{"id":974,"date":"2020-03-14T01:29:58","date_gmt":"2020-03-13T16:29:58","guid":{"rendered":"http:\/\/hpsclab.hannam.ac.kr\/main\/?page_id=974"},"modified":"2024-03-04T16:01:57","modified_gmt":"2024-03-04T07:01:57","slug":"international-publication","status":"publish","type":"page","link":"https:\/\/hpsclab.hannam.ac.kr\/main\/international-publication\/","title":{"rendered":"International Publication"},"content":{"rendered":"\n\n\n<h2 class=\"has-very-dark-gray-color has-text-color\"><strong>International Journal<\/strong><\/h2>\n\n\n\n<table id=\"tablepress-in_journal\" class=\"tablepress tablepress-id-in_journal\">\n<thead>\n<tr class=\"row-1 odd\">\n\t<th class=\"column-1\">Author<\/th><th class=\"column-2\">Title<\/th><th class=\"column-3\">Journal<\/th><th class=\"column-4\">Num<\/th><th class=\"column-5\">Page<\/th><th class=\"column-6\">Publication date<\/th><th class=\"column-7\">MORE<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\">HanJae Yoon, Manhee Lee<\/td><td class=\"column-2\">SGXDump: A Repeatable Code-Reuse Attack for Extracting SGX Enclave Memory<\/td><td class=\"column-3\">Applied Sciences 2022<\/td><td class=\"column-4\">Vo1.12(15)<\/td><td class=\"column-5\"><\/td><td class=\"column-6\">2022.04<\/td><td class=\"column-7\"><a href=\"https:\/\/doi.org\/10.3390\/app12157655\" target=\"_blank\" rel=\"noopener\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\">Heedong Yang, Seungsoo Park, Kangbin Yim, Manhee Lee<\/td><td class=\"column-2\">Better Not to Use Vulnerability\u2019s Reference for Exploitability Prediction<\/td><td class=\"column-3\">Applied Sciences 2020<\/td><td class=\"column-4\">Vol.10(7)<\/td><td class=\"column-5\">2555<\/td><td class=\"column-6\">2020.04.<\/td><td class=\"column-7\"><a href=\"https:\/\/doi.org\/10.3390\/app10072555\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\">Kyungroul Lee, Manhee Lee<\/td><td class=\"column-2\">True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing<\/td><td class=\"column-3\">Sensors 2019<\/td><td class=\"column-4\">Vol.19(19)<\/td><td class=\"column-5\"><\/td><td class=\"column-6\">2019.09.<\/td><td class=\"column-7\"><a href=\"https:\/\/doi.org\/10.3390\/s19194130\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\">Kwangjun Kim, Heedong Yang, Byeonggeun Son, Hanjae Yoon, Kangbin Yim, Manhee Lee<\/td><td class=\"column-2\">A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities<\/td><td class=\"column-3\">Advances in Intelligent Systems and Computing<\/td><td class=\"column-4\">Vol.994<\/td><td class=\"column-5\">pp 834-844<\/td><td class=\"column-6\">2019.07.<\/td><td class=\"column-7\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-22263-5_80\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\">Gibeom Song, Manhee Lee<\/td><td class=\"column-2\">Emulearner: Deep Learning Library for Utilizing Emulab<\/td><td class=\"column-3\">Journal of Information and Commnunication Convergence Engineering (JICCE)<\/td><td class=\"column-4\">Vol.16, No.4<\/td><td class=\"column-5\">pp.235-241<\/td><td class=\"column-6\">2018.12.<\/td><td class=\"column-7\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-13-1056-0_28\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\">Kwangjun Kim, Manhee Lee<\/td><td class=\"column-2\">SNMP-Based Detection of VLAN Hopping Attack Risk<\/td><td class=\"column-3\">Lecture Notes in Electrical Engineering (LNEE)<\/td><td class=\"column-4\">Vol. 514<\/td><td class=\"column-5\">pp.267-272<\/td><td class=\"column-6\">2018.07.<\/td><td class=\"column-7\"><a href=\"https:\/\/doi.org\/10.6109\/jicce.2018.16.4.236\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\">Hanjae Yoon, Manhee Lee<\/td><td class=\"column-2\">TaintDroid\u2019s Ability Test and Remedy for Tainting SMS, Bookmark, Accelerometer and Call Log Information<\/td><td class=\"column-3\">Journal of Engineering and Applied Sciences<\/td><td class=\"column-4\">Vol.12 (Special Issue 2)<\/td><td class=\"column-5\">pp.6308-6312<\/td><td class=\"column-6\">2017<\/td><td class=\"column-7\"><a href=\"http:\/\/docsdrive.com\/pdfs\/medwelljournals\/jeasci\/2017\/6308-6312.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\">Manhee Lee<\/td><td class=\"column-2\">A taint analysis enabling technique for detecting contact information leak app<\/td><td class=\"column-3\">International Information Institute<\/td><td class=\"column-4\">Vol.20, No.9(A)<\/td><td class=\"column-5\">pp.6549-6556<\/td><td class=\"column-6\">2017.09.<\/td><td class=\"column-7\"><a href=\"https:\/\/www.researchgate.net\/publication\/322771872_A_taint_analysis_enabling_technique_for_detecting_contact_information_leak_app\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\">Daeboo Jeong, Manhee Lee<\/td><td class=\"column-2\">Evading Tainting Analysis of DroidBox by Using Image Difference Between Screen Capture Images<\/td><td class=\"column-3\">Lecture Notes in Electrical Engineering (LNEE)<\/td><td class=\"column-4\">Vol. 450<\/td><td class=\"column-5\">pp.176-184<\/td><td class=\"column-6\">2017.09.<\/td><td class=\"column-7\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-10-6454-8_23\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\">Gibeom Song, Manhee Lee<\/td><td class=\"column-2\">MBR Image Automation Analysis Techniques Utilizing Emulab<\/td><td class=\"column-3\">Lecture Notes in Electrical Engineering (LNEE)<\/td><td class=\"column-4\">Vol. 424<\/td><td class=\"column-5\">pp.213-220<\/td><td class=\"column-6\">2017.03.<\/td><td class=\"column-7\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-10-4154-9_25\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\">Bogyu Jang, Jaeseung Lee, Manhee Lee<\/td><td class=\"column-2\">Automatic system for measuring security risk of Android application from third party app store<\/td><td class=\"column-3\">SECURITY AND COMMUNICATION NETWORKS (SCN)<\/td><td class=\"column-4\">Vol.9, Issue.16<\/td><td class=\"column-5\">pp.3190-3196<\/td><td class=\"column-6\">2016.11.<\/td><td class=\"column-7\"><a href=\"https:\/\/doi.org\/10.1002\/sec.1525\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n\t<td class=\"column-1\">Yeongyeong Kim, Hanjae Yoon, Manhee Lee<\/td><td class=\"column-2\">Implementation of Web-based Groundwater Management for Auto Problem Detection<\/td><td class=\"column-3\">Journal of Convergence<\/td><td class=\"column-4\">Vol.5, No.4<\/td><td class=\"column-5\">pp.32-38<\/td><td class=\"column-6\">2014.12.<\/td><td class=\"column-7\"><a href=\"https:\/\/www.earticle.net\/Article\/A248535\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-14 even\">\n\t<td class=\"column-1\">Manhee Lee<\/td><td class=\"column-2\">Design of an Intelligent System for Autonomous Groundwater Management<\/td><td class=\"column-3\">Journal of Convergence<\/td><td class=\"column-4\">Vol.5, No.1<\/td><td class=\"column-5\">pp.26-31<\/td><td class=\"column-6\">2014.03.<\/td><td class=\"column-7\"><a href=\"https:\/\/www.earticle.net\/Article\/A215909\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-15 odd\">\n\t<td class=\"column-1\">Manhee Lee<\/td><td class=\"column-2\">Design Considerations on Constructing an Early Detection Framework for Detecting Large-Scale Malware Attacks<\/td><td class=\"column-3\">Communications in Computer and Information Science (CCIS)<\/td><td class=\"column-4\">Vol.310<\/td><td class=\"column-5\">pp.260-267<\/td><td class=\"column-6\">2012.08.<\/td><td class=\"column-7\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007%2F978-3-642-32692-9_34\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-16 even\">\n\t<td class=\"column-1\">Manhee Lee, Minseon Ahn, Eunjung Kim<\/td><td class=\"column-2\">Fast Secure Communications in Shared Memory Multiprocessor Systems<\/td><td class=\"column-3\">IEEE Transactions on Parallel and Distributed Systems<\/td><td class=\"column-4\">Vol.22, Issue.10<\/td><td class=\"column-5\">pp.1714-1721<\/td><td class=\"column-6\">2011.07.<\/td><td class=\"column-7\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5962331\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-17 odd\">\n\t<td class=\"column-1\">Manhee Lee, Baiksong An, Eunjung Kim<\/td><td class=\"column-2\">A Session Key Caching and Prefetching Scheme for Secure Communication in Cluster Systems<\/td><td class=\"column-3\">Journal of Parallel and Distributed Computing<\/td><td class=\"column-4\">Vol.70, Issue.7<\/td><td class=\"column-5\">pp.732-742<\/td><td class=\"column-6\">2010.07.<\/td><td class=\"column-7\"><a href=\"https:\/\/doi.org\/10.1016\/j.jpdc.2009.11.007\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-18 even\">\n\t<td class=\"column-1\">Manhee Lee, Eunjung Kim<\/td><td class=\"column-2\">A Comprehensive Framework for Enhancing Security in InfiniBand Architecture<\/td><td class=\"column-3\">IEEE Transactions on Parallel and Distributed Systems<\/td><td class=\"column-4\">Vol.18, Issue.10<\/td><td class=\"column-5\">pp.1393-1406<\/td><td class=\"column-6\">2007.09.<\/td><td class=\"column-7\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4302727\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-in_journal from cache -->\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-very-dark-gray-color has-text-color\"><strong>International Conference &amp; Workshop<\/strong><\/h2>\n\n\n\n<table id=\"tablepress-in_conf\" class=\"tablepress tablepress-id-in_conf\">\n<thead>\n<tr class=\"row-1 odd\">\n\t<th class=\"column-1\">Author<\/th><th class=\"column-2\">Title<\/th><th class=\"column-3\">Conference \/ Workshop<\/th><th class=\"column-4\">Location<\/th><th class=\"column-5\">Date<\/th><th class=\"column-6\">MORE<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\">Soonhong Kwon, Heedong Yang, Manhee Lee, Jong-Hyouk Lee<\/td><td class=\"column-2\">Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset<\/td><td class=\"column-3\">ACM ICEA 2020<\/td><td class=\"column-4\">Gangwon<\/td><td class=\"column-5\">2020.12.<\/td><td class=\"column-6\"><a href=\"https:\/\/doi.org\/10.1145\/3440943.3444745\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\">Heedong Yang, Manhee Lee<\/td><td class=\"column-2\">Demystifying ARM TrustZone TEE Client API using OP-TEE<\/td><td class=\"column-3\">The 9th International Conference on Smart Media and Applications (SMA 2020)<\/td><td class=\"column-4\">Jeju<\/td><td class=\"column-5\">2020.09.<\/td><td class=\"column-6\"><a href=\"https:\/\/doi.org\/10.1145\/3426020.3426113\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\">Seungsoo Park, Manhee Lee<\/td><td class=\"column-2\">ARTAS: automatic research trend analysis system for information security<\/td><td class=\"column-3\">SAC '20: The 35th ACM\/SIGAPP Symposium on Applied Computing<\/td><td class=\"column-4\">Brno, Czech Republic<\/td><td class=\"column-5\">2020.03.<\/td><td class=\"column-6\"><a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341105.3373935\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\">Hyohyun Son, Manhee Lee<\/td><td class=\"column-2\">Analysis of  U.S. Supply Chain Risk Management and Proposal of White Box Program<\/td><td class=\"column-3\">International Conference on Smart Media &amp; Application 2019<\/td><td class=\"column-4\">Guam<\/td><td class=\"column-5\">2019.12.<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\">Kwangjun Kim, Manhee Lee<\/td><td class=\"column-2\">A Survey of KPTI Patch for Meltdown in ARM Processors<\/td><td class=\"column-3\">International Conference on Smart Media &amp; Application 2019<\/td><td class=\"column-4\">Guam<\/td><td class=\"column-5\">2019.12.<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\">Woojin Seok, Jeonghoon Moon, Wontaek Hong, JaiSeung Kwak, Manhee Lee<\/td><td class=\"column-2\">Store-and-Forward Data Transfer using Optimized Intermediate Node<\/td><td class=\"column-3\">2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS)<\/td><td class=\"column-4\">Matsue, Japan<\/td><td class=\"column-5\">2019.09.<\/td><td class=\"column-6\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8892885\/\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\">Hyohyun Son, Manhee Lee<\/td><td class=\"column-2\">Study on the Necessity of Standardization for SCRM<\/td><td class=\"column-3\">International Conference on Culture Technology 2019 (ICCT-2019)<\/td><td class=\"column-4\">Pattaya, Thailand<\/td><td class=\"column-5\">2019.08.<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\">Seungsoo Park, Manhee Lee<\/td><td class=\"column-2\">Analysis of ICCT Research Trend using the ARTAS<\/td><td class=\"column-3\">International Conference on Culture Technology 2019 (ICCT-2019)<\/td><td class=\"column-4\">Pattaya, Thailand<\/td><td class=\"column-5\">2019.08.<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\">Gibeom Song, Manhee Lee<\/td><td class=\"column-2\">Design and implementation of emulab-based malware analysis service through EmuLiB<\/td><td class=\"column-3\">SAC '19: Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing<\/td><td class=\"column-4\"><\/td><td class=\"column-5\">2019.04.<\/td><td class=\"column-6\"><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3297280.3297490\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\">Gibeom Song, Seungsoo Park, Manhee Lee<\/td><td class=\"column-2\">Using Emulab for Deep Learning Performance Comparisons among Network Topologies<\/td><td class=\"column-3\">ICIIT '19: Proceedings of the 2019 4th International Conference on Intelligent Information Technology<\/td><td class=\"column-4\"><\/td><td class=\"column-5\">2019.02.<\/td><td class=\"column-6\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3321454.3321458\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\">Kwangjun Kim, Manhee Lee<\/td><td class=\"column-2\">Feasibility Study on Utilizing Management Information Base for Detecting Possible VLAN Hopping Attack<\/td><td class=\"column-3\">The International Conference on Engineering and Applied Sciences(TICEAS)<\/td><td class=\"column-4\">Bangkok, Thailand<\/td><td class=\"column-5\">2018<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n\t<td class=\"column-1\">Gibeom Song, Manhee Lee<\/td><td class=\"column-2\">Utilizing Emulab for Machine Learning Resource Pool<\/td><td class=\"column-3\">International Conference on Culture Technology(ICCT)<\/td><td class=\"column-4\">Tokyo, Japen<\/td><td class=\"column-5\">2017<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-14 even\">\n\t<td class=\"column-1\">Hanjae Yoon, Manhee Lee<\/td><td class=\"column-2\">TaintDroid\u2019s Ability Test and Remedy for Tainting SMS, Bookmark, Accelerometer and Call Log Information<\/td><td class=\"column-3\">International Conference on Innovative Research in Engineering and Science (IRES)<\/td><td class=\"column-4\">-<\/td><td class=\"column-5\">2017<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-15 odd\">\n\t<td class=\"column-1\">Hanjae Yoon, Manhee Lee<\/td><td class=\"column-2\">A Tip for Enabling Taint Analysis of Contact Information in TaintdDroid<\/td><td class=\"column-3\">International Conference on Cultural Technology (ICCT)<\/td><td class=\"column-4\">Pathum Thani, Thailand<\/td><td class=\"column-5\">2017<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-16 even\">\n\t<td class=\"column-1\">Daeboo Jeong, Hanjae Yoon, Manhee Lee<\/td><td class=\"column-2\">Randomness of Screen Captured Image for Diverting DroidBox<\/td><td class=\"column-3\">International Conference on Applied Mathmatics and Mechanics (ICAMM2016)<\/td><td class=\"column-4\">Bangkok, Thailand<\/td><td class=\"column-5\">2016<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-17 odd\">\n\t<td class=\"column-1\">Bogyu Jang, Yeongyeong Kim, Manhee Lee<\/td><td class=\"column-2\">SNMP-Based Management of Groundwater Management System<\/td><td class=\"column-3\">Higher Education Forum<\/td><td class=\"column-4\">HongKong<\/td><td class=\"column-5\">2015<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-18 even\">\n\t<td class=\"column-1\">Bogyu Jang, Yeongyeong Kim, Manhee Lee<\/td><td class=\"column-2\">Management Information Base Design for Secure Groundwater Management System<\/td><td class=\"column-3\">International Conference on Applied Mechanics and Mechatronics Engineering<\/td><td class=\"column-4\">Thailand<\/td><td class=\"column-5\">2015<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-19 odd\">\n\t<td class=\"column-1\">Yeongyeong Kim, Hanjae Yoon, Manhee Lee<\/td><td class=\"column-2\">Stealthy Information Leakage from Android Smartphone through Screenshot and OCR<\/td><td class=\"column-3\">International Conference on Chemical, Materialand Food Engineerging<\/td><td class=\"column-4\">China<\/td><td class=\"column-5\">2015<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-20 even\">\n\t<td class=\"column-1\">Manhee Lee, R. Jang, H. Seo<\/td><td class=\"column-2\">A Configurable Web-based Analytic Hierarchy Process System<\/td><td class=\"column-3\">The International Conference on Computers, Communications and Systems<\/td><td class=\"column-4\">Chiang Mai, Thailand<\/td><td class=\"column-5\">2012<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<tr class=\"row-21 odd\">\n\t<td class=\"column-1\">Baiksong An, Manhee Lee, Kihwan Yum, Eunjung Kim<\/td><td class=\"column-2\">Efficient Data Packet Compression for Cache Coherent Multiprocessor Systems<\/td><td class=\"column-3\">2012 Data Compression Conference<\/td><td class=\"column-4\">Utah, USA<\/td><td class=\"column-5\">2012.04.<\/td><td class=\"column-6\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6189244\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-22 even\">\n\t<td class=\"column-1\">Manhee Lee, Minseon Ahn, Eunjung Kim<\/td><td class=\"column-2\">I2SEMS: Interconnects-Independent Security Enhanced Shared Memory Multiprocessor Systems<\/td><td class=\"column-3\">16th International Conference on Parallel Architecture and Compilation Techniques (PACT 2007)<\/td><td class=\"column-4\">Brasov, Romania<\/td><td class=\"column-5\">2007.10.<\/td><td class=\"column-6\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4336203\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-23 odd\">\n\t<td class=\"column-1\">Manhee Lee, Eunjung Kim, Kihwan Yum, Mazin Yousif<\/td><td class=\"column-2\">An Overview on Security Issues in Cluster Interconnects<\/td><td class=\"column-3\">Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06)<\/td><td class=\"column-4\">Singapore, Singapore<\/td><td class=\"column-5\">2006.05.<\/td><td class=\"column-6\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1630920`\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-24 even\">\n\t<td class=\"column-1\">Manhee Lee, Eunjung Kim, Mazin Yousif<\/td><td class=\"column-2\">Security Enhancement in InfiniBand Architecture<\/td><td class=\"column-3\">The 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05)<\/td><td class=\"column-4\">Denver, Colorado, USA<\/td><td class=\"column-5\">2005.04.<\/td><td class=\"column-6\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1109\/IPDPS.2005.396\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-25 odd\">\n\t<td class=\"column-1\">Manhee Lee, Eunjung Kim, Kihwan Yum, Mazin Yousif<\/td><td class=\"column-2\">Instant attack stopper in InfiniBand architecture<\/td><td class=\"column-3\">IEEE International Symposium on Cluster Computing and the Grid, 2005.<\/td><td class=\"column-4\">Cardiff, Wales, UK<\/td><td class=\"column-5\">2005.05.<\/td><td class=\"column-6\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1558541\/\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-26 even\">\n\t<td class=\"column-1\">Manhee Lee, Eunjung Kim, Cheolwon Lee<\/td><td class=\"column-2\">A Source Identification Scheme against DDoS Attacks in Cluster Interconnects<\/td><td class=\"column-3\">Mobile and Wireless Networking\/High Performance Scientific, Engineering Computing\/Network Design and Architecture\/Optical Networks Control and Management\/Ad Hoc and Sensor Networks\/Compil<\/td><td class=\"column-4\">Montreal, QC, Canada<\/td><td class=\"column-5\">2004.08.<\/td><td class=\"column-6\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1328039\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-27 odd\">\n\t<td class=\"column-1\">ManHee Lee, Sangkil Jung, Yoonjoo Kwon, Kookhan Kim, Jeonghoon Moon, Okhwan Byeon<\/td><td class=\"column-2\">Spanning Tree Search Model to Traceback DDoS Attack Using Netflow<\/td><td class=\"column-3\">International Conference on Security and Management(SAM '03)<\/td><td class=\"column-4\">Las Vegas, Nevada, USA<\/td><td class=\"column-5\">2003.06.<\/td><td class=\"column-6\"><a href=\"https:\/\/www.researchgate.net\/publication\/221199603_Spanning_Tree_Search_Model_to_Traceback_DDoS_Attack_Using_Netflow\" rel=\"noopener noreferrer\" target=\"_blank\">LINK<\/a><\/td>\n<\/tr>\n<tr class=\"row-28 even\">\n\t<td class=\"column-1\">ManHee Lee, H.J.Choi, H.W.Park<\/td><td class=\"column-2\">A Study on Management Model of World Wide Web Server<\/td><td class=\"column-3\">The 13th International Conference on Information Networking<\/td><td class=\"column-4\">Jeju, South Korea<\/td><td class=\"column-5\">1999<\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-in_conf from cache -->\n","protected":false},"excerpt":{"rendered":"<p>International Journal International Conference &amp; Workshop<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/hpsclab.hannam.ac.kr\/main\/wp-json\/wp\/v2\/pages\/974"}],"collection":[{"href":"https:\/\/hpsclab.hannam.ac.kr\/main\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hpsclab.hannam.ac.kr\/main\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hpsclab.hannam.ac.kr\/main\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hpsclab.hannam.ac.kr\/main\/wp-json\/wp\/v2\/comments?post=974"}],"version-history":[{"count":1,"href":"https:\/\/hpsclab.hannam.ac.kr\/main\/wp-json\/wp\/v2\/pages\/974\/revisions"}],"predecessor-version":[{"id":5877,"href":"https:\/\/hpsclab.hannam.ac.kr\/main\/wp-json\/wp\/v2\/pages\/974\/revisions\/5877"}],"wp:attachment":[{"href":"https:\/\/hpsclab.hannam.ac.kr\/main\/wp-json\/wp\/v2\/media?parent=974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}