fc\ud589 \uc2dc\uc2a4\ud15c\uc5d0\uc11c KISS-ICP \uc131\ub2a5 \ud5a5\uc0c1\uc744 \uc704\ud55c \uade0\uc77c \uc0d8\ud50c\ub9c1 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 5, 2025, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ub0a8\uc2b9\uc6b0,\uc720\uacbd\ubbfc,\ubc15\uc7ac\uc6d0,\ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2025\/2025.02-A-star_algorithm_evaluation-KICS2025.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uacbd\ub85c \ud0d0\uc0c9 \ud6a8\uc728\uc131 \ud5a5\uc0c1: \uac1c\uc120\ub41c A* \uc54c\uace0\ub9ac\uc998\uc758 \ube44\uad50 \ubc0f \ud3c9\uac00<\/span><\/a>\",<span style=\"color:black; \"> 2025\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2025 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 5, 2025, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900, \uc7a5\uc724\uc131, \ub0a8\uc2b9\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.10_Ensemble-based_Model_Selection-ACK2024.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ubaa8\ub378 \uc120\ud0dd \uae30\ubc95\uc744 \ud65c\uc6a9\ud55c \uc559\uc0c1\ube14 \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> Annual Conference of KIPS 2024 (ACK 2024), \uc804\ub0a8\ub300\ud559\uad50, \uad11\uc8fc, Oct. 31-Nov.02, 2024, pp.1-3.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc8fc\uc131, \uc7a5\uc724\uc131, \ubc15\uc7ac\uc6d0, \uc720\uacbd\ubbfc, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.10_Shannon_Entropy-based_Encryption_Detection-ACK2024.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc100\ub10c \uc5d4\ud2b8\ub85c\ud53c\ub97c \ud1b5\ud55c \ud2b8\ub798\ud53d \uc554\ud638\ud654 \ud310\ubcc4<\/span><\/a>\",<span style=\"color:black; \"> Annual Conference of KIPS 2024 (ACK 2024), \uc804\ub0a8\ub300\ud559\uad50, \uad11\uc8fc, Oct. 31-Nov.02, 2024, pp.1-3.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uacbd\ubbfc, \ub0a8\uc2b9\uc6b0, \ubc15\uc7ac\uc6d0, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.06_Mobile Robot_Pose_Estimation-KICS2024.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2e4\uc2dc\uac04 Segmentation\uc744 \ud65c\uc6a9\ud55c \uc2e4\ub0b4 \ubaa8\ubc14\uc77c \ub85c\ubd07 \uc704\uce58 \ucd94\uc815 \uc131\ub2a5 \uac1c\uc120<\/span><\/a>\",<span style=\"color:black; \"> 2024\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2024), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 19-22, 2024, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc7ac\uc6d0, \ub0a8\uc2b9\uc6b0, \uc720\uacbd\ubbfc, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.06_VPN-based_ROS_Network-KICS2024.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud6a8\uc728\uc801\uc778 \ub85c\ubd07 \ud1b5\uc2e0\uc744 \uc704\ud55c VPN \uae30\ubc18 ROS2 \ub124\ud2b8\uc6cc\ud06c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2024\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2024), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 19-22, 2024, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ub0a8\uc2b9\uc6b0, \uc720\uacbd\ubbfc, \ubc15\uc7ac\uc6d0, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.06_ROS_Path_Planning_Optimization-KICS2024.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uacbd\ub85c \ube44\uad50\ub97c \ud1b5\ud55c ROS \uae30\ubc18 \uacbd\ub85c \uacc4\ud68d \uc54c\uace0\ub9ac\uc998 \ucd5c\uc801\ud654<\/span><\/a>\",<span style=\"color:black; \"> 2024\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2024), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 19-22, 2024, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc7a5\uc724\uc131, \uae40\uc8fc\uc131, \ubc15\uc9c0\ud0dc, \uc774\uc724\uc11c, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.06_Multi-Host_Traffic_Collection_System-KICS2024.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uba38\uc2e0\ub7ec\ub2dd \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud504\ub85c\uc138\uc2a4 \ub85c\uadf8 \ud65c\uc6a9 \ub370\uc774\ud130\uc14b \uc218\uc9d1 \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2024\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2024), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 19-22, 2024, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc8fc\uc131, \uc7a5\uc724\uc131, \ubc15\uc9c0\ud0dc, \ucd5c\uc720\uc9c4, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.06_Attention-based_DL_Traffic_Calssification-KICS2024.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc5b4\ud150\uc158 \uc2dc\uac01\ud654\ub97c \ud1b5\ud55c \uc554\ud638\ud654 \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2024\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2024), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 19-22, 2024, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc7a5\uc724\uc131, \ucd5c\uc815\uc6b0, \uae40\uc6a9\ud6c8, \ubc15\uc7ac\uc6d0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.01-Public_Data_Set_Pre-Processing-KICS2024.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \uacf5\uac1c \ub370\uc774\ud130\uc14b\uc758 \uc804\ucc98\ub9ac \ub3d9\ud5a5<\/span><\/a>\",<span style=\"color:black; \"> 2024\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2024 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Jan. 31, 2024, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc8fc\uc131, \uc720\uacbd\ubbfc, \ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.01-Feature_Selection_for_Traffic_Classification-KICS2024.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc554\ud638\ud654 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \ud1b5\uacc4\uc801 \ud2b9\uc9d5 \ucd94\ucd9c \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2024\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2024 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Jan. 31, 2024, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ub0a8\uc2b9\uc6b0, \ubc15\uc7ac\uc6d0, \uc720\uacbd\ubbfc, \ubc31\uc758\uc900, \ucd5c\uc815\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2024\/2024.01-Robot_Control_Platform-KICS2024.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub85c\ubd07 \uc81c\uc5b4 \ud50c\ub7ab\ud3fc\uc758 \ud1b5\uc2e0 \uc2dc\uc2a4\ud15c \uc124\uacc4 \ubc0f \uad6c\ud604<\/span><\/a>\",<span style=\"color:black; \"> 2024\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2024 \ub3d9\uacc4), \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Jan. 31, 2024, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc815\uc6b0, \ub0a8\uc2b9\uc6b0, \ubc15\uc7ac\uc6d0, \uc720\uacbd\ubbfc, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.06_Autonomous_chasing_system_design-KICS2023.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2e4\ub0b4 \uce68\uc785\uc790 \uc790\uc728 \ucd94\uaca9 \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2023), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 21-24, 2023, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uacbd\ubbfc, \ub0a8\uc2b9\uc6b0, \ubc15\uc7ac\uc6d0, \ucd5c\uc815\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.06_AI-based_Guide_Robot-KICS2023.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc790\uc728\uc8fc\ud589\uc774 \uc801\uc6a9\ub41c AI \uae30\ubc18 \uc548\ub0b4 \ub85c\ubd07 \uc124\uacc4 \ubc0f \uad6c\ud604<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2023), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 21-24, 2023, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc7ac\uc6d0,\uc720\uacbd\ubbfc,\ub0a8\uc2b9\uc6b0,\ubc31\uc758\uc900,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.06_Human_Detection_and_Position_Centering_Method-KICS2023.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">ROS2 \uae30\ubc18 \ub85c\ubd07\uc758 \ub525\ub7ec\ub2dd \uae30\ubc18 \uc0ac\ub78c \uc778\uc2dd \ubc0f \uc704\uce58 \uc911\uc559 \uc815\ub82c \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2023), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 21-24, 2023, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900,\ubc15\uc9c0\ud0dc,\uae40\uc8fc\uc131,\ub0a8\uc2b9\uc6b0,\ubc15\uc7ac\uc6d0,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.06_Preprocessing_Open_Dataset-KICS2023.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 \uacf5\uac1c \ub370\uc774\ud130\uc14b\uc758 \uc804\ucc98\ub9ac \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2023), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 21-24, 2023, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \ucd5c\uc815\uc6b0, \uae40\uc8fc\uc131, \uc720\uacbd\ubbfc, \uc2e0\ucc3d\uc758, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.06_Multi-Modal_Signatures-KICS2023.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc554\ud638\ud654 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \ud1b5\ud55c Multi-Modal Signature \uae30\ubc18\uc758 \uc545\uc131 \ud589\uc704 \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS 2023), \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, \uc81c\uc8fc, Jun. 21-24, 2023, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc815\uc6b0, \ub0a8\uc2b9\uc6b0, \ubc15\uc7ac\uc6d0, \uc720\uacbd\ubbfc, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.05_Autonomous_Indor_Service_Robot-KNOM2023.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc790\uc728 \ubc29\ubc94 \ub85c\ubd07 \uae30\ubc18 \uc2e4\ub0b4 \uce68\uc785\uc790 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2023), \uc81c\uc8fc\ub300\ud559\uad50, \uc81c\uc8fc, May 18-20, 2023, pp. 102-105.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc8fc\uc131, \ubc15\uc9c0\ud0dc, \ud64d\uc724\ud658, \ud638\ud0dc\uaddc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.05_SNI-based_Zoom_Behavior_Analysis-KNOM2023.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNI \uc815\ubcf4\ub97c \ud65c\uc6a9\ud55c Zoom \uc0ac\uc6a9\uc790 \ud589\uc704 \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2023), \uc81c\uc8fc\ub300\ud559\uad50, \uc81c\uc8fc, May 18-20, 2023, pp. 4-5.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \uc2e0\ucc3d\uc758, \uc720\uacbd\ubbfc, \uae40\uc8fc\uc131, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.02-Signature-Update_Detection_System-KICS2023.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ud328\ud134 \ubcc0\ud654\uc5d0 \ub300\ud55c \ud589\uc704 \ud0d0\uc9c0 \uaddc\uce59 \uc5c5\ub370\uc774\ud2b8 \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 8, 2023, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc815\uc6b0, \uc774\ubbfc\uc131, \ub0a8\uc2b9\uc6b0, \ucd5c\uac15\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.02-Intrusion_Detection_Robot-KICS2023.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">ROS \uae30\ubc18 \uce68\uc785\uc790 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 8, 2023, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900, \uae40\ubcf4\uc120, \ubc15\uc7ac\uc6d0, \ucd5c\uc815\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2023\/2023.02-lightweight_Mult-modal_CNN_Model-KICS2023.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uacbd\ub7c9 \ub2e4\uc911 \ubaa8\ud615 CNN \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2023\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 8, 2023, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc,\uc774\ubbfc\uc131,\uae40\ubcf4\uc120,\uc2e0\ucc3d\uc758,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.06-Design_of_Robot_Control_Platform-KICS2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud6a8\uc728\uc801\uc778 \uc2e4\ub0b4 \ub85c\ubd07 \uc81c\uc5b4\ub97c \uc704\ud55c \ub85c\ubd07 \uad00\uc81c \ud50c\ub7ab\ud3fc \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uadf8\ub79c\ub4dc\ud558\uc58f\ud2b8, \uc81c\uc8fc\ub3c4, Jun. 22-24, 2022.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ubcf4\uc120,\ucd5c\uc815\uc6b0,\uc774\ubbfc\uc131,\ubc31\uc758\uc900,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.06-Performance_Comparison_of_DL-based_Exploit_Kit_Detection-KICS2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ube14\ub799\ub9ac\uc2a4\ud2b8 \uc2dd\ubcc4 \uc815\ubcf4\uc5d0 \ub530\ub978 \ub525\ub7ec\ub2dd \uae30\ubc18 \uc775\uc2a4\ud50c\ub85c\uc787 \ud0b7 \ud0d0\uc9c0 \uc131\ub2a5 \ube44\uad50<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uadf8\ub79c\ub4dc\ud558\uc58f\ud2b8, \uc81c\uc8fc\ub3c4, Jun. 22-24, 2022.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ubbfc\uc131,\ubc15\uc9c0\ud0dc,\ucd5c\uc815\uc6b0,\ubc31\uc758\uc900,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.06-Measurement_of_Reliability_in_Machine_Learning_and_Ensemble_Classifier-KICS2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub370\uc774\ud130\uc758 \ud544\ud130\ub9c1\uc744 \uc704\ud55c \uba38\uc2e0 \ub7ec\ub2dd \ubc0f \uc559\uc0c1\ube14 \ubd84\ub958\uae30\uc5d0\uc11c\uc758 \uc2e0\ub8b0\ub3c4 \uce21\uc815<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uadf8\ub79c\ub4dc\ud558\uc58f\ud2b8, \uc81c\uc8fc\ub3c4, Jun. 22-24, 2022.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900,\uae40\ubcf4\uc120,\ubc15\uc9c0\ud0dc,\uc2e0\ucc3d\uc758,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.06-CNN-based_Intrusion_Detection_System-KICS2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">CNN \uae30\ubc18 \uce68\uc785 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c\uc758 \uc785\ub825 \ubaa8\ud615 \ucd5c\uc801\ud654<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uadf8\ub79c\ub4dc\ud558\uc58f\ud2b8, \uc81c\uc8fc\ub3c4, Jun. 22-24, 2022.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900, \uae40\ubcf4\uc120, \ubc15\uc9c0\ud0dc, \uc2e0\ucc3d\uc758, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.05_Multi-Shape_CNN_based_Application_Traffic_Classification-KNOM2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub2e4\uc911 \ubaa8\ud615 CNN \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2022), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May 12-13, 2022, pp. 69-72.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ubcf4\uc120, \ucd5c\uc815\uc6b0, \uc774\ubbfc\uc131, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.05_DL-based_Exploit_Kit_Detection-KNOM2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub525\ub7ec\ub2dd \uae30\ubc18 \uc775\uc2a4\ud50c\ub85c\uc787 \ud0b7 \ud0d0\uc9c0 \ubaa8\ub378\uc758 \uc785\ub825 \ub370\uc774\ud130 \uc124\uacc4\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2022), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May 12-13, 2022, pp. 173-174.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \uc774\ubbfc\uc131, \uae40\ubcf4\uc120, \uc2e0\ucc3d\uc758, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.05_Rule-based_User_Behavior_Detection-KNOM2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Rule \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \ud1b5\ud55c \uc0ac\uc6a9\uc790 \ud589\uc704 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2022), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May 12-13, 2022, pp. 175-176.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2e0\ucc3d\uc758, \ucd5c\uc815\uc6b0, \ubc31\uc758\uc900, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.05_quantitative_relationship_between_datasets_and_parameters-KNOM2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub525\ub7ec\ub2dd \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958\uc5d0\uc11c \ub370\uc774\ud130\uc14b\uacfc \ud30c\ub77c\ubbf8\ud130\uc758 \uc218\ub7c9\uc801 \uad00\uacc4\uc131\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2022), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May 12-13, 2022, pp. 66-67.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ubbfc\uc131, \ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \ud64d\uc724\ud658, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.05_Filtering_Method-based_Traffic_Classification_SpeedUp-KNOM2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud544\ud130\ub9c1 \ubc29\ubc95\uc744 \uc774\uc6a9\ud55c \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958\uc758 \uc18d\ub3c4 \uac1c\uc120 \ubc29\uc548<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2022), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May 12-13, 2022, pp. 64-65.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc815\uc6b0, \uae40\ubcf4\uc120, \uc774\uc815\uc6d0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.05_Mel-Spectrogram_CNN-based_Traffic_Classification-KNOM2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Mel-Spectrogram \ubc0f CNN\uc744 \ud65c\uc6a9\ud55c \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2022), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May 12-13, 2022, pp. 61-63.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \uc774\ubbfc\uc131, \ucd5c\uc815\uc6b0, \uc2e0\ucc3d\uc758, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.05_Mobile_Robot_Platform-KNOM2022.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2a4\ub9c8\ud2b8 \uc2e4\ub0b4 \uc11c\ube44\uc2a4\ub97c \uc704\ud55c \ubaa8\ubc14\uc77c \ub85c\ubd07 \ud50c\ub7ab\ud3fc \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2022), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May 12-13, 2022, pp. 52-53.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900, \uae40\ubcf4\uc120, \uc774\ubbfc\uc131, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.02-DL-based_Traffic_Classification_using_Flow_Relationship-KICS2022.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud50c\ub85c\uc6b0 \uac04 \uad00\uacc4\uc131\uc744 \uace0\ub824\ud55c \ub525\ub7ec\ub2dd \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc54c\ud39c\uc2dc\uc544\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 9, 2022, pp. 69-72.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ubbfc\uc131, \ubc15\uc9c0\ud0dc, \ucd5c\uc815\uc6b0, \ucd5c\ub3d9\uadfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.02-real-time_detection_of_malicious_traffic-KICS2022.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc545\uc131\ud2b8\ub798\ud53d\uc758 \uc2e4\uc2dc\uac04 \ud0d0\uc9c0\ub97c \uc704\ud55c CNN\uae30\ubc18 \ubd84\ub958 \ubaa8\ub378 \ube44\uad50 \ubc0f \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc54c\ud39c\uc2dc\uc544\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 9, 2022, pp. 1080-1081.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \uc774\ubbfc\uc131, \ucd5c\uc815\uc6b0, \uc774\uc815\uc6d0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2022\/2022.02-QUIC_Traffic_Classification-KICS2022.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Multi-Input CNN\uc744 \ud65c\uc6a9\ud55c UDP \uae30\ubc18\uc758 \uc554\ud638\ud654 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2022\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc54c\ud39c\uc2dc\uc544\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 9, 2022, pp. 1078-1079.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uac15\ubbfc\uaddc, \uae40\ubcf4\uc120, \uc2e0\ud76c\uc885, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.04_BitCoin_Price_Prediction-KNOM2021.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub274\uc2a4 \ub370\uc774\ud130\ub97c \uc774\uc6a9\ud55c \uba38\uc2e0\ub7ec\ub2dd \uae30\ubc18 \ube44\ud2b8\ucf54\uc778 \uac00\uaca9 \ub4f1\ub77d \uc608\uce21<\/span><\/a>\",<span style=\"color:black; \"> 2021\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2021), \ud3ec\ud56d\uacf5\uacfc\ub300\ud559\uad50, \ud3ec\ud56d, April 29, 2021, pp. 38-39.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad8c\uc724\uc8fc, \uc774\ubbfc\uc131, \ucd5c\uc815\uc6b0, \ubc15\uc9c0\ud0dc, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.04_Performance_Evaluation_MSOffice_Classification-KNOM2021.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uae30\uacc4\ud559\uc2b5\uc744 \uc774\uc6a9\ud55c Office365 \uc11c\ube44\uc2a4 \ubd84\ub958 \uc54c\uace0\ub9ac\uc998 \uc131\ub2a5 \ud3c9\uac00<\/span><\/a>\",<span style=\"color:black; \"> 2021\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2021), \ud3ec\ud56d\uacf5\uacfc\ub300\ud559\uad50, \ud3ec\ud56d, April 29, 2021, pp. 32-33.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc815\uc6b0, \ubc15\uc9c0\ud0dc, \uc774\ubbfc\uc131, \uad8c\uc724\uc8fc, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.04_SNI-based_MSOffice_Detection-KNOM2021.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNI \uc815\ubcf4\ub97c \ud65c\uc6a9\ud55c Office365 \uc0ac\uc6a9\uc790 \ud589\uc704 \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2021\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2021), \ud3ec\ud56d\uacf5\uacfc\ub300\ud559\uad50, \ud3ec\ud56d, April 29, 2021, pp. 26-27.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ubbfc\uc131, \ucd5c\uc815\uc6b0, \uad8c\uc724\uc8fc, \ubc15\uc9c0\ud0dc, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.04_Adobe_Feature_Detection-KNOM2021.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\ucc98\ub97c \uc774\uc6a9\ud55c Adobe \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc0ac\uc6a9\uc790 \ud589\uc704 \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2021\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2021), \ud3ec\ud56d\uacf5\uacfc\ub300\ud559\uad50, \ud3ec\ud56d, April 29, 2021, pp. 24-25.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc815\uc6b0,\ubc15\uc9c0\ud0dc,\uc774\ubbfc\uc131,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.02-User-Agent-based_Mobile_Traffic_Classification-KICS2021.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">HTTP \ud2b8\ub798\ud53d\uc758 User-Agent\ub97c \ud65c\uc6a9\ud55c \ubaa8\ubc14\uc77c \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2021\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 3, 2021, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ubcf4\uc120,\ubc31\uc758\uc900,\uc9c0\uc138\ud604,\uac15\ubbfc\uaddc,\uc2e0\ud76c\uc885,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.02-Clustering-based-Ground-Truth_Generation-KICS2021.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud074\ub7ec\uc2a4\ud130\ub9c1 \uae30\ubc18 \ube44\ud2b8\ucf54\uc778 \ub79c\uc12c\uc6e8\uc5b4 \uc8fc\uc18c\uc758 Ground-Truth \uc0dd\uc131 \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2021\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 3, 2021, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c0\uc138\ud604,\ubc31\uc758\uc900,\uae40\ubcf4\uc120,\uac15\ubbfc\uaddc,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2021\/2021.02-CNN-based_BitCoin_Block_Transaction_Prediction-KICS2021.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud569\uc131 \uacf1 \uc2e0\uacbd\ub9dd \uae30\ubc18 \ube44\ud2b8\ucf54\uc778 \ube14\ub85d \ub2e8\uc704 \ud2b8\ub79c\uc7ad\uc158 \uc218 \uc99d\uac10 \uc608\uce21<\/span><\/a>\",<span style=\"color:black; \"> 2021\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0\ub3c4, Feb. 3, 2021, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ud0dc\uc5f0, \ubc31\uc758\uc900, \uc2e0\ubb34\uace4, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.11-LSTM-based_Ethereum_Transaction_Prediction-KICS2020.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub274\uc2a4 \ub370\uc774\ud130\ub85c LSTM \ud65c\uc6a9\ud558\uc5ec \uc774\ub354\ub9ac\uc6c0 \ud2b8\ub79c\uc7ad\uc158 \uac1c\uc218 \uc608\uce21<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc628\ub77c\uc778 \uac1c\ucd5c, Nov. 13, 2020, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ubbfc\uc131, \ubc15\uc9c0\ud0dc, \ucd5c\uc815\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.11-MS365_Traffic_Analysis-KICS2020.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\ucc98\ub97c \uc774\uc6a9\ud55c \ub9c8\uc774\ud06c\ub85c\uc18c\ud504\ud2b8 Office 365 \uc11c\ube44\uc2a4 \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc628\ub77c\uc778 \uac1c\ucd5c, Nov. 13, 2020, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ubcf4\uc120, \uc2e0\ubb34\uace4, \uc774\ubbfc\uc131, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.11-Clustering-based-Bitcoin_Address_Analysis-KICS2020.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud074\ub7ec\uc2a4\ud130\ub9c1\uc744 \uc774\uc6a9\ud55c \ub79c\uc12c\uc6e8\uc5b4\uc5d0 \uc0ac\uc6a9\ub41c \ube44\ud2b8\ucf54\uc778 \uc8fc\uc18c \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc628\ub77c\uc778 \uac1c\ucd5c, Nov. 13, 2020, pp. 1-2.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uac15\ubbfc\uaddc, \uae40\ubcf4\uc120, \uc2e0\ubb34\uace4, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.11-LSTM-bsed-Bitcoin_price_prediction-KICS2020.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">LSTM \uae30\ubc18 \uac10\uc131\ubd84\uc11d\uc744 \uc774\uc6a9\ud55c \ube44\ud2b8\ucf54\uc778 \uac00\uaca9 \ub4f1\ub77d \uc608\uce21<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc628\ub77c\uc778 \uac1c\ucd5c, Nov. 13, 2020, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2e0\ubb34\uace4, \ubc31\uc758\uc900, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.05_Automatic_Update_System_for_mfds-KNOM2020.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc794\ub958\ubb3c\uc9c8\uc815\ubcf4 \ub370\uc774\ud130\ubca0\uc774\uc2a4 \uc790\ub3d9 \uc5c5\ub370\uc774\ud2b8 \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2020), \ud55c\uad6d\uacfc\ud559\uae30\uc220\uc815\ubcf4\uc5f0\uad6c\uc6d0(KISTI), \ub300\uc804, May 15, 2020, pp. 126-127.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \uad6c\uc601\ud6c8, \ubc31\uc758\uc900, \uc2e0\ubb34\uace4, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.05_Network_Topology_Analysis-KNOM2020.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ubc1c\uc0dd\ub7c9 \ubd84\uc11d\uc744 \ud65c\uc6a9\ud55c \ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub85c\uc9c0 \ud0d0\uc0c9<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2020), \ud55c\uad6d\uacfc\ud559\uae30\uc220\uc815\ubcf4\uc5f0\uad6c\uc6d0(KISTI), \ub300\uc804, May 15, 2020, pp. 114-116.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ud0dc\uc5f0, \uae40\ubcf4\uc120, \uc2e0\ubb34\uace4, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.05_Blockchain_Voting_System_Backend-KNOM2020.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc804\uc790 \ud22c\ud45c\uc2dc\uc2a4\ud15c\uc758 \ubc31\uc5d4\ub4dc \uc124\uacc4 \ubc0f \uad6c\ud604<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2020), \ud55c\uad6d\uacfc\ud559\uae30\uc220\uc815\ubcf4\uc5f0\uad6c\uc6d0(KISTI), \ub300\uc804, May 15, 2020, pp. 24-25.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ubcf4\uc120, \uae40\ud0dc\uc5f0, \uc2e0\ubb34\uace4, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.05_Blockchain_Voting_System_Frontend-KNOM2020.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc804\uc790 \ud22c\ud45c \uc2dc\uc2a4\ud15c\uc758 \ud504\ub860\ud2b8\uc5d4\ub4dc \uc124\uacc4 \ubc0f \uad6c\ud604<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2020), \ud55c\uad6d\uacfc\ud559\uae30\uc220\uc815\ubcf4\uc5f0\uad6c\uc6d0(KISTI), \ub300\uc804, May 15, 2020, pp. 22-23.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900,\uc9c0\uc138\ud604,\uc2e0\ubb34\uace4,\uc2ec\uaddc\uc11d,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.02-DDoS_Attack_Detection_for_BitCoin-KICS2020.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ube44\ud2b8\ucf54\uc778 \uc5d0\ucf54 \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \ub514\ub3c4\uc2a4 \uacf5\uaca9 \uc2e4\uc2dc\uac04 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0, Feb. 5-7, 2020, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d,\uad6c\uc601\ud6c8,\uc2e0\ubb34\uace4,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.02-APRE_for_ICS-KICS2020.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc0b0\uc5c5 \uc81c\uc5b4 \uc2dc\uc2a4\ud15c \ud504\ub85c\ud1a0\ucf5c \ubd84\uc11d\uc744 \uc704\ud55c \uba54\uc2dc\uc9c0 \ud0c0\uc785 \uc815\uc758 \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0, Feb. 5-7, 2020, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc,\uad6c\uc601\ud6c8,\uace0\ub3d9\uc601,\uc774\uc7ac\ud615,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.02-Automatic_Network_Topology_Discovery-KICS2020.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNMP\uae30\ubc18 \ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub85c\uc9c0 \ud0d0\uc0c9 \uc54c\uace0\ub9ac\uc998 \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0, Feb. 5-7, 2020, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ubbfc\uc131,\ubc15\uc218\ucca0,\uad6c\uc601\ud6c8,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2020\/2020.02-Auto_Attendance_Check_System-KICS2020.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud559\ub0b4 \uc804\uc790\ucd9c\uacb0\uc2dc\uc2a4\ud15c \ud2b8\ub798\ud53d \ubd84\uc11d \ubc0f \uc2dc\uc2a4\ud15c \uac1c\uc120 \ubc29\uc548<\/span><\/a>\",<span style=\"color:black; \"> 2020\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0, Feb. 5-7, 2020, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc2b9\uc9c4,\uc9c0\uc138\ud604,\ubc31\uc758\uc900,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.11-Statistical_Analysis_of_Blockchain_Block_Data-KICS2019.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud1b5\uacc4\ubd84\uc11d\uc744 \uc801\uc6a9\ud55c \ube44\ud2b8\ucf54\uc778 \ub370\uc774\ud130 \ucc98\ub9ac\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uad6d\ubbfc\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 16, 2019, pp. 505-506.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc218\ucca0,\uc2e0\ubb34\uace4,\ubc15\uc9c0\ud0dc,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.11-Clustering_Algorithms_for_Blockchain-KICS2019.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ube14\ub85d\uccb4\uc778 \uc5d0\ucf54\uc2dc\uc2a4\ud15c \ubd84\uc11d\uc744 \uc704\ud55c \ud074\ub7ec\uc2a4\ud130\ub9c1 \uc54c\uace0\ub9ac\uc998 \uc131\ub2a5 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uad6d\ubbfc\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 16, 2019, pp. 465-466.<\/span> [<font color=#0096FF>\ud559\ubd80\uc6b0\uc218\ub17c\ubb38 \uc7a5\ub824\uc0c1<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8,\ubc31\uc758\uc900,\uc2e0\ubb34\uace4,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.11-RE_of_Command_Oriented_Protocols-KICS2019.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uba85\ub839 \uc9c0\ud5a5\uc801 \ud504\ub85c\ud1a0\ucf5c\uc744 \uc704\ud55c \ub9ac\ubc84\uc2a4 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1 \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uad6d\ubbfc\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 16, 2019, pp. 0390-0391.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900,\uc774\ubbfc\uc12d,\uc2ec\uaddc\uc11d,\ubc15\uc9c0\ud0dc,\ubc15\uc900\uc0c1,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.06-BitCoin_DDoS_Detection-KICS2019.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub525\ub7ec\ub2dd \uae30\ubc18 \ube44\ud2b8\ucf54\uc778 \uad00\ub828 \uc11c\ube44\uc2a4\uc5d0 \ub300\ud55c \ub514\ub3c4\uc2a4 \uacf5\uaca9 \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4, \uc81c\uc8fc\ub3c4, Jun. 19-21, 2019, 748-749.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c0\uc138\ud604, \ubc31\uc758\uc900, \uc2e0\ubb34\uace4, \uad6c\uc601\ud6c8, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.06-BitCoin_Transaction_Prediction-KICS2019.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ube44\ud2b8\ucf54\uc778 \ud2b8\ub79c\uc7ad\uc158 \uc218 \uc608\uce21\uc744 \uc704\ud55c LSTM \ubaa8\ub378 \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4, \uc81c\uc8fc\ub3c4, Jun. 19-21, 2019, 748-749.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2e0\ubb34\uace4, \ubc31\uc758\uc900, \uad6c\uc601\ud6c8, \uc9c0\uc138\ud604, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.05_PCA-based_Clustering_on_BitCoin_Network-KNOM2019.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc8fc\uc131\ubd84 \ubd84\uc11d\uc744 \uc801\uc6a9\ud55c \ud074\ub7ec\uc2a4\ud130\ub9c1\uc744 \uc774\uc6a9\ud55c \ube44\ud2b8\ucf54\uc778 \ub124\ud2b8\uc6cc\ud06c \ubd84\uc11d \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2019), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May 30-31, 2019, pp. 102-103.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ubbfc\uc131, \uc2ec\uaddc\uc11d,\uc774\ubbfc\uc12d,\ubc15\uc900\uc0c1,\uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.05_Clustering_Algorithm_Performance_Evaluation-KNOM2019.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Modbus\/TCP \ud504\ub85c\ud1a0\ucf5c \uae30\ubc18 \ud074\ub7ec\uc2a4\ud130\ub9c1 \uc54c\uace0\ub9ac\uc998 \uc131\ub2a5 \ud3c9\uac00<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2019), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May 30-31, 2019, pp. 87-88.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c0\uc138\ud604, \uad6c\uc601\ud6c8, \ubc31\uc758\uc900, \ubc15\uc9c0\ud0dc, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.05_BitCoin_Transaction_Prediction-KNOM2019.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ube44\ud2b8\ucf54\uc778 \ud2b8\ub79c\uc7ad\uc158 \uc218 \uc608\uce21\uc744 \uc704\ud55c LSTM \ud559\uc2b5\ub370\uc774\ud130 \uc120\ud0dd\uae30\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2019), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May 30-31, 2019, pp. 1-3.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \uc774\ubbfc\uc12d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.01-EWS_Protocol_Reverse_Engineering-KICS2019.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">ICS(Industrial Control System) \ud658\uacbd\uc5d0\uc11c\uc758 \ubaa8\ub2c8\ud130\ub9c1 \ubc0f \uc545\uc131 \ud2b8\ub798\ud53d \ud0d0\uc9c0\ub97c \uc704\ud55c EWS(Engineering Workstation) \uc804\uc6a9 \ud504\ub85c\ud1a0\ucf5c \uad6c\uc870 \ubd84\uc11d \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0, Jan. 23-25, 2019, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d, \uc774\ubbfc\uc12d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2019\/2019.01-Comparison_between_CSP_and_SP-KICS2019.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud504\ub85c\ud1a0\ucf5c \ubd84\uc11d\uc5d0\uc11c CSP \uc54c\uace0\ub9ac\uc998\uacfc SP \uc54c\uace0\ub9ac\uc998\uc744 \uc801\uc6a9\ud55c \uba54\uc2dc\uc9c0 \ud3ec\ub9f7 \ucd94\ucd9c \uc131\ub2a5 \ube44\uad50<\/span><\/a>\",<span style=\"color:black; \"> 2019\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, \uac15\uc6d0, Jan. 23-25, 2019, pp. 1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900, \uc774\ubbfc\uc12d, \uc9c0\uc138\ud604, Huru Hasanova, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.11-BitCoin-Statistic_Analysis-KNOM2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Densification Power Law \uae30\ubc18 \ube44\ud2b8\ucf54\uc778 \ub124\ud2b8\uc6cc\ud06c \ud1b5\uacc4 \ub370\uc774\ud130 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \uc6cc\ud06c\uc20d (KNOM 2018), SKT Supex Hall, \uc11c\uc6b8, Nov. 30, 2018, pp.1-2.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900, \ubc15\uc9c0\ud0dc, Huru Hasanova, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.06-Sequential_Grouping_using_DeepLearning-KICS2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub525\ub7ec\ub2dd\uc744 \uc774\uc6a9\ud55c \uc2dc\ub4dc \uae30\ubc18 \uc545\uc131 \ud2b8\ub798\ud53d \uc5f0\uc18d\uc801 \uadf8\ub8f9\ud551<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2018, 742-743.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ubbfc\uc12d, \uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.06-Apriori_Algorithm-based_APRE-KICS2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Apriori \uc54c\uace0\ub9ac\uc998\uc744 \uc774\uc6a9\ud55c \ube44\uacf5\uac1c \ud504\ub85c\ud1a0\ucf5c \uad6c\uc870\ubd84\uc11d \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2018, 748-749.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2e0\ubb34\uace4, \uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, Huru Hasanova, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.06-SOM-based_resl-time_DoS_Detection-KICS2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc790\uae30 \uc870\uc9c1\ud654 \uc9c0\ub3c4(SOM) \uae30\ubc18 \uc2e4\uc2dc\uac04 DoS \ud2b8\ub798\ud53d \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2018, 902-903.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c0\uc138\ud604, \ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.06-CNN-based_Attack_Traffic_Detection-KICS2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc548\uc804\ud55c \ub124\ud2b8\uc6cc\ud06c \uad6c\ucd95\uc744 \uc704\ud55c \ucee8\ubcfc\ub8e8\uc158 \uc2e0\uacbd\ub9dd \uae30\ubc18 \uc545\uc131\ud2b8\ub798\ud53d \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2018, 861-862.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d, \uc774\ubbfc\uc12d, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.06-APRE_Eveluation-KICS2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud504\ub85c\ud1a0\ucf5c \ub9ac\ubc84\uc2a4 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1\uc744 \uc704\ud55c \uac1d\uad00\uc801 \ud3c9\uac00 \ubc0f \uac80\uc99d \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc2e0\ud654\uc6d4\ub4dc, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2018, 746-747.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c0\uc138\ud604, \ubc15\uc9c0\ud0dc, \ubc31\uc758\uc900, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.05-CNN_based_Traffic_Classification-KNOM2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud1b5\uc2e0\ub9dd \ucd5c\uc801\ud654\ub97c \uc704\ud55c \uae30\uacc4\ud559\uc2b5 \uc54c\uace0\ub9ac\uc998\uc744 \uc801\uc6a9\ud55c \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2018), \uc81c\uc8fc\ub300\ud559\uad50, \uc81c\uc8fc, May 10-11, 2018, pp.5-6.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2e0\ubb34\uace4, \uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, Huru Hasanova, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.05-DoS_Detection_using_SOM-KNOM2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SOM \uc54c\uace0\ub9ac\uc998 \uae30\ubc18 DoS \ud2b8\ub798\ud53d \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2018), \uc81c\uc8fc\ub300\ud559\uad50, \uc81c\uc8fc, May 10-11, 2018, pp. 35-36.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ubbfc\uc12d, \uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.05-Static_Field_Extraction_in_APRE-KNOM2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud504\ub85c\ud1a0\ucf5c \ub9ac\ubc84\uc2a4 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1\uc758 \uc815\uad50\ud55c \uc815\uc801\ud544\ub4dc \ucd94\ucd9c \ubc29\ubc95 \uc81c\uc548<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2018), \uc81c\uc8fc\ub300\ud559\uad50, \uc81c\uc8fc, May 10-11, 2018, pp. 13-14.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900, \ubc15\uc9c0\ud0dc, Huru Hasanova, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.05-Seed_based_Traffic_Classification_using_DL-KNOM2018.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub525 \ub7ec\ub2dd\uc744 \uc774\uc6a9\ud55c \uc2dc\ub4dc \uae30\ubc18 \uc545\uc131 \ud2b8\ub798\ud53d \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2018), \uc81c\uc8fc\ub300\ud559\uad50, \uc81c\uc8fc, May 10-11, 2018, pp.25-26.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \uc774\uc131\ud638, \uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.01-Attack_Traffic_Detection_using_FCI-KICS2018.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud50c\ub85c\uc6b0\uc758 \uc5f0\uad00\uc131 \ubaa8\ub378\uacfc \uc2dc\ub4dc \uae30\ubc18\uc758 \uc720\ub3d9\uc801 \ud63c\ud569 \uadf8\ub8f9\ud551\uc744  \uc774\uc6a9\ud55c \uc545\uc131 \ud2b8\ub798\ud53d \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud558\uc774\uc6d0\ub9ac\uc870\ud2b8, \uac15\uc6d0, Jan. 17-19, 2018, pp. 1356-1357.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c0\uc138\ud604, Huru Hasanova, \uc2ec\uaddc\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.01-ML_based_Traffic_Usage_Prediction-KICS2018.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud6a8\uc728\uc801\uc778 \ud1b5\uc2e0\ub9dd \uad00\ub9ac\ub97c \uc704\ud55c \uae30\uacc4\ud559\uc2b5 \uc54c\uace0\ub9ac\uc998\uc744 \uc801\uc6a9\ud55c \ud2b8\ub798\ud53d \ubc1c\uc0dd\ub7c9 \uc608\uce21<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud558\uc774\uc6d0\ub9ac\uc870\ud2b8, \uac15\uc6d0, Jan. 17-19, 2018, pp.0824-0825.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc31\uc758\uc900, \uc774\ubbfc\uc12d, \uad6c\uc601\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2018\/2018.01-LSTM_based_Traffic_Usage_Prediction-KICS2018.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">LSTM \uae30\ubc18 \ud559\ub0b4 \ub9dd \ud2b8\ub798\ud53d \ubc1c\uc0dd\ub7c9 \uc608\uce21<\/span><\/a>\",<span style=\"color:black; \"> 2018\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud558\uc774\uc6d0\ub9ac\uc870\ud2b8, \uac15\uc6d0, Jan. 17-19, 2018, pp. 1338-1339.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \uc774\uc131\ud638, \uad6c\uc601\ud6c8, Huru Hasanova, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.11-Cascade_FCI-KICS2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud50c\ub85c\uc6b0\uc758 \uc5f0\uad00\uc131 \ubaa8\ub378\uacfc \uc2dc\ub4dc \uae30\ubc18\uc758 \uc5f0\uc18d\uc801\uc778 \uadf8\ub8f9\ud551\uc744 \uc774\uc6a9\ud55c \uc545\uc131 \ud2b8\ub798\ud53d \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uacbd\ubd81\ub300\ud559\uad50, \ub300\uad6c, Nov. 10-11, 2017, 608-609.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.11-Tree-based_APRE-KICS2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub9ac \uad6c\uc870 \uae30\ubc18 CSP(Contiguous Sequence Pattern) \uc54c\uace0\ub9ac\uc998\uc744 \uc774\uc6a9\ud55c \ub124\ud2b8\uc6cc\ud06c \ube44\uacf5\uac1c \ud504\ub85c\ud1a0\ucf5c \uad6c\uc870 \ucd94\ub860<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uacbd\ubd81\ub300\ud559\uad50, \ub300\uad6c, Nov. 10-11, 2017, 602-603.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d, \ubc15\uc9c0\ud0dc, Huru Hasanova, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.11-APRE-KICS2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub808\uc774\uc2a4 \uae30\ubc18 \ud504\ub85c\ud1a0\ucf5c \ub9ac\ubc84\uc2a4 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1 \uc2dc\uc2a4\ud15c \uc544\ud0a4\ud14d\uccd0<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uacbd\ubd81\ub300\ud559\uad50, \ub300\uad6c, Nov. 10-11, 2017, 600-601.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Baraka D Sija, Young-Hoon Goo, Kyu-Seok Shim, Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-APRE_Survey-KICS2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Protocol Reverse Engineering Methods for Undocumented Ethernet and Wireless Protocols; Survey<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\uc81c\uc8fc, \uc81c\uc8fc\ub3c4, Jun. 21-23, 2017, 1125-1126.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \uc2ec\uaddc\uc11d, \uc774\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-Tensorflow-KICS2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Tensorflow Softmax Regression\uc744 \uc801\uc6a9\ud55c \uc6f9 \ube0c\ub77c\uc6b0\uc800 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 \ubaa8\ub378 \uc0dd\uc131<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\uc81c\uc8fc, \uc81c\uc8fc\ub3c4, Jun. 21-23, 2017, 1190-1191.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-SnorGen-KICS2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc11c\ube44\uc2a4 \ubcc4 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \ud074\ub7ec\uc2a4\ud130\ub9c1 \uae30\ubc18 \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131 \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\uc81c\uc8fc, \uc81c\uc8fc\ub3c4, Jun. 21-23, 2017, 1143-1144.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc131\ud638, \uad6c\uc601\ud6c8, \ubc15\uc9c0\ud0dc, \uc9c0\uc138\ud604, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-Skype-KICS2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">P2P \uae30\ubc18\uc758 VoIP \uc11c\ube44\uc2a4 \uc751\uc6a9 \ud2b8\ub798\ud53d \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\uc81c\uc8fc, \uc81c\uc8fc\ub3c4, Jun. 21-23, 2017, 1137-1138.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8, Baraka D. Sija, \uc774\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-APRE-KICS2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc138 \uac00\uc9c0 \uad00\uc810\uc5d0\uc11c\uc758 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub808\uc774\uc2a4 \uae30\ubc18 \ubc0f \uc2e4\ud589 \ud2b8\ub808\uc774\uc2a4 \uae30\ubc18 \ud504\ub85c\ud1a0\ucf5c \ub9ac\ubc84\uc2a4 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1 \ucc28\uc774\uc810 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\uc81c\uc8fc, \uc81c\uc8fc\ub3c4, Jun. 21-23, 2017, 82-83.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c0\uc138\ud604, \uc815\uc6b0\uc11d, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-Softmax_based_Traffic_Classification-KNOM2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Softmax Regression\uc744 \uc801\uc6a9\ud55c \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2017), \uc804\ub0a8\ub300\ud559\uad50, \uad11\uc8fc, Jun. 2-3, 2017, pp.27-28.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c0\ud0dc, \uc2ec\uaddc\uc11d, \uc774\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-FloFex-KNOM2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">FloFex : \uae30\uacc4\ud559\uc2b5 \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \ud2b8\ub798\ud53d \ud559\uc2b5 \ud2b9\uc9d5 \ucd94\ucd9c \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2017), \uc804\ub0a8\ub300\ud559\uad50, \uad11\uc8fc, Jun. 2-3, 2017, pp.25-26.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8, Baraka D. Sija, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-Protocol_Reverse_Engineering-KNOM2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud504\ub85c\ud1a0\ucf5c \ub9ac\ubc84\uc2a4 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1\uc758 \uc774\uc0c1\uc801\uc778 \uba54\ucee4\ub2c8\uc998 \uc815\uc758<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2017), \uc804\ub0a8\ub300\ud559\uad50, \uad11\uc8fc, Jun. 2-3, 2017, pp.23-24.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-Tree_Signature_Structure-KNOM2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub9ac \uad6c\uc870 \uae30\ubc18 \uc815\uad50\ud55c \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131 \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2017), \uc804\ub0a8\ub300\ud559\uad50, \uad11\uc8fc, Jun. 2-3, 2017, pp.21-22.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc14\ub77c\uce74, \uc774\uc131\ud638, \uc2ec\uaddc\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-KakaoTalk_Traffic_Classification-KNOM2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Supervised \uba38\uc2e0 \ud559\uc2b5 \uae30\ubc18\ud55c \uce74\uce74\uc624\ud1a1 \uac1c\ubcc4 \uc11c\ube44\uc2a4 \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2017), \uc804\ub0a8\ub300\ud559\uad50, \uad11\uc8fc, Jun. 2-3, 2017, pp.17-18.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc131\ud638, \uad6c\uc601\ud6c8, \ubc15\uc9c0\ud0dc, \uc9c0\uc138\ud604, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-Skype_Traffic_Detection-KNOM2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc0c1\uad00 \uad00\uacc4 \ubd84\uc11d \ubc29\ubc95\uc744 \uc774\uc6a9\ud55c \uac1c\uc120\ub41c Skype \uc751\uc6a9 \ud2b8\ub798\ud53d \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2017), \uc804\ub0a8\ub300\ud559\uad50, \uad11\uc8fc, Jun. 2-3, 2017, pp.15-16.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc815\uc6b0\uc11d, Baraka D. Sija, \ubc15\uc9c0\ud0dc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.06-Structured_ACL_in_SCADA-KNOM2017.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc21c\ucc28 \ud328\ud134 \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud55c SCADA \uc2dc\uc2a4\ud15c\uc758 \ud1b5\uc2e0 \ud2b9\uc131 \ubc18\uc601\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2017), \uc804\ub0a8\ub300\ud559\uad50, \uad11\uc8fc, Jun. 2-3, 2017, pp.7-8.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8, \uc774\uc131\ud638, \uc2ec\uaddc\uc11d, \uc815\uc6b0\uc11d, \uae40\uc131\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2017\/2017.01-Multi-demensional_Application_Traffic_Analysis-KICS2017.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud50c\ub85c\uc6b0\uc758 \ud2b9\uc131\uc744 \uc774\uc6a9\ud55c \ub2e4\ucc28\uc6d0\uc801 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2017\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud558\uc774\uc6d0\ub9ac\uc870\ud2b8, \uac15\uc6d0, Jan. 18-20, 2017.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uae40\uc885\ud604, \uae40\uc131\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.12-Automatic_Application_Signature_Generation_System-KIISE2016.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uae09\ubcc0\ud558\ub294 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uc744 \ud6a8\uc728\uc801\uc73c\ub85c \ubd84\ub958\ud558\uae30 \uc704\ud55c \uc751\uc6a9 \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131 \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \uc815\ubcf4\uacfc\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud718\ub2c9\uc2a4\ud30c\ud06c, \uac15\uc6d0, Dec. 21-23, 2016, pp.1021-1023.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8, \uc774\uc131\ud638, \uc815\uc6b0\uc11d, \uae40\uc131\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.12-Correlation_based_Traffic_Classification-KIISE2016.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud50c\ub85c\uc6b0\uc758 \uc5f0\uad00\uc131 \ubaa8\ub378\uc744 \uc774\uc6a9\ud55c \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \uc815\ubcf4\uacfc\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud718\ub2c9\uc2a4\ud30c\ud06c, \uac15\uc6d0, Dec. 21-23, 2016, pp.894-896.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ud0dc\ubbfc, \uad6c\uc601\ud6c8, \uc774\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.11-WebTraffic_GroundTruth_Generation-KICS2016.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">HTTP \ud504\ub85c\ud1a0\ucf5c\uc744 \uc774\uc6a9\ud55c \uc6f9 \uc751\uc6a9 \uc815\ub2f5\uc9c0 \ud2b8\ub798\ud53d \uc218\uc9d1\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc911\uc559\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 18, 2016, pp. 434-435.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc131\ud638, \uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.11-TensorFlow_based_Classification-KICS2016.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">TensorFlow\uae30\uacc4\ud559\uc2b5 \ub3c4\uad6c\ub97c \uc774\uc6a9\ud55c \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc911\uc559\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 18, 2016, pp. 224-225.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc131\ubbfc, \uc774\uc218\uac15, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.06-Requirement_for_Testbed_Federation-KICS2016.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ubbf8\ub798 \uc778\ud130\ub137 \ud14c\uc2a4\ud2b8\ubca0\ub4dc \uc5f0\ub3d9\uc758 \uc694\uad6c\uc0ac\ud56d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, ICC\uc81c\uc8fc, \uc81c\uc8fc\ub3c4, Jun. 22-24, 2016, 1133-1134.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Baraka D. Sija, Kyu-Seok Shim, and Myung-Sup Kim, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.06-PSP_for_Signature_Generation-KICS2016.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">A Study on PSP Algorithm for Automatic Generation of Internet Traffic Signature<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, ICC\uc81c\uc8fc, \uc81c\uc8fc\ub3c4, Jun. 22-24, 2016, 1133-1134.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uc774\uc218\uac15, \uad6c\uc601\ud6c8, \uc774\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.06-real-time_signature_update_system-KICS2016.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ud328\ud134 \ubcc0\ud654\uc5d0 \uc989\uac01\uc801\uc778 \ub300\uc751\uc744 \uc704\ud55c \uc2e4\uc2dc\uac04 \uc2dc\uadf8\ub2c8\uccd0 \uc5c5\ub370\uc774\ud2b8 \uc2dc\uc2a4\ud15c\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, ICC\uc81c\uc8fc, \uc81c\uc8fc\ub3c4, Jun. 22-24, 2016, 1037-1038.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc218\uac15, \uc2ec\uaddc\uc11d, \uc815\uc6b0\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.05-CDN_Traffic_Classification-KNOM2016.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc5f0\uc18d\ub41c \ud50c\ub85c\uc6b0 \uc815\ubcf4\ub97c \uc774\uc6a9\ud55c CDN \uc11c\ube44\uc2a4 \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95 \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2016), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May. 12-13, 2016, pp.105-108.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8, \uc774\uc131\ud638, \uae40\uc131\ubbfc, \uc774\uc218\uac15, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.05-Payload_Signature_Structure-KNOM2016.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958\uc5d0 \uc815\uad50\ud55c \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uad6c\uc870<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2016), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May. 12-13, 2016, pp.99-104.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc815\uc6b0\uc11d, \uae40\uc131\ubbfc, \uad6c\uc601\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.05-Dyanmic_ACL_for_FTP-KNOM2016.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Dynamic ACL \ubaa8\ub378\uc744 \uc0ac\uc6a9\ud55c SCADA \uc2dc\uc2a4\ud15c \ub0b4 FTP \uc11c\ube44\uc2a4\uc758 \ud654\uc774\ud2b8\ub9ac\uc2a4\ud2b8 \ud45c\ud604\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2016), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May. 12-13, 2016, pp.97-98.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc131\ubbfc, \uc774\uc218\uac15, \uc11d\uc6b0\uc9c4, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.05-SDN_SFA_Federation_Architecture-KNOM2016.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SDN\/SFA \uae30\ubc18 \ubbf8\ub798 \uc778\ud130\ub137 \uc5f0\uad6c\uc790\uc6d0 \ud50c\ub7ab\ud3fc \uc5f0\ub3d9 \uad6c\uc870<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2016), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May. 12-13, 2016, pp.80-84.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc131\ud638, \uad6c\uc601\ud6c8, Baraka D. Sija, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.05-Payload_Signature_Quality_Evaluation-KNOM2016.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \ud488\uc9c8 \ud3c9\uac00\ub97c \ud1b5\ud55c \uace0\ud6a8\uc728 \uc751\uc6a9 \uc2dc\uadf8\ub2c8\uccd0 \ud0d0\uc0c9<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2016), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May. 12-13, 2016, pp.35-39.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uad6c\uc601\ud6c8, \uc774\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.05-Fully_Automatic_Payload_Signature_Update_System-KNOM2016.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc644\uc804 \uc790\ub3d9\ud654 \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc5c5\ub370\uc774\ud2b8 \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2016), \uac15\uc6d0\ub300\ud559\uad50, \ucd98\ucc9c, May. 12-13, 2016, pp.21-25.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc544\ud604, \uc774\uc218\uac15, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.01-Facebook_Traffic_Analysis-KICS2016.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud559\ub0b4\ub9dd\uc5d0\uc11c \ubc1c\uc0dd\ud55c \ud398\uc774\uc2a4\ubd81 SNS \ud2b8\ub798\ud53d \ubd84\ub958 \ubc0f \ubcc0\ud654\ub7c9 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud558\uc774\uc6d0\ub9ac\uc870\ud2b8, \uac15\uc6d0, Jan. 20-22, 2016.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d, \uc815\uc6b0\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.01-ODL_Cluster_CRUD_Performance-KICS2016.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SDN \ucee8\ud2b8\ub864\ub7ec \ud074\ub7ec\uc2a4\ud130 \ud658\uacbd\uc5d0\uc11c ODL \ucee8\ud2b8\ub864\ub7ec\uc758 \ub370\uc774\ud130 \ucc98\ub9ac \uc131\ub2a5 \ud3c9\uac00 <\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud558\uc774\uc6d0\ub9ac\uc870\ud2b8, \uac15\uc6d0, Jan. 20-22, 2016.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc218\uac15, \uae40\uc131\ubbfc, \uad6c\uc601\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2016\/2016.01-Cyber_Attack_Source_Tracking-KICS2016.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uc744 \uc774\uc6a9\ud55c \uc0ac\uc774\ubc84\uacf5\uaca9 \ubc1c\uc0dd\uc6d0 \ucd94\uc801\ubc29\ubc95 <\/span><\/a>\",<span style=\"color:black; \"> 2016\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud558\uc774\uc6d0\ub9ac\uc870\ud2b8, \uac15\uc6d0, Jan. 20-22, 2016.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc815\uc6b0\uc11d, \uad6c\uc601\ud6c8, \uc2ec\uaddc\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.11-ODL_HA_Performance_Evaluation-KICS2015.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ubd84\uc0b0 \ucee8\ud2b8\ub864\ub7ec \ud074\ub7ec\uc2a4\ud130 \ud658\uacbd\uc5d0\uc11c\uc758 ODL \ud074\ub7ec\uc2a4\ud130 \uace0\uac00\uc6a9\uc131 \uc131\ub2a5\ud3c9\uac00<\/span><\/a>\",<span style=\"color:black; \"> 2015\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 14, 2015.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc131\ud638, \uc774\uc218\uac15, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.11-Multi-dimensional_Traffic_Analysis-KICS2015.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ud50c\ub85c\uc6b0\uc758 3\uac00\uc9c0 \ud2b9\uc9d5\uc744 \ud65c\uc6a9\ud55c \ub2e4\ucc28\uc6d0\uc801 \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2015\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 14, 2015.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.11-Auto-generated_Signature-KICS2015.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc790\ub3d9 \uc0dd\uc131\ub41c \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0\uc758 \uc815\ud655\ub3c4 \ud5a5\uc0c1\uc744 \uc704\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2015\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 14, 2015.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc218\uac15, \uc724\uc131\ud638, \uc2ec\uaddc\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.06-Header_Signature_Management_System-KICS2015.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \uc11c\ube44\uc2a4 \uc2dd\ubcc4\uc744 \uc704\ud55c \ud5e4\ub354\uc815\ubcf4 \uae30\ubc18 \uc790\ub3d9 \uc2dc\uadf8\ub2c8\uccd0 \uba85\uba85 \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2015\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 23-25, 2015.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.06-Payload_Signature_Management-KICS2015.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2e4\uc2dc\uac04 \ub124\ud2b8\uc6cc\ud06c \uad00\ub9ac\ub97c \uc704\ud55c \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2015\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 23-25, 2015.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc815\uc6b0\uc11d, \uc774\uc218\uac15, \uc2ec\uaddc\uc11d, \uae40\uc131\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.06-Hadoop_BigData_Traffic_Analysis-KICS2015.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud558\ub461 \ube45\ub370\uc774\ud130 \ucc98\ub9ac \ud50c\ub7ab\ud3fc \uae30\ubc18\uc758 \uad50\uc721\uc804\uc0b0\ub9dd \uc790\uc6d0 \ud6a8\uc728\ud654 \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2015\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 23-25, 2015.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc131\ubbfc, \uad6c\uc601\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.06-SSL_TLS_Traffic_Identification-KICS2015.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Session ID - Server IP \uce90\uc2f1 \uae30\ubc18\uc758 SSL\/TLS \uc554\ud638\ud654 \ud2b8\ub798\ud53d\uc758 \uc11c\ube44\uc2a4 \uc2dd\ubcc4 \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2015\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 23-25, 2015.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc218\uac15, \uc724\uc131\ud638, \uc2ec\uaddc\uc11d, \uae40\uc131\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2015\/2015.01-Hadoop_TPC_Tracking-KICS2015.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">MapReduce\ub97c \uc774\uc6a9\ud55c Hadoop\uae30\ubc18\uc758 TPC \uc624\ud504\ub77c\uc778 \ud2b8\ub798\ud0b9 \uc2dc\uc2a4\ud15c \uc81c\uc548<\/span><\/a>\",<span style=\"color:black; \"> 2015\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ud558\uc774\uc6d0\ub9ac\uc870\ud2b8, Jan. 21-23, 2015, pp. 761-762.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uc548\ud604\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.06-Behavior_Signature_Extraction-KICS2013.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc21c\ucc28 \ud328\ud134 \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud55c \ud2b8\ub798\ud53d \ud589\uc704 \uc2dc\uadf8\ub2c8\uccd0 \uc0dd\uc131 \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 25-27, 2014, pp.996-997.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uc774\uc218\uac15, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.06-Hadoop_based_Payload_Signature_Processing-KICS2013.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Hadoop \ubd84\uc0b0 \ucc98\ub9ac \ud658\uacbd\uc5d0\uc11c \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0\uc5d0 \uae30\ubc18\ud55c HTTP \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uc758 \ucc98\ub9ac \uc18d\ub3c4 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 25-27, 2014, pp.994-995.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc815\uc6b0\uc11d, \uad8c\uc7ac\ubc94, \uc2ec\uaddc\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.05-Bro-based_HTTP_Traffic_Analysis-KNOM2014.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud559\ub0b4 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uc758 \uad00\ub9ac \ubc0f \uc81c\uc5b4\ub97c \uc704\ud55c HTTP \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2014), \ucda9\ub0a8\ub300\ud559\uad50, \ub300\uc804, May. 15-16, 2014, pp.125-126.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uad8c\uc7ac\ubc94, \uc720\uc885\ud604, \uc2ec\uaddc\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.05-Torrent_Client_Application_Analysis-KNOM2014.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud1a0\ub80c\ud2b8 \ud504\ub85c\ud1a0\ucf5c\uc758 \uc751\uc6a9 \ubcc4 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2014), \ucda9\ub0a8\ub300\ud559\uad50, \ub300\uc804, May. 15-16, 2014, pp.120-121.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc131\ubbfc, \uc720\uc885\ud604, \uc774\uc218\uac15, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.05-PSD_Analysis_using_Snort-KNOM2014.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Snort\ub97c \uc774\uc6a9\ud55c PSD(Payload Size Distribution)\uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2014), \ucda9\ub0a8\ub300\ud559\uad50, \ub300\uc804, May. 15-16, 2014, pp.122-123.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uc885\ud604, \uad8c\uc7ac\ubc94, \uc774\uc218\uac15, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.05-Torrent_Traffic_Type_Analysis-KNOM2014.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud1a0\ub80c\ud2b8 \uc751\uc6a9 \uc124\uc815\uc5d0 \ub530\ub978 \ud2b8\ub798\ud53d \uc804\uc1a1 \ubc29\uc2dd\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2014), \ucda9\ub0a8\ub300\ud559\uad50, \ub300\uc804, May. 15-16, 2014, pp.118-119.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc548\ud604\ubbfc, \ud568\uc7ac\ud604, \uc815\uc6b0\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.05-PSD-based_Traffic_Classification_considering_Network_Congestion-KNOM2014.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud63c\uc7a1\ub3c4\uc5d0 \uac15\uac74\ud55c \ud1b5\uacc4 \uc815\ubcf4 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2014), \ucda9\ub0a8\ub300\ud559\uad50, \ub300\uc804, May. 15-16, 2014, pp.101-105.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uc774\uc218\uac15, \uae40\uc131\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.05-Hadoop-based_Traffic_Classification-KNOM2014.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud558\ub461 \ubd84\uc0b0 \ucef4\ud4e8\ud305 \ud658\uacbd\uc5d0\uc11c \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\ucc98 \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 <\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2014), \ucda9\ub0a8\ub300\ud559\uad50, \ub300\uc804, May. 15-16, 2014, pp.77-81.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc218\uac15, \uc2ec\uaddc\uc11d, \uc548\ud604\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.05-Packet_Out-of-Order_and_Retransmission-KNOM2014.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud1b5\uacc4\uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uc758 \ud328\ud0b7 \uc5ed\uc804 \ubc0f \ud328\ud0b7 \uc911\ubcf5\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2014), \ucda9\ub0a8\ub300\ud559\uad50, \ub300\uc804, May. 15-16, 2014, pp.20-24.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \uc724\uc131\ud638, \uc548\ud604\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.05-Payload-based_Traffic_Classification-KNOM2014.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uae30\ubc18 \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2014), \ucda9\ub0a8\ub300\ud559\uad50, \ub300\uc804, May. 15-16, 2014, pp.10-14.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uc548\ud604\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.05-Multi-level_Traffic_Classification_Framework-KNOM2014.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uba40\ud2f0 \ub808\ubca8 \ud2b8\ub798\ud53d \ubd84\uc11d \ud504\ub808\uc784\uc6cc\ud06c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2014), \ucda9\ub0a8\ub300\ud559\uad50, \ub300\uc804, May. 15-16, 2014, pp.1-5.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ucd5c\uc9c0\ud601, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.01-Performance_Analysis_of_hash_Function-KICS2014.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c Hash \ud568\uc218\uc758 \uc131\ub2a5 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Jan. 22-24, 2014, pp.531-532.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc548\ud604\ubbfc, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.01-P2P_Communication_in_4G_Network-KICS2014.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc774\ub3d9\ud1b5\uc2e0\ub9dd \ub0b4 \uacfc\uae08 \ud68c\ud53c P2P\ud1b5\uc2e0\uc758 \uac00\ub2a5\uc131\uacfc \ub300\uc751 \ubc29\uc548<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Jan. 22-24, 2014, pp. 683-684.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc218\uac15, \uc548\ud604\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.01-out-of-order_and_retransmission-KICS2014.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c TCP \ud328\ud0b7 \uc5ed\uc804 \ubc0f \uc911\ubcf5 \ubb38\uc81c \uc2e4\uc2dc\uac04 \ucc98\ub9ac \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Jan. 22-24, 2014, pp. 681-682.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.01-Wireless_Traffic_Analysis-KICS2014.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ucea0\ud37c\uc2a4 \ub0b4 \ubb34\uc120 \ud2b8\ub798\ud53d \uad00\ub9ac\ub97c \uc704\ud55c \ud504\ub85c\ud1a0\ucf5c\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Jan. 22-24, 2014, pp. 677-678.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \uc548\ud604\ubbfc, \uc870\uc900\ud615, \uc784\ucc44\ud0dc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2014\/2014.01-DoS_Attack_on_VoLTE-KICS2014.Winter.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">VoLTE \uc11c\ube44\uc2a4\uc758 DoS \uacf5\uaca9 \ubcf4\uc548 \uc704\ud611\uacfc \ub300\uc751 \ubc29\uc548<\/span><\/a>\",<span style=\"color:black; \"> 2014\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Jan. 22-24, 2014, pp. 679-680.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ud568\ud6a8\uc2dd, \uae40\ud658\ud76c, \uae40\uba85\uc12d, \ucd5c\ubbf8\uc815, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.12-SVM based android malware detection-KCIC2013.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SVM\uc744 \ud1b5\ud55c \uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131\ucf54\ub4dc \ud0d0\uc9c0 \uae30\ubc95\u00a0<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144 \ub3d9\uacc4 \ud55c\uad6d\uc815\ubcf4\uae30\uc220\uc735\ud569\ud559\ud68c \uc735\ud569 IT \ud559\uc220\ub300\ud68c, \uc62c\ub9bc\ud53d\ud30c\ud06c\ud638\ud154, \uc11c\uc6b8, Dec. 27~28, 2013, pp.141-150.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ub0a8\uaddc, \ucd5c\uc9c0\ud601, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.11-SPMS-KICS2013.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub9ac\ub205\uc2a4 \uae30\ubc18 \uc2dc\uc2a4\ud15c \uc131\ub2a5 \ubaa8\ub2c8\ud130\ub9c1 \uc2dc\uc2a4\ud15c\uc5d0 \uad00\ud55c \uc5f0\uad6c \u00a0<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc5f0\uc138\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 30, 2013, pp.838-839.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc2ec\uaddc\uc11d, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.11-Wireless_Traffic_Analysis_on_Campus_Network-KICS2013.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ucea0\ud37c\uc2a4 \ub124\ud2b8\uc6cc\ud06c \ud658\uacbd\uc5d0\uc11c \ubb34\uc120 \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c \u00a0<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc5f0\uc138\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 30, 2013, pp.90-91.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ud558\ub298, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.11-IPv6-over-IPv4_Analysis-KICS2013.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">IPv6-over-IPv4 \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc5f0\uc138\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 30, 2013, pp.650-651.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc218\uac15, \uc548\ud604\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.11-Out-of-order_Retransmission-KICS2013.Fall.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c TCP \ud328\ud0b7 \uc5ed\uc804 \ubc0f \uc911\ubcf5 \ubb38\uc81c \ud574\uacb0 \uc54c\uace0\ub9ac\uc998<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc5f0\uc138\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 30, 2013, pp.553-554.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ucca0\uc2e0, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.06-Protocol_Filter-KICS2013.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud504\ub85c\ud1a0\ucf5c \ud544\ud130\ub97c \uc774\uc6a9\ud55c \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131 \uc2dc\uc2a4\ud15c\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 19-21, 2013, pp.655-656.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc548\ud604\ubbfc, \ud568\uc7ac\ud604, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.06-Weighted_Payload_Size_Sequence-KICS2013.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Weighted Payload Size Sequence \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95\ub860<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 19-21, 2013, pp.942-943.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc9c0\ud601, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.06-Payload_Signature_Hierachy-KICS2013.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Payload Signature Hierarchy\ub97c \ud1b5\ud55c \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c\uc758 \ucc98\ub9ac \uc18d\ub3c4 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 19-21, 2013, pp.651-652.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.06-Server_Cache-based_Traffic_Classification-KICS2013.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc11c\ubc84 \uce90\uc26c \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95\ub860\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 19-21, 2013, pp.653-654.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.06-Header_Signature_Maintenance-KICS2013.Summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c \uad6c\uc870\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 19-21, 2013, pp.657-658.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.05-Application_Behavior-based_Signature-KNOM2013.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud589\uc704\uae30\ubc18 \uc2dc\uadf8\ub2c8\uccd0 \uc0dd\uc131 \ubc29\ubc95\ub860 \uac1c\ubc1c\uacfc \uc801\uc6a9\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2013), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May. 09-10, 2013, pp.7-11.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ub0a8\uaddc, \ucd5c\uc9c0\ud601, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.05-SPMS_in_Linux-KNOM2013.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub9ac\ub205\uc2a4 \uae30\ubc18 \uc2dc\uc2a4\ud15c \uc131\ub2a5 \ubaa8\ub2c8\ud130\ub9c1 \uc2dc\uc2a4\ud15c\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2013), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May. 09-10, 2013, pp.152-154.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ubbfc\uc11d, \uc548\ud604\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.05-Cross_Order_in_PSD-KNOM2013.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub798\ud53d \uc218\uc9d1 \uc9c0\uc810\uc758 \ucc28\uc774\ub85c \uc778\ud55c \ud1b5\uacc4 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \ubc29\ubc95\ub860\uc758 \ud55c\uacc4\uc640 \ud574\uacb0\ubc29\uc548<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2013), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May. 09-10, 2013, pp.155-160.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc548\ud604\ubbfc, \ud568\uc7ac\ud604, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.05-Packet_Weight_in_PSD-KNOM2013.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud50c\ub85c\uc6b0 \ub0b4\uc758 \ud328\ud0b7 \ubcc4 \uac00\uc911\uce58\ub97c \uc774\uc6a9\ud55c \ud1b5\uacc4 \uc815\ubcf4 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95\ub860\uc758 \uc131\ub2a5\ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2013), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May. 09-10, 2013, pp.147-151.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc9c0\ud601, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.05-Signature Hierarchy-KNOM2013.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Signature Hierarchy\ub97c \ud1b5\ud55c \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c\uc758 \ucc98\ub9ac \uc18d\ub3c4 \ud5a5\uc0c1\uc744 \uc704\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2013), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May. 09-10, 2013, pp.117-120.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ud0dc\uc601, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.05-Dual_Hash_Structure-KNOM2013.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub4c0\uc5bc \ud574\uc26c \uad6c\uc870\ub97c \uc774\uc6a9\ud55c \ub300\uc6a9\ub7c9 \ud2b8\ub798\ud53d \ucc98\ub9ac \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2013), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May. 09-10, 2013, pp.112-116.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ud558\ub298, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.05-Traffic_analysis_of_IPv6-over-IPv4-KNOM2013.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud559\ub0b4\ub9dd\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 IPv6-over-IPv4 \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2013), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May. 09-10, 2013, pp.28-32.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ubc15\ud0dc\uc601, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2013\/2013.05-Server_Cache-based_Traffic_Classification-KNOM2013.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc11c\ubc84 \uce90\uc26c \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2013\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2013), \uacc4\uba85\ub300\ud559\uad50, \ub300\uad6c, May. 09-10, 2013, pp.1-6.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc900\uc0c1, \ud568\uc7ac\ud604, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published.papers\/2012\/2012.06-Design_of_Automatic_Signature_Extraction_System_for_Internet_Traffic_Identification-KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc790\ub3d9\ud654\ub41c \uc2dc\uadf8\ub2c8\uccd0 \ucd94\ucd9c \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2012, pp.990-991.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc9c0\ud61c, \uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.06 - \ub2e4\ucc28\uc6d0\uc801\uc774\uace0 \uacc4\uce35\uc801\uc778 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc2dc\uadf8\ub2c8\uccd0 \uad6c\uc870\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub2e4\ucc28\uc6d0\uc801\uc774\uace0 \uacc4\uce35\uc801\uc778 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc2dc\uadf8\ub2c8\uccd0 \uad6c\uc870\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2012, pp.284-285.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc548\ud604\ubbfc, \ud5c8\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.06 - \ube44\uc815\uc0c1 TCP \uc138\uc158\uc73c\ub85c \uc778\ud55c Payload Size Distribution \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958\uc758 \ud55c\uacc4\uc5d0 \ub300\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ube44\uc815\uc0c1 TCP \uc138\uc158\uc73c\ub85c \uc778\ud55c Payload Size Distribution \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958\uc758 \ud55c\uacc4\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2012, pp.347-348.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ud5c8\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.06 - \uc2a4\ub9c8\ud2b8 \ub514\ubc14\uc774\uc2a4 \uc751\uc6a9 \ubd84\uc11d\uc744 \uc704\ud55c \ud2b8\ub798\ud53d \uc0c1\uad00 \uad00\uacc4\uc5d0 \ub300\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2a4\ub9c8\ud2b8 \ub514\ubc14\uc774\uc2a4 \uc751\uc6a9 \ubd84\uc11d\uc744 \uc704\ud55c \ud2b8\ub798\ud53d \uc0c1\uad00 \uad00\uacc4\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2012, pp.996-997.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ucca0\uc2e0, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.06 - HTTP \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">HTTP \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2012, pp.998-999.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc9c0\ud601, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.06 - HTTP \ud2b8\ub798\ud53d \uae30\ubc18 \uc751\uc6a9\ud504\ub85c\uadf8\ub7a8 \uc778\uc2dd\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">HTTP \ud2b8\ub798\ud53d \uae30\ubc18 \uc751\uc6a9\ud504\ub85c\uadf8\ub7a8 \uc778\uc2dd\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2012, pp.1000-1001.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ud568\uc7ac\ud604, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.06 - \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uacfc \ud2b8\ub798\ud53d \uc81c\uc5b4 \uc2dc\uc2a4\ud15c\uc758 \uc5f0\ub3d9 \uc778\ud130\ud398\uc774\uc2a4 \uc124\uacc4 \ubc0f \uad6c\ud604 - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uacfc \ud2b8\ub798\ud53d \uc81c\uc5b4 \uc2dc\uc2a4\ud15c\uc758 \uc5f0\ub3d9 \uc778\ud130\ud398\uc774\uc2a4 \uc124\uacc4 \ubc0f \uad6c\ud604<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud638\ud154, \uc81c\uc8fc\ub3c4, Jun. 20-22, 2012, pp.992-993.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ud5c8\ubbfc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.05 - \uc2a4\ub9c8\ud2b8\ud3f0 \ud2b8\ub798\ud53d\uc758 \uc751\uc6a9\ubcc4 \ubd84\ub958 \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c - KNOM2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2a4\ub9c8\ud2b8\ud3f0 \ud2b8\ub798\ud53d\uc758 \uc751\uc6a9\ubcc4 \ubd84\ub958 \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2012), \uc81c\uc8fc\ub300\ud559\uad50, \uc81c\uc8fc, May. 03-04, 2012, pp.xx-xx.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.02 - \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c\uc758 \ucc98\ub9ac\uc18d\ub3c4 \ud5a5\uc0c1\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c\uc758 \ucc98\ub9ac\uc18d\ub3c4 \ud5a5\uc0c1\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9, \uac15\uc6d0\ub3c4, Feb. 8-10, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc9c0\ud61c, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.02 - \ub2e4\uac01\uc801 \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud2b8\ub798\ud53d \ubd84\ub958 \uccb4\uacc4\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub2e4\uac01\uc801 \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud2b8\ub798\ud53d \ubd84\ub958 \uccb4\uacc4\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9, \uac15\uc6d0\ub3c4, Feb. 8-10, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ud5c8\ubbfc, \ubc15\uc900\uc0c1, \ud55c\uad6d\ud5cc, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.02 - \ud6a8\uc728\uc801\uc778 \ubb3c \uad00\ub9ac \ud504\ub85c\uadf8\ub7a8\uc758 \ubaa8\ub378 \uad6c\uc131 \ubc29\uc548\uc5d0 \ub300\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud6a8\uc728\uc801\uc778 \ubb3c \uad00\ub9ac \ud504\ub85c\uadf8\ub7a8\uc758 \ubaa8\ub378 \uad6c\uc131 \ubc29\uc548\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9, \uac15\uc6d0\ub3c4, Feb. 8-10, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ucca0\uc2e0, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.02 - \ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131 \uc2dc\uc2a4\ud15c\uc758 \uc131\ub2a5\ud5a5\uc0c1\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\uccd0 \uc790\ub3d9 \uc0dd\uc131 \uc2dc\uc2a4\ud15c\uc758 \uc131\ub2a5\ud5a5\uc0c1\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9, \uac15\uc6d0\ub3c4, Feb. 8-10, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc9c0\ud601, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.02 - \uc751\uc6a9 \ub808\ubca8 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \uc2dc\uadf8\ub2c8\uccd0 \ucd94\ucd9c \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ub808\ubca8 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \uc2dc\uadf8\ub2c8\uccd0 \ucd94\ucd9c \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9, \uac15\uc6d0\ub3c4, Feb. 8-10, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.02 - \uc751\uc6a9 \ub808\ubca8 \uc2dc\uadf8\ub2c8\uccd0 \ucd94\ucd9c\uc744 \uc704\ud55c \ud2b8\ub798\ud53d \uadf8\ub8f9\ud551 \ubaa8\ub378 \uc124\uacc4 - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ub808\ubca8 \uc2dc\uadf8\ub2c8\uccd0 \ucd94\ucd9c \uc2dc\uc2a4\ud15c\uc744 \uc704\ud55c \ud2b8\ub798\ud53d \uadf8\ub8f9\ud551 \ubaa8\ub378 \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9, \uac15\uc6d0\ub3c4, Feb. 8-10, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ud5c8\ubbfc, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2012\/2012.02 - \uc2a4\ub9c8\ud2b8\ud3f0 \ud2b8\ub798\ud53d\uc758 \uc751\uc6a9\ubcc4 \ubd84\ub958\ub97c \uc704\ud55c User-Agent \uadf8\ub8f9\ud551 - KICS2012.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2a4\ub9c8\ud2b8\ud3f0 \ud2b8\ub798\ud53d\uc758 \uc751\uc6a9\ubcc4 \ubd84\ub958\ub97c \uc704\ud55c User-Agent \uadf8\ub8f9\ud551<\/span><\/a>\",<span style=\"color:black; \"> 2012\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9, \uac15\uc6d0\ub3c4, Feb. 8-10, 2012.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.621.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ud5c8\ubbfc, \uc774\ud604\uc2e0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - \ud638\uc2a4\ud2b8\uc758 \uc811\uc18d \uc720\ud615 \uc815\ubcf4\ub97c \uc774\uc6a9\ud55c Enterprise Network \uad00\ub9ac\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud638\uc2a4\ud2b8\uc758 \uc811\uc18d \uc720\ud615 \uc815\ubcf4\ub97c \uc774\uc6a9\ud55c Enterprise Network \uad00\ub9ac\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.176.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - \uc751\uc6a9 \ub808\ubca8 \ud2b8\ub798\ud53d\uc758 \ubc1c\uc0dd \ud328\ud134\uc5d0 \uae30\ubc18\ud55c \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c\uc758 \ucc98\ub9ac \uc18d\ub3c4 \ud5a5\uc0c1 - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ub808\ubca8 \ud2b8\ub798\ud53d\uc758 \ubc1c\uc0dd \ud328\ud134\uc5d0 \uae30\ubc18\ud55c \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c\uc758 \ucc98\ub9ac \uc18d\ub3c4 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.624.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ud604\uc2e0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - \uc2e4\uc2dc\uac04 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc218\ub3d9\ud615 \uc6b4\uc601\uccb4\uc81c \ud310\ubcc4 \ubc29\ubc95\uc758 \uc131\ub2a5 \ud5a5\uc0c1\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2e4\uc2dc\uac04 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc218\ub3d9\ud615 \uc6b4\uc601\uccb4\uc81c \ud310\ubcc4 \ubc29\ubc95\uc758 \uc131\ub2a5 \ud5a5\uc0c1\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.623.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc9c4\uc6b1, \uc774\ud604\uc2e0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - ip\ud5e4\ub354\uc815\ubcf4\ub97c\uc774\uc6a9\ud55cNAT\ud310\ubcc4\uc5f0\uad6c - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">IP\ud5e4\ub354 \uc815\ubcf4\ub97c \uc774\uc6a9\ud55c NAT \ud310\ubcc4\uc5d0 \ub300\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.622.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.621.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c4\ucc3d\uaddc, \uae40\uba85\uc12d, \ucd5c\ubbf8\uc815, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - HTTP \ud2b8\ub798\ud53d\uc758 \uc11c\ube44\uc2a4\ubcc4 \ubd84\ub958 - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">HTTP \ud2b8\ub798\ud53d\uc758 \uc11c\ube44\uc2a4\ubcc4 \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.617.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc9c0\ud61c, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - \uc778\ud130\ub137 \ud2b8\ub798\ud53d \uad00\ub9ac\ub97c \uc704\ud55c \ubd84\ub958 \uccb4\uacc4 \uae30\uc900\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \uad00\ub9ac\ub97c \uc704\ud55c \ubd84\ub958 \uccb4\uacc4 \uae30\uc900\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.615.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc0c1\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - HTTP User-Agent \ud544\ub4dc\ub97c \uc774\uc6a9\ud55c \uc2a4\ub9c8\ud2b8\ud3f0 \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158\uc2dc\uadf8\ub2c8\uccd0 \ucd94\ucd9c\uc5d0\uad00\ud55c \uc5f0\uad6c - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">HTTP User-Agent \ud544\ub4dc\ub97c \uc774\uc6a9\ud55c \uc2a4\ub9c8\ud2b8\ud3f0 \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158 \uc2dc\uadf8\ub2c8\uccd0 \ucd94\ucd9c\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.614.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ud5c8\ubbfc, \uc774\ud604\uc2e0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.04 - Access Type Identification - KNOM2011.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Round-Trip-Time\uc744 \uc774\uc6a9\ud55c \ub2e8\ub9d0 \ud638\uc2a4\ud2b8\uc758 \uc811\uc18d \uc720\ud615 \ud310\ubcc4<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2011), \ud3ec\ud56d\uacf5\ub300, \ud55c\uad6d, Apr. 21-22, 2011, pp.122-126.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc9c0\ud61c, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.04 - Traffic Classification Toxonomy - KNOM2011.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud2b8\ub798\ud53d \ubd84\ub958\uccb4\uacc4\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2011), \ud3ec\ud56d\uacf5\ub300, \ud55c\uad6d, Apr. 21-22, 2011, pp.153-154.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c4\ucc3d\uaddc, \uae40\uba85\uc12d, \ucd5c\ubbf8\uc815, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.04 - HTTP Traffic Analysis - KNOM2011.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">HTTP \ud2b8\ub798\ud53d\uc758 \uc11c\ubc84\ubcc4(\uc0ac\uc774\ud2b8 \uce21\uba74) \ubd84\ub958 \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2011), \ud3ec\ud56d\uacf5\ub300, \ud55c\uad6d, Apr. 21-22, 2011, pp.18-21.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.06 - \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2011 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ud718\ub2c9\uc2a4\uc544\uc77c\ub79c\ub4dc, June. 20-22, 2011, pp.621.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc0c1\uc6b0, \ubc15\uc900\uc0c1, \uc774\ud604\uc2e0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.04 - SmartPhone Traffic Analysis - KNOM2011.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2a4\ub9c8\ud2b8\ud3f0 \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2011\ub144 \ud1b5\uc2e0\ub9dd\uc6b4\uc6a9\uad00\ub9ac \ud559\uc220\ub300\ud68c (KNOM 2011), \ud3ec\ud56d\uacf5\ub300, \ud55c\uad6d, Apr. 21-22, 2011, pp.3-7.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\ubbf8\uc815, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.02 - M2M \ub124\ud2b8\uc6cc\ud06c \uad00\ub9ac\ub97c \uc704\ud55c \uc694\uad6c\uc0ac\ud56d  \ubd84\uc11d - KICS2011.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">M2M \ub124\ud2b8\uc6cc\ud06c \uad00\ub9ac\ub97c \uc704\ud55c \uc694\uad6c\uc0ac\ud56d  \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS) 2011, \uac15\uc6d0\ub3c4 \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Feb, 23-25, 2011, pp. 139.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc9c4\ucc3d\uaddc, \uae40\uba85\uc12d,  \ucd5c\ubbf8\uc815, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.02 - HTTP \uc751\uc6a9 \ud2b8\ub798\ud53d\uc758 \ub2e4\ucc28\uc6d0 \ubd84\uc11d \ubc29\ubc95 - KICS2011.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">HTTP \uc751\uc6a9 \ud2b8\ub798\ud53d\uc758 \ub2e4\ucc28\uc6d0 \ubd84\uc11d \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS) 2011, \uac15\uc6d0\ub3c4 \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Feb, 23-25, 2011, pp. 351.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc9c0\ud61c, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2011\/2011.02 - \uc11c\ube44\uc2a4 \ubcc4 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \ud1b5\ud55c \ud559\ub0b4 \ub9dd \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2011.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc11c\ube44\uc2a4 \ubcc4 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \ud1b5\ud55c \ud559\ub0b4 \ub9dd \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS) 2011, \uac15\uc6d0\ub3c4 \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Feb, 23-25, 2011, pp. 354.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uc7ac\ud559, \ubc15\uc900\uc0c1, \uc774\ud55c\uc131, \uc784\uc601\ud76c, \uae40\uba85\uc12d, \ubc15\ub300\ud76c, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.11 - \ub2e4\ucc28\uc6d0 \ub370\uc774\ud130 \ud050\ube0c \ubaa8\ub378\uc5d0\uc11c\uc758 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ubd84\uc11d-KIISE2010.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub2e4\ucc28\uc6d0 \ub370\uc774\ud130 \ud050\ube0c \ubaa8\ub378\uc5d0\uc11c\uc758 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \uc815\ubcf4\uacfc\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, \ub2e8\uad6d\ub300, Nov. 5, 2010, pp.100-105.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc0c1\uc6b0, \ubc15\uc9c4\uc644, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.11 - \ud638\uc2a4\ud2b8 \ub808\ubca8 \ud2b8\ub798\ud53d \uc81c\uc5b4 \uc2dc\uc2a4\ud15c\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2010 autum.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud638\uc2a4\ud2b8 \ub808\ubca8 \ud2b8\ub798\ud53d \uc81c\uc5b4 \uc2dc\uc2a4\ud15c\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8, \uad11\uc6b4\ub300\ud559\uad50, Nov. 13, 2010, pp.14.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc815\uc2dd, \ubc15\uc9c4\uc644, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.11 - TCP Session \ubd84\uc11d\uc744 \ud1b5\ud55c \ube44\uc815\uc0c1\uc801\uc778 \uc138\uc158 \ubd84\ub958\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2010 autum.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">TCP Session \ubd84\uc11d\uc744 \ud1b5\ud55c \ube44\uc815\uc0c1\uc801\uc778 \uc138\uc158 \ubd84\ub958\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8, \uad11\uc6b4\ub300\ud559\uad50, Nov. 13, 2010, pp.310.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc778\ucca0, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.11 - NateOn \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2010 autum.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">NateOn \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8, \uad11\uc6b4\ub300\ud559\uad50, Nov. 13, 2010, pp.272.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uc131\ud6c8, \uc774\ud604\uc2e0, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.11 - \ud2b8\ub798\ud53d \ubd84\uc11d \ubc29\ubc95\ub860 \uc131\ub2a5 \ud5a5\uc0c1\uc744 \uc704\ud55c \ud638\uc2a4\ud2b8 \uae30\ubc18 \ubd84\uc11d \uc2dc\uc2a4\ud15c - KICS2010 autum.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub798\ud53d \ubd84\uc11d \ubc29\ubc95\ub860 \uc131\ub2a5 \ud5a5\uc0c1\uc744 \uc704\ud55c \ud638\uc2a4\ud2b8 \uae30\ubc18 \ubd84\uc11d \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8, \uad11\uc6b4\ub300\ud559\uad50, Nov. 13, 2010, pp.317.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc9c0\ud61c, \ubc15\uc900\uc0c1, \uc624\uc601\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.11 - DNS\ucffc\ub9ac \ubd84\uc11d\uc744 \ud1b5\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2010 autum.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">DNS\ucffc\ub9ac \ubd84\uc11d\uc744 \ud1b5\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8, \uad11\uc6b4\ub300\ud559\uad50, Nov. 13, 2010, pp.359.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ud604\uc2e0, \uc774\uc0c1\uc6b0, \uae40\uc9c0\ud61c, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.11 - \ub2e8\ub9d0 \ud638\uc2a4\ud2b8\uc758 \uadfc\uc0ac\uc801 \ub9e4\uce6d\uc744 \ud1b5\ud55c \uc6b4\uc601\uccb4\uc81c \ud310\ubcc4\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2010 autum.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub2e8\ub9d0 \ud638\uc2a4\ud2b8\uc758 \uadfc\uc0ac\uc801 \ub9e4\uce6d\uc744 \ud1b5\ud55c \uc6b4\uc601\uccb4\uc81c \ud310\ubcc4\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8, \uad11\uc6b4\ub300\ud559\uad50, Nov. 13, 2010, pp.316.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc815\ubbf8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.11 - \ub2e8\ub9d0 \ud638\uc2a4\ud2b8\uc758 \uc811\uc18d \uc720\ud615 \ud310\ubcc4\uc5d0 \uad00\ud55c \uc5f0\uad6c - KICS2010 autum.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub2e8\ub9d0 \ud638\uc2a4\ud2b8\uc758 \uc811\uc18d \uc720\ud615 \ud310\ubcc4\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8, \uad11\uc6b4\ub300\ud559\uad50, Nov. 13, 2010, pp.315.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ubc15\uc9c4\uc644, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.06 - Performance Improvement of Application-level Traffic Classification Algorithm using Payload Signature - KICS2010 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\ucc98 \uae30\ubc18 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958 \uc54c\uace0\ub9ac\uc998\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, June. 23-25, 2010, pp.482.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc900\uc0c1, \ubc15\uc9c4\uc644, \uc774\ud604\uc2e0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.06 - Internet Application Traffic Classification using Multiple Header Signature Format - KICS2010 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub2e4\uc911 \ud5e4\ub354 \uc2dc\uadf8\ub2c8\uccd0 \ud3ec\ub9f7\uc744 \uc774\uc6a9\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, June. 23-25, 2010, pp.486.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ud604\uc2e0, \uc774\uc0c1\uc6b0, \uc624\uc601\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.06 - A Study on the detecting NAT router using the passive traffic monitoring - KICS2010 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub798\ud53d \ubaa8\ub2c8\ud130\ub9c1\uc744 \ud1b5\ud55c NAT\uacf5\uc720\uae30 \ud310\ubcc4\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, June. 23-25, 2010, pp.488.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c4\uc644, \uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.06 - Performance Improvement of Traffic Classification Method using Statistic Signature - KICS2010 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud1b5\uacc4 \uc2dc\uadf8\ub2c8\uccd0 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\ub958 \ubc29\ubc95\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, June. 23-25, 2010, pp.479.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc0c1\uc6b0, \uc774\ud604\uc2e0, \uc624\uc601\uc11d, \ubc15\uc601\ubb34, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.06 - A Study on the traffic classification of Instant Messenger functions - KICS2010 summer.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Instant Messenger\uc758 \uae30\ub2a5\ubcc4 \ud2b8\ub798\ud53d \ubd84\ub958\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2010\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc81c\uc8fc, \ub77c\ub9c8\ub2e4\ud504\ub77c\uc790 \uc81c\uc8fc\ud638\ud154, June. 23-25, 2010, pp.478.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc0c1\uc6b0, \ubc15\uc900\uc0c1, \uc724\uc131\ud638, \ubc15\uc9c4\uc644, \uc774\ud604\uc2e0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010 - Research on Traffic Analysis of Instant Messenger Applications - KICS2010.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uba54\uc2e0\uc800 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (KICS) 2010, \uac15\uc6d0\ub3c4 \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Feb, 22-23, 2010, pp. 263.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ud604\uc2e0, \uc804\ud61c\uc815, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.04 - Study of Traffic monitoring in Future Internet - JCCI2010.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ubbf8\ub798\uc778\ud130\ub137\uc758 \ud2b8\ub798\ud53d \ubaa8\ub2c8\ud130\ub9c1 \ubc29\ubc95\ub860 \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 20th Joint Conference on Communications and Information (JCCI) 2010, \ucda9\ub0a8 \uc548\uba74\ub3c4 \uc624\uc158\uce90\uc2ac, Apr. 28-30, 2010, pp. 149.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc900\uc0c1, \ubc15\uc9c4\uc644, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.04 - Internet Application Traffic Analysis Using Association Rule - JCCI2010.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc5f0\uad00\uc131 \uaddc\uce59\uc744 \uc774\uc6a9\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 20th Joint Conference on Communications and Information (JCCI) 2010, \ucda9\ub0a8 \uc548\uba74\ub3c4 \uc624\uc158\uce90\uc2ac, Apr. 28-30, 2010, pp. 16.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc804\ud61c\uc815, \uc774\ud604\uc2e0, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.04 - The Study of Future Internet Autonomic Management Architecture - JCCI2010.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc11c\ube44\uc2a4 \uae30\ubc18\uc758 \ubbf8\ub798\uc778\ud130\ub137 \uc790\uc728 \uad00\ub9ac \uc544\ud0a4\ud14d\ucc98(AMoUNT) \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 20th Joint Conference on Communications and Information (JCCI) 2010, \ucda9\ub0a8 \uc548\uba74\ub3c4 \uc624\uc158\uce90\uc2ac, Apr. 28-30, 2010, pp. 177.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c4\uc644, \uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.04 - Traffic Classification using Payload size and Direction of Packet - JCCI2010.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud328\ud0b7\uc758 \ud398\uc774\ub85c\ub4dc \ud06c\uae30\uc640 \ubc29\ud5a5\uc744 \uc774\uc6a9\ud55c \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 20th Joint Conference on Communications and Information (JCCI) 2010, \ucda9\ub0a8 \uc548\uba74\ub3c4 \uc624\uc158\uce90\uc2ac, Apr. 28-30, 2010, pp. 14.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ubc15\uc9c4\uc644, \uc724\uc131\ud638, \uc774\ud604\uc2e0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2010\/2010.04 - Performance Improvement of Traffic Classification System based on Payload Signature - JCCI2010.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud398\uc774\ub85c\ub4dc \uc2dc\uadf8\ub2c8\ucc98 \uae30\ubc18 \ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 20th Joint Conference on Communications and Information (JCCI) 2010, \ucda9\ub0a8 \uc548\uba74\ub3c4 \uc624\uc158\uce90\uc2ac, Apr. 28-30, 2010, pp. 148.<\/span> [<font color=#0096FF>\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc900\uc0c1, \ubc15\uc9c4\uc644, \uc624\uc601\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - A Study of Evaluation and Verification Method - KICS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uac1d\uad00\uc801 \ud3c9\uac00 \ubc0f \uac80\uc99d \ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc131\uade0\uad00\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 21, 2009.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c4\uc644, \uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Grouping Algorithm for Extracting Statistic Signature in Application-level Traffic Classification - KICS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9\ub808\ubca8 \ud2b8\ub798\ud53d \ubd84\ub958\uc5d0\uc11c \ud1b5\uacc4 \uc2dc\uadf8\ub2c8\uccd0 \ucd94\ucd9c\uc744 \uc704\ud55c \uadf8\ub8f9\ud551 \uc54c\uace0\ub9ac\uc998<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc131\uade0\uad00\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 21, 2009.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc804\ud61c\uc815, \uae40\uba85\uc12d, \uc815\ucc3d\ub355, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - A Study of Efficient RFID-Sensor Data Management and Application in Ubiquitous Environment - KICS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc720\ube44\ucffc\ud130\uc2a4 \ud658\uacbd\uc5d0\uc11c \ud6a8\uc728\uc801\uc778 RFID\/Sensor \ub370\uc774\ud130\uc758 \uad00\ub9ac \ubc0f \ud65c\uc6a9\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc131\uade0\uad00\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 21, 2009.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ubc15\uc9c4\uc644, \uc724\uc131\ud638,  \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Performance Improvement of Traffic Classification System based on Hierarchical Structure of Signatures - KICS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2dc\uadf8\ub2c8\uccd0 \uacc4\uce35 \uad6c\uc870\uc5d0 \uae30\ubc18\ud55c \uc751\uc6a9 \ub808\ubca8 \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc131\uade0\uad00\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 21, 2009.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c4\uc644, \uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Method for dealing with Unknown Traffic in Traffic Classification System - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub798\ud53d \ubd84\ub958\uc2dc\uc2a4\ud15c\uc5d0\uc11c \ubbf8\ud655\uc778 \ud2b8\ub798\ud53d\uc758 \ucc98\ub9ac \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c32\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \uc81c16\uad8c \uc81c2\ud638, \uc11c\uc6b8, \uac74\uad6d\ub300\ud559\uad50, Nov. 13-14, 2009, pp. 501-502.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ud0dc\ubc94, \ubc15\uc9c4\uc644, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - A Design and Implementation of Efficient Information Notifying System on Enterprise Network - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Enterprise \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \ud6a8\uacfc\uc801\uc778 \uc815\ubcf4 \uc54c\ub9bc \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c32\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \uc81c16\uad8c \uc81c2\ud638, \uc11c\uc6b8, \uac74\uad6d\ub300\ud559\uad50, Nov. 13-14, 2009, pp. 497-498.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1,  \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Development of Signature Management System for Application-level Traffic Classification - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9\ub808\ubca8 \ud2b8\ub798\ud53d\ubd84\ub958\ub97c \uc704\ud55c \uc2dc\uadf8\ub2c8\uccd0 \uad00\ub9ac\uc2dc\uc2a4\ud15c \uac1c\ubc1c<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c32\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \uc81c16\uad8c \uc81c2\ud638, \uc11c\uc6b8, \uac74\uad6d\ub300\ud559\uad50, Nov. 13-14, 2009, pp. 499-500.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc815\uc544\uc8fc, \ubc15\uc900\uc0c1, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Real-time Fault Management System based on SNMP - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNMP\ub97c \uc774\uc6a9\ud55c \uc2e4\uc2dc\uac04 \uc7a5\uc560\uad00\ub9ac \uc2dc\uc2a4\ud15c\uc758 \uac1c\ubc1c<\/span><\/a>\",<span style=\"color:black; \"> 2009\ub144 \uc81c31\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ubd80\uc0b0, \ud55c\ud654\ub9ac\uc870\ud2b8, Apr. 23-24, 2009, \uc81c16\uad8c \uc81c1\ud638, pp.1317-1320.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc0c1\uc6b0, \uc815\uc544\uc8fc, \uc774\ud604\uc2e0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Research on Skype Traffic Classification - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Skype\ud2b8\ub798\ud53d \ubd84\ub958\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> 2009\ub144 \uc81c31\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ubd80\uc0b0, \ud55c\ud654\ub9ac\uc870\ud2b8, Apr. 23-24, 2009, \uc81c16\uad8c \uc81c1\ud638, pp.1112-1115.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\ud604\uc2e0, \uc624\uc601\uc11d, \uc774\uc0c1\uc6b0, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Host information gathering using the traffic analysis - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc774\uc6a9\ud55c \ud638\uc2a4\ud2b8 \uc815\ubcf4 \uc218\uc9d1<\/span><\/a>\",<span style=\"color:black; \"> 2009\ub144 \uc81c31\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ubd80\uc0b0, \ud55c\ud654\ub9ac\uc870\ud2b8, Apr. 23-24, 2009, \uc81c16\uad8c \uc81c1\ud638, pp.1202-1205.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ubc15\uc9c4\uc644, \uc724\uc131\ud638, \uc624\uc601\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Development of signature Generation system and Verification Network for Application Level Traffic classification - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9 \ub808\ubca8 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \uc2dc\uadf8\ub2c8\uccd0 \uc0dd\uc131 \uc2dc\uc2a4\ud15c \ubc0f \uac80\uc99d \ub124\ud2b8\uc6cc\ud06c\uc758 \uac1c\ubc1c<\/span><\/a>\",<span style=\"color:black; \"> 2009\ub144 \uc81c31\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ubd80\uc0b0, \ud55c\ud654\ub9ac\uc870\ud2b8, Apr. 23-24, 2009, \uc81c16\uad8c \uc81c1\ud638, pp. 1288-1291.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc30\uc900\ud638, \uc774\ud604\uc2e0, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Web Hard Disk Application Traffic Analysis - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc6f9 \ud558\ub4dc \ub514\uc2a4\ud06c \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2009\ub144 \uc81c31\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ubd80\uc0b0, \ud55c\ud654\ub9ac\uc870\ud2b8, Apr. 23-24, 2009, \uc81c16\uad8c \uc81c1\ud638, pp.1292-1295.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc624\uc601\uc11d, \uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Performance Improvement of Real-time Traffic Classification Algorithm based on Application Signature - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc2dc\uadf8\ub2c8\ucc98 \uae30\ubc18\uc758 \uc2e4\uc2dc\uac04 \ud2b8\ub798\ud53d \ubd84\ub958 \uc54c\uace0\ub9ac\uc998\uc758 \uc131\ub2a5 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> 2009\ub144 \uc81c31\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ubd80\uc0b0, \ud55c\ud654\ub9ac\uc870\ud2b8, Apr. 23-24, 2009, \uc81c16\uad8c \uc81c1\ud638, pp. 1233-1236.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c4\uc644, \uc724\uc131\ud638, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Behavior Analysis of Internet Applications based on Network Traffic - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \uae30\ubc18 \uc778\ud130\ub137 \uc751\uc6a9\uc758 \ub3d9\uc791\ud615\ud0dc \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2009\ub144 \uc81c31\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ubd80\uc0b0, \ud55c\ud654\ub9ac\uc870\ud2b8, Apr. 23-24, 2009, \uc81c16\uad8c \uc81c1\ud638, pp. 1210-1213.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc9c4\uc644, \uc624\uc601\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - Internet Traffic Analysis using Fixed IP-port - KIPS2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uace0\uc815 IP-port \ub97c \uc774\uc6a9\ud55c \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2009\ub144 \uc81c31\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ubd80\uc0b0, \ud55c\ud654\ub9ac\uc870\ud2b8, Apr. 23-24, 2009, \uc81c16\uad8c \uc81c1\ud638, pp.1175-1177.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc9c4\uc644, \ubc15\uc900\uc0c1, \uc624\uc601\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2009\/2009 - A Study of Fixed IP-port for Internet Traffic Classification - JCCI2009.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uace0\uc815 IP-port\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 19th Joint Conference on Communications and Information (JCCI) 2009, \uad11\uc8fc \ubb34\ub4f1\ud30c\ud06c\ud638\ud154, Apr. 15-17, 2009, pp. 167.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c4\uc644, \uc724\uc131\ud638, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Network Active Host detection method using NetFlow on Enterprise Network - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Enterprise \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c NetFlow \uc815\ubcf4\ub97c \uc774\uc6a9\ud55c Network Active Host \ud0d0\uc9c0 \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc5f0\uc138\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 15, 2008, pp. 143.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ub178\ud604\uad6c, \uc724\uc131\ud638, \uc624\uc601\uc11d, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Internet Application Traffic Classification using Port Grouping based on Created-time of Flow - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud50c\ub85c\uc6b0 \uc0dd\uc131\uc2dc\uac04 \uae30\ubc18\uc758 \ud3ec\ud2b8 \uadf8\ub8f9\ud551\uc744 \uc774\uc6a9\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc5f0\uc138\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 15, 2008, pp. 147.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc9c4\uc644, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - A Study on Internet Traffic Analysis based on Two-way-flow - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Two-way-flow\uae30\ubc18\uc758 \uc778\ud130\ub137 \ud2b8\ub798\ud53d \ubd84\uc11d\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc5f0\uc138\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 15, 2008, pp. 142.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ubc15\uc9c4\uc644,  \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - A Study on Two-level Classification Criterion of Service and Process for Application Level Traffic Classification - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc751\uc6a9\ub808\ubca8 \ud2b8\ub798\ud53d \ubd84\uc11d\uc744 \uc704\ud55c \uc11c\ube44\uc2a4\uc640 \ud504\ub85c\uc138\uc2a4\uc758 2\ub2e8\uacc4 \ubd84\uc11d\uae30\uc900\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc5f0\uc138\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 15, 2008, pp. 59.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc131\uc724, \ubc15\uc900\uc0c1, \uc720\uc7ac\ud559, \ubc15\ub300\ud76c,  \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Real-Time Application Traffic Classification System Using C4.5 Machine Learning Algorithm - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">C4.5\ub97c \uc774\uc6a9\ud55c \uc2e4\uc2dc\uac04 \uc751\uc6a9\ud2b8\ub798\ud53d \ubd84\uc11d \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc5f0\uc138\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 15, 2008, pp. 146.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uc7ac\ud559, \uac15\ubd09\uc218, \uc774\ud55c\uc131, \ubc15\uc900\uc0c1,  \uae40\uba85\uc12d, \ubc15\ub300\ud76c, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - An In-depth Analysis on Traffic Flooding Attacks Detection using Association Rule Mining- KIPS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc5f0\uad00\uad00\uacc4\uaddc\uce59\uc744 \uc774\uc6a9\ud55c \ud2b8\ub798\ud53d \ud3ed\uc8fc \uacf5\uaca9 \ud0d0\uc9c0\uc758 \uc2ec\uce35 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c30\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \uc81c15\uad8c \uc81c2\ud638, \uc11c\uc6b8, \uace0\ub824\ub300\ud559\uad50, Nov. 14-15, 2008, pp. 1563-1566.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uc7ac\ud559, \uc624\uc2b9\uadfc, \uc774\ud55c\uc131, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, \ubc15\ub300\ud76c, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Semantic Analysis on Traffic Flooding Attacks Detection System - KIPS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud2b8\ub798\ud53d \ud3ed\uc8fc \uacf5\uaca9 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c\uc758 \uc758\ubbf8\ub860\uc801 \ud574\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c30\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \uc81c15\uad8c \uc81c2\ud638, \uc11c\uc6b8, \uace0\ub824\ub300\ud559\uad50, Nov. 14-15, 2008, pp. 1496-1499.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ub178\ud604\uad6c, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Internet Application Traffic Classification using Traffic Measurement Agent - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">TMA(Traffic Measurement Agent)\ub97c \uc774\uc6a9\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud50c\ub77c\uc790\ud638\ud154, Jul. 2-4, 2008, pp.618.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ub178\ud604\uad6c, \uc724\uc131\ud638, \ubc15\uc0c1\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Internet Application Traffic Classification using Port Grouping of Time-based - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Time-based Port Grouping \uc744 \uc774\uc6a9\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud50c\ub77c\uc790\ud638\ud154, \uc81c\uc8fc, Jul. 2-4, 2008, pp.621.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc131\uc724, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Internet Application Traffic Classification using a J48 Machine Learning Algorithm - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">J48 Machine Learning \uc54c\uace0\ub9ac\uc998\uc744 \uc774\uc6a9\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud50c\ub77c\uc790\ud638\ud154, \uc81c\uc8fc, Jul. 2-4, 2008, pp.626.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c4\uc644, \ubc15\uc0c1\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Flow-based Host Traffic Monitoring and Analysis - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Flow\ub97c \uc774\uc6a9\ud55c \ud638\uc2a4\ud2b8 \uae30\ubc18 \ud2b8\ub798\ud53d \ubaa8\ub2c8\ud130\ub9c1 \ubc0f \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud50c\ub77c\uc790\ud638\ud154, \uc81c\uc8fc, Jul. 2-4, 2008, pp.197.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ubc15\ub300\ud76c, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Design of a Real-Time Traffic Flooding Attack Detection System using SNMP - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNMP \uae30\ubc18\uc758 \uc2e4\uc2dc\uac04 \ud2b8\ub798\ud53d \ud3ed\uc8fc\uacf5\uaca9 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c \uc124\uacc4<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud50c\ub77c\uc790\ud638\ud154, \uc81c\uc8fc, Apr. 13-14, 2008, Jul. 2-4, 2008.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uacbd\uc900, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - A Efficient SNMP MIB Data Gathering Algorithm - KICS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\ud6a8\uc728\uc801\uc778 SNMP MIB \uc815\ubcf4 \uc218\uc9d1 \uc54c\uace0\ub9ac\uc998<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \ub77c\ub9c8\ub2e4\ud50c\ub77c\uc790\ud638\ud154, \uc81c\uc8fc, Jul. 2-4, 2008, pp.627.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\ud0dc\uc12d, \uae40\uc2b9\uc5f0, \uae40\uba85\uc12d, \uc774\ud615\uc6b0, \uc870\ucda9\ud638, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Performance Evaluation and Analysis of Transport Layer Protocol in Wireless Distribution System - KCC2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">WDS \ud658\uacbd\uc5d0\uc11c \uc804\uc1a1\uacc4\uce35 \ud504\ub85c\ud1a0\ucf5c\uc758 \uc131\ub2a5 \ud3c9\uac00 \ubc0f \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the the Korea Computer Congress (KCC) 2008, \ud718\ub2c9\uc2a4\ud30c\ud06c, \uac15\uc6d0, Jun. 30 - Jul. 2, 2008, pp. 230-235.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uc7ac\ud559, \uae40\uc131\uc724, \uc774\ud55c\uc131, \uae40\uba85\uc12d, \ubc15\ub300\ud76c, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Internet Application Traffic Classification using a Hierarchical Multi-class SVM - KCC2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uacc4\uce35\uc801 \ub2e4\uc911 \ud074\ub798\uc2a4 SVM\uc744 \uc774\uc6a9\ud55c \uc778\ud130\ub137 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Korea Computer Congress (KCC) 2008, \ud718\ub2c9\uc2a4\ud30c\ud06c, \uac15\uc6d0, Jun. 30 - Jul. 2, 2008, pp.174-178.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc720\uc7ac\ud559, \ubc15\uc900\uc0c1, \uc774\ud55c\uc131, \uae40\uba85\uc12d, \ubc15\ub300\ud76c, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Detection of Traffic Flooding Attacks using SVDD and SNMP MIB - KCC2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SVDD \uc640 SNMP MIB\uc744 \uc774\uc6a9\ud55c \ud2b8\ub798\ud53d \ud3ed\uc8fc \uacf5\uaca9\uc758 \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Korea Computer Congress (KCC) 2008, \ud718\ub2c9\uc2a4\ud30c\ud06c, \uac15\uc6d0, Jun. 30 - Jul. 2, 2008, pp.124-127.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ubcd1\ucca0, \uc6d0\uc601\uc900, \uae40\uba85\uc12d, \ud64d\uc6d0\uae30, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Application-level Signature Extraction System and VerificationMethod - KNOM2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc5b4\ud50c\ub9ac\ucf00\uc774\uc158 \ub808\ubca8\uc758 Signature \uc0dd\uc131 \uc2dc\uc2a4\ud15c\uacfc \ud2b8\ub798\ud53d \ubd84\ub958 \uc2dc\uc2a4\ud15c\uc758 \uac80\uc99d\ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Korean Network Operations and Management (KNOM) 2008, \ucc3d\uc6d0, \ud55c\uad6d, Apr. 24-25, 2008.<\/span> [<font color=#0096FF>\ucd5c\uc6b0\uc218\ub17c\ubb38<\/font>]\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ucd5c\uacbd\uc900, \ubc15\uc900\uc0c1, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Efficient MIB Data Gathering Algorithm for SNMP based NMS - KIPS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNMP \uae30\ubc18 NMS\ub97c \uc704\ud55c \ud6a8\uc728\uc801\uc778 MIB \uc815\ubcf4 \uc218\uc9d1 \uc54c\uace0\ub9ac\uc998<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c29\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ub300\uad6c, \uacbd\uc77c\ub300\ud559\uad50, May. 17, 2008, \uc81c15\uad8c \uc81c1\ud638, pp.950-953.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc9c4\uc644, \ubc15\uc0c1\ud6c8, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Flow-based Host Analysis System on Enterprise Nework - KIPS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Enterprise \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c Flow\ub97c \uc774\uc6a9\ud55c Host  \ubd84\uc11d \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c29\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ub300\uad6c, \uacbd\uc77c\ub300\ud559\uad50, May. 17, 2008, \uc81c15\uad8c \uc81c1\ud638, pp.962-965.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uc131\uc724, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Performance Analysis of Machine Learning Algorithms for Application Traffic Classification - KIPS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \uba38\uc2e0\ub7ec\ub2dd \uc54c\uace0\ub9ac\uc998 \uc131\ub2a5 \ubd84\uc11d<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c29\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ub300\uad6c, \uacbd\uc77c\ub300\ud559\uad50, May. 17, 2008, \uc81c15\uad8c \uc81c1\ud638, pp.968-970.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc724\uc131\ud638, \ub178\ud604\uad6c, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Internet Application Traffic Classification using Traffic Measurement Agent - KIPS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">TMA(Traffic Measurement Agent)\ub97c \uc774\uc6a9\ud55c \uc778\ud130\ub137 \uc751\uc6a9 \ud2b8\ub798\ud53d \ubd84\ub958<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c29\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ub300\uad6c, \uacbd\uc77c\ub300\ud559\uad50, May. 17, 2008, \uc81c15\uad8c \uc81c1\ud638, pp.946-949.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ubc15\ub300\ud76c, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Traffic Flooding Attack Detection using SNMP MIB - KIPS2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNMP MIB \uae30\ubc18 \ud2b8\ub798\ud53d \ud3ed\uc8fc\uacf5\uaca9 \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> 2008\ub144 \uc81c29\ud68c \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c (KIPS), \ub300\uad6c, \uacbd\uc77c\ub300\ud559\uad50, May. 17, 2008, \uc81c15\uad8c \uc81c1\ud638, pp.935-938.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc774\uc0c1\uc900, \uae40\uba85\uc12d, \uc774\ud615\uc6b0, \uc870\ucda9\ud638, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - A Study of Efficient Centralized Downlink Scheduling Using Directional Antennas in IEEE 802.16-based Wireless Mesh Networks - JCCI2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">IEEE 802.16 \uae30\ubc18\uc758 \ubb34\uc120 \uba54\uc26c \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \uc9c0\ud5a5\uc131 \uc548\ud14c\ub098\ub97c \uc774\uc6a9\ud55c \ud6a8\uc728\uc801\uc778 \uc911\uc559 \uc9d1\uc911\ud615 \ud558\ud5a5\ub9c1\ud06c \uc2a4\ucf00\uc904\ub9c1\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 18th Joint Conference on Communications and Information (JCCI) 2008, Jeju, Korea, Apr. 23-25, 2008, pp.II-30.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \ubc15\ub300\ud76c,  \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2008\/2008 - Improvement of Traffic Flooding Attack Detection Time using SNMP MIB Update Interval - JCCI2008.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNMP MIB \uac31\uc2e0 \uc8fc\uae30\ub97c \uc774\uc6a9\ud55c \ud2b8\ub798\ud53d \ud3ed\uc8fc\uacf5\uaca9\uc758 \ud0d0\uc9c0\uc2dc\uac04 \ud5a5\uc0c1<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the 18th Joint Conference on Communications and Information (JCCI) 2008, Jeju, Korea, Apr. 23-25, 2008, pp.111-119.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc815\uad11\ubcf8, \ucd5c\ubbf8\uc815, \uae40\uba85\uc12d, \uc6d0\uc601\uc900, \ud64d\uc6d0\uae30, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - The Best Machine Learning Algorithm and Feature Set for Traffic Classification using Split Validation - KICS2007.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Split Validation \ubc29\ubc95\uc5d0\uc11c\uc758 \ud2b8\ub798\ud53d \ubd84\ub958\ub97c \uc704\ud55c \ucd5c\uc801\uc758 ML \uc54c\uace0\ub9ac\uc998\uacfc Feature Set<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 17, 2007, pp. 177.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ubcd1\ucca0, \uc6d0\uc601\uc900, \uae40\uba85\uc12d, \ud64d\uc6d0\uae30, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - LASER - Automated Application Signature Generation - KICS2007.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">LASER:\uc790\ub3d9\ud654\ub41c \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158 \ub808\ubca8\uc758 Signature \uc0dd\uc131\uacfc \uac80\uc99d \ubc29\ubc95<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 17, 2007, pp. 172.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc900\uc0c1, \uc870\ud604\uc2b9, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - Detection of Traffic Flooding Attack using the correlation of SNMP MIB - KICS2007.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNMP MIB\uc758 \uc0c1\uad00 \uad00\uacc4\ub97c \uc774\uc6a9\ud55c \ud2b8\ub798\ud53d \ud3ed\uc8fc \uacf5\uaca9 \ud0d0\uc9c0<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc11c\uc6b8\ub300\ud559\uad50, \uc11c\uc6b8, Nov. 17, 2007, pp. 13.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\uc0c1\ud6c8, \ubc15\uc9c4\uc644, \uae40\uba85\uc12d, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - Flow-based Real-time Traffic Monitoring and Analysis System - KIPS2007.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Flow \uae30\ubc18 \uc2e4\uc2dc\uac04 \ud2b8\ub798\ud53d \uc218\uc9d1 \ubc0f \ubd84\uc11d \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, \ubaa9\ud3ec\ub300\ud559\uad50, \uc804\uc8fc, Nov. 9-10, 2007, pp. 1061.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uba85\uc12d, \uae40\uc131\uc724, \ubc15\uc900\uc0c1, \uae40\uc7ac\uc131, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - SNMP-based Network Weather Map System - KICS2007.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNMP \uae30\ubc18\uc758 Enterprise Network Weather Map \uc2dc\uc2a4\ud15c<\/span><\/a>\",<span style=\"color:black; \"> \ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, \uc6a9\ud3c9\ub9ac\uc870\ud2b8, Korea, July. 4-6, 2007, pp.453.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ubc15\ubcd1\ucca0, \uc6d0\uc601\uc900, \uae40\uba85\uc12d, \ud64d\uc6d0\uae30, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - Automatic Application-level Signature Extraction - KNOM2007.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">\uc790\ub3d9\ud654\ub41c \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158 \ub808\ubca8\uc758 Signature \uc0dd\uc131<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Korean Network Operations and Management (KNOM) 2007, \uc81c\uc8fc\ub300\ud559\uad50, Jeju, Korea, Apr. 26-27, 2007, pp.110-119.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uc6d0\uc601\uc900, \ucd5c\ubbf8\uc815, \ud64d\uc6d0\uae30, \uae40\uba85\uc12d, \ub178\ud64d\uc120, \uc774\uc900\ud611, \ud669\ud654\uc6d0, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - IP-based Process Control Network Fault Detection - KNOM2007.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">IP \uae30\ubc18\uc758 \uacf5\uc815 \uc81c\uc5b4 \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c\uc758 \ud1b5\uc2e0 \uc7a5\uc560 \uc9c4\ub2e8<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Korean Network Operations and Management (KNOM) 2007, \uc81c\uc8fc\ub300\ud559\uad50, Jeju, Korea, Apr. 26-27, 2007, pp.211-218.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\uae40\uba85\uc12d, \uae40\uc131\uc724, \ubc15\uc900\uc0c1, \uae40\uc7ac\uc131, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2007\/2007 - Enterprise Network Weather Map System Design and Implementation - KNOM2007.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Enterprise Network Weather Map \uc2dc\uc2a4\ud15c\uc758 \uc124\uacc4 \ubc0f \uad6c\ud604<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Korean Network Operations and Management (KNOM) 2007, \uc81c\uc8fc\ub300\ud559\uad50, Jeju, Korea, Apri. 26 - 27, 2007, pp.172-179.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung-Sup Kim, Hun-Jeong Kang, and James W. Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2003\/2003 - Research on a P2P Flow Traffic Analysis based on Flow Grouping - KNOM2003.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">Flow Grouping\uc744 \ud1b5\ud55c P2P \ud2b8\ub798\ud53d \ubd84\uc11d\ubc29\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Korean Network Operations and Management (KNOM) 2003, Daejeon, Korea, May. 22-23, 2003, pp.210-218.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Hun-Jeong Kang, Myung-Sup Kim, and James W. Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2003\/2003 - Multimedia Service Traffic Monitoring and Analysis - KNOM2003.pdf\"><span style=\"color:black; font-weight:700 \">Multimedia Service Traffic Monitoring and Analysis<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Korean Network Operations and Management (KNOM) 2003, Daejeon, Korea, May. 22-23, 2003, pp. 201-209.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">\ud55c\uc138\ud76c, \uc8fc\ud64d\ud0dd,  \uae40\uba85\uc12d, \ud64d\uc6d0\uae30, <\/span>\"<span style=\"color: black; font-weight:500; font-family:'Noto Sans KR'; \">\ucd08\uace0\uc18d IP \ub124\ud2b8\uc6cc\ud06c \ubaa8\ub2c8\ud130\ub9c1\uacfc \ubd84\uc11d\uc744 \uc704\ud55c \ubd84\uc0b0 \ud328\uc2dc\ube0c \ubaa8\ub2c8\ud130\ub9c1 \ubc29\ubc95<\/span>\",<span style=\"color:black; \"> 2002\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ub300\ud68c, Muju, Korea, Jul. 20-22, 2002, pp. 43.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung-Sup Kim and James W. Hong, <\/span>\"<a target=_new href=\"\/publication\/published papers\/2001\/2001 - Design and Implementation of a SNMP and Web-based Load Cluster Management System - KNOM2001.pdf\"><span style=\"color: black; font-weight:500; font-family:'Noto Sans KR';\">SNMP\uc640 Web\uae30\ubc18\uc758 Load Cluster \uad00\ub9ac \uc2dc\uc2a4\ud15c\uc758 \uc124\uacc4 \ubc0f \uad6c\ud604<\/span><\/a>\",<span style=\"color:black; \"> Proc. of the Korean Network Operations and Management (KNOM) 2001, Daejeon, Korea, May. 24-25, 2001, pp. 163-169.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Young-Mi Shin, Myung-Sup Kim, James W. Hong, Young-Ho Seo, and Yong Kim, <\/span>\"<span style=\"color: black; font-weight:500; font-family:'Noto Sans KR'; \">W\/S \uae30\ubc18\uc758 \uc6d0\uaca9 \uacf5\ub3d9\uc5f0\uad6c \ud50c\ub7ab\ud3fc \uc124\uacc4 \ubc0f \uad6c\ud604<\/span>\",<span style=\"color:black; \"> 1998 \ud55c\uad6d\uac10\uc131\uacfc\ud559\ud68c \ucd98\uacc4\ud559\uc220\ud68c\uc758 \ub17c\ubb38\uc9d1, Daejeon, Korea, May. 23-25, 1998, pp. 298-303.<\/span>\r\n\t<li style='border-bottom:0.5px solid; line-height : 30px;padding: 10px 0 10px 0;border-color:#7F8487;'><span style=\"color:black; \">Myung-Sup Kim, and James W. Hong, <\/span>\"<span style=\"color:black; font-weight:700 \">Development of DMI MIF Decoder and Browser<\/span>\",<span style=\"color:black; \"> Proc. of the KISS Fall Conference1997, Seoul, Korea, Oct. 20-22, 1997, pp. 349-352.<\/span><\/ol> \r\n\r\n<\/BODY>\r\n<\/HTML>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Publication Welcome to Network Mangement Lab.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"folder":[],"class_list":["post-1563","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Publication Welcome to Network Mangement Lab.","_links":{"self":[{"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/pages\/1563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/comments?post=1563"}],"version-history":[{"count":19,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/pages\/1563\/revisions"}],"predecessor-version":[{"id":3300,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/pages\/1563\/revisions\/3300"}],"wp:attachment":[{"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/media?parent=1563"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/nmlab.korea.ac.kr\/wp-nmlab\/index.php\/wp-json\/wp\/v2\/folder?post=1563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}