Login / Signup
BongNam Noh
Publication Activity (10 Years)
Years Active: 1999-2018
Publications (10 Years): 2
Top Topics
Digital Images
Document Analysis
Nuclear Power Plant
Search Algorithm
Top Venues
Digit. Investig.
WISA
</>
Publications
</>
SungCheol Kim
,
IeckChae Euom
,
ChangHyun Ha
,
JooHyoung Lee
,
BongNam Noh
A Study on the Vulnerability Assessment for Digital I&C System in Nuclear Power Plant.
WISA
(2018)
Kyoungho Lee
,
Hyunuk Hwang
,
Kibom Kim
,
BongNam Noh
Robust bootstrapping memory analysis against anti-forensics.
Digit. Investig.
(2016)
HeeMan Park
,
YoungLok Lee
,
BongNam Noh
,
HyungHyo Lee
Design of an event system adopting ontology-based event model for ubiquitous environment.
CSTST
(2008)
Jun-Hyung Park
,
Minsoo Kim
,
BongNam Noh
,
James B. D. Joshi
A similarity based technique for detecting malicious executable files for computer forensics.
IRI
(2006)
InSu Kim
,
HeeMan Park
,
BongNam Noh
,
YoungLok Lee
,
Seungyong Lee
,
HyungHyo Lee
Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing.
WEBIST (1)
(2006)
Sang-Kyun Noh
,
Yongmin Kim
,
DongKook Kim
,
BongNam Noh
Network Anomaly Detection Based on Clustering of Sequence Patterns.
ICCSA (2)
(2006)
Gil-Jong Mun
,
Yongmin Kim
,
DongKook Kim
,
BongNam Noh
Network Intrusion Detection Using Statistical Probability Distribution.
ICCSA (2)
(2006)
InSu Kim
,
HeeMan Park
,
BongNam Noh
,
YoungLok Lee
,
Seungyong Lee
,
HyungHyo Lee
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning.
SUTC (2)
(2006)
Jung-Sun Kim
,
Seungyong Lee
,
Minsoo Kim
,
Jae-Hyun Seo
,
BongNam Noh
A Security Architecture for Adapting Multiple Access Control Models to Operating Systems.
ICCSA (5)
(2006)
Minsoo Kim
,
Jae-Hyun Seo
,
Seungyong Lee
,
BongNam Noh
,
Jung-Taek Seo
,
Eung Ki Park
,
Choonsik Park
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
ICCSA (2)
(2005)
Minsoo Kim
,
Jae-Hyun Seo
,
Il-Ahn Cheong
,
BongNam Noh
Auto-generation of Detection Rules with Tree Induction Algorithm.
FSKD (2)
(2005)
Hyang-Chang Choi
,
YongHoon Yi
,
Jae-Hyun Seo
,
BongNam Noh
,
HyungHyo Lee
A Privacy Protection Model in ID Management Using Access Control.
ICCSA (2)
(2005)
YoungLok Lee
,
HyungHyo Lee
,
Seungyong Lee
,
HeeMan Park
,
BongNam Noh
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate.
EUC Workshops
(2005)
YoungLok Lee
,
HyungHyo Lee
,
Seungyong Lee
,
InSu Kim
,
BongNam Noh
Development of Event Manager and Its Application in Jini Environment.
EUC Workshops
(2005)
Gil-Jong Mun
,
Yongmin Kim
,
DongKook Kim
,
BongNam Noh
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.
CISC
(2005)
Seong Ho Lee
,
HyungHyo Lee
,
BongNam Noh
A Rule-Based Intrusion Alert Correlation System for Integrated Security Management.
International Conference on Computational Science
(2004)
HyungHyo Lee
,
YoungLok Lee
,
BongNam Noh
A Framework for Modeling Organization Structure in Role Engineering.
PARA
(2004)
Jung-Sun Kim
,
Minsoo Kim
,
BongNam Noh
A Fuzzy Expert System for Network Forensics.
ICCSA (1)
(2004)
Jun-Hyung Park
,
Minsoo Kim
,
BongNam Noh
Detection Techniques for ELF Executable File Using Assembly Instruction Searching.
ICCSA (1)
(2004)
Seungyong Lee
,
Yongmin Kim
,
BongNam Noh
,
HyungHyo Lee
A New Authorization Model for Workflow Management System Using the RPI-RBAC Model.
International Conference on Computational Science
(2004)
HyungHyo Lee
,
Seungyong Lee
,
BongNam Noh
A New Role-Based Authorization Model in a Corporate Workflow Systems.
ICCSA (1)
(2004)
Il-Ahn Cheong
,
Yongmin Kim
,
Minsoo Kim
,
BongNam Noh
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network.
ICOIN
(2004)
Sang-Kil Park
,
Jongsoo Jang
,
BongNam Noh
Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework.
Security and Management
(2003)
JongSoon Park
,
YoungLok Lee
,
HyungHyo Lee
,
BongNam Noh
A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance.
Security and Management
(2003)
HyungHyo Lee
,
YoungLok Lee
,
BongNam Noh
A New Role-Based Delegation Model Using Sub-role Hierarchies.
ISCIS
(2003)
YongHoon Yi
,
MyongJae Kim
,
YoungLok Lee
,
HyungHyo Lee
,
BongNam Noh
Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment.
APWeb
(2003)
HyungHyo Lee
,
BongNam Noh
Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management.
ICOIN (2)
(2002)
HyungHyo Lee
,
BongNam Noh
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach.
ICPP Workshops
(1999)