- 장소 : 메종글래드제주
DAY 1 August 20 (WED)
TIme |
Crystal Hall (2F) |
12:00~13:00 |
Registration |
13:00~13:10 |
Opening Remarks |
13:10~13:50 |
Keynote1: Cloud Computing Security: Challenging Issues and Future Directions Prof. Willy Susilo (University of Wollongong) |
13:50~14:00 |
Coffee Break |
14:00~14:20 |
Session 1 (System & Application Security) |
Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV ( Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo) |
|
14:20~14:40 |
PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes ( Yiju Jung, Hyerean Jang and Youngjoo Shin) |
14:40~15:00 |
GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection ( Hyeong Seon Kim and Huy Kang Kim) |
15:00~15:20 |
Break Time |
15:20~16:00 |
Invtied Talk1: Overlaying Crypto Agility onto the N2SF in the Cloud Era Dr. Jihoon Cho (Vice President, Samsung SDS) |
16:00~16:10 |
Coffee Break |
16:10~16:30 |
Session 2 (5G & Network Security) |
A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems (Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo) |
|
16:30~16:50 |
Toward a Stealth Mode of 5G-AKA ( Seonghan Shin) |
16:50~17:10 |
Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms ( Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim) |
17:10~17:20 |
Coffee Break |
17:20~17:40 |
Session 3 (Cybersecurity Education & Model Security) |
Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance ( Yuki Tanaka and Mamoru Mimura) |
|
17:40~18:00 |
TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source (Young Han Choi and Ki Tae Park) |
DAY 2 August 21 (THU)
Time |
Crystal Hall |
Jade Hall |
09:30~09:50 |
Session 4 (Security Analysis & Verification) |
Session 5 (Malware & Forensics) |
Impossible Differential Attack on SAND-64 (Nobuyuki Sugio) |
User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations ( Minjung Yoo, Seunghyun Park and Seongmin Kim) |
|
09:50~10:10 |
Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger ( Kakeru Watanabe and Kazuki Yoneyama) |
Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses ( Geon Woo Jeon and Ji Won Yoon) |
10:10~10:30 |
Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs (Jeongho Lee and Seyoung Lee) |
Interaction-Aware System Call Sequence Analysis for Android Malware Classification ( Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park) |
10:30~10:50 |
Break Time |
|
10:50~11:30 |
Keynote2: Security in the Age of AI Dr. Wolfgang Richter (Director of Engineering, Soroco Co.Ltd) |
|
11:30~11:50 |
Break Time |
|
11:50~12:30 |
Invtied Talk2: Digital Trust in the AI Era: Navigating the New Cybersecurity Landscape Hosuk Lee (CISO of AWS Korea) |
|
12:30~14:00 |
Lunch Time |
|
14:00~14:20 |
KIISC Board Meeting |
Research Story |
KIISC Board Meeting |
From Page to Stage: Returning to Top Security Venue (Taekyoung Kwon, Yonsei University) |
|
14:20~14:40 |
Recommendations for Writing Research Papers in Security Area ( DaeHun Nyang, Ewha Womans University) |
|
14:40~15:00 |
Lesson: Simple Is Always Best (Hyunwoo Lee, Korea Institute of Energy Technology (KENTECH)) |
|
15:00~16:00 |
KIISC Board Meeting |
Poster Session |
KIISC Board Meeting |
Poster Session 1 |
|
16:00~17:00 |
Poster Session 2 |
|
17:00~18:00 |
Poster Session 3 |
|
18:00~18:30 |
Break Time |
|
18:30~End |
Banquet (Convention Hall, 1F) |
DAY 3 August 22 (FRI)
Time |
Crystal Hall |
Jade Hall |
Ruby Hall |
09:30~09:50 |
Session 6 (Quantum & Cryptography) |
Session 7 (AI/LLM for Security) |
No Session |
Depth-Optimized Quantum Implementation of CHAM ( Kyoungbae Jang, Yujin Oh and Hwajeong Seo) |
Detecting Malicious JavaScript Code by Code-Specialized LLM ( Keiichi Kinoshita and Mamoru Mimura) |
||
09:50~10:10 |
Quantum Implementation and Analysis of SHA-1 ( Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo) |
A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models ( Hyungkwan Kim, Hyunggyu Lee and Wook Shin) |
|
10:10~10:30 |
PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions ( Hyungrok Jo and Junji Shikata) |
Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework (Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin) |
|
10:30~10:50 |
Break Time |
||
10:50~11:10 |
Session 8 (Privacy & Anonymity) |
Session 9 (IoT & Traffic Analysis) |
|
Towards Sender Anonymity for Singleton Sets ( Yamya Reiki and Yudhveer Singh ) |
IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries ( Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan) |
||
11:10~11:30 |
LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models ( A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon) |
Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures ( Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka) |
|
11:30~11:50 |
Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach ( Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee) |
Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD ( Seong Bean Park and Hyun Min Song) |
|
11:50~13:20 |
Lunch Time |
||
13:20~13:35 |
No Session |
Session 10 (Poster paper Oral Session1) |
|
Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer (Min Jeong Kang, Jung Hoon Lee and Il-Gu Lee) |
|||
13:35~13:50 |
Towards Symbolic Formalization of PoW Integrity in Blockchain (Kengo Matsui and Shigeki Hagihara) |
||
13:50~14:05 |
Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications (Seung-ha Jee, Yu-ran Jeon and Il-Gu Lee) |
||
14:05~14:20 |
Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content (Seo-Yi Kim, Na-Eun Park and Il-Gu Lee) |
||
14:20~14:35 |
Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames (Dongphil Kim) |
||
14:35~14:50 |
Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System (Ga-Yeong Kim, Na-Eun Park and Il-Gu Lee) |
||
14:50~15:00 |
Break Time |
||
15:00~15:15 |
No Session |
Session 11 (Poster paper Oral Session2) |
|
A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification (Ye-Hyeon Ahn, Sun-Jin Lee and Il-Gu Lee) |
|||
15:15~15:30 |
Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things (Chae Yeon Park, So Eun Jeon and Il-Gu Lee) |
||
15:30~15:45 |
Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah (Na-Hyun Kim, Sungbin Moon, Yewon Hwang, Seungho Jung, Seong-Cheon Park and Youngjae Lee) |
||
15:45~16:00 |
Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense (Ye-Rim Jeong, Yeon-Jin Kim, Chae-Yeon Park and Il-Gu Lee) |
||
16:00~16:15 |
Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping (Sukyoung Kim, Soyeon Kim and Ilgu Lee) |
Paper Session
Paper Number |
Authors |
Title |
2 |
Nobuyuki Sugio |
Impossible Differential Attack on SAND-64 |
3 |
Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim |
Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms |
6 |
Yiju Jung, Hyerean Jang and Youngjoo Shin |
PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes |
17 |
Kyoungbae Jang, Yujin Oh and Hwajeong Seo |
Depth-Optimized Quantum Implementation of CHAM |
18 |
Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan |
IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries |
19 |
Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo |
Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV |
21 |
Yamya Reiki and Yudhveer Singh |
Towards Sender Anonymity for Singleton Sets |
22 |
Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka |
Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures |
24 |
Yuki Tanaka and Mamoru Mimura |
Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance |
25 |
Kakeru Watanabe and Kazuki Yoneyama |
Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger |
28 |
Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo |
Quantum Implementation and Analysis of SHA-1 |
29 |
Young Han Choi and Ki Tae Park |
TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-source |
32 |
Hyeong Seon Kim and Huy Kang Kim |
GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection |
33 |
A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon |
LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models |
34 |
Keiichi Kinoshita and Mamoru Mimura |
Detecting Malicious JavaScript Code by Code-Specialized LLM |
41 |
Minjung Yoo, Seunghyun Park and Seongmin Kim |
User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations |
46 |
Jeongho Lee and Seyoung Lee |
Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs |
47 |
Geon Woo Jeon and Ji Won Yoon |
Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses |
51 |
Hyungkwan Kim, Hyunggyu Lee and Wook Shin |
A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models |
54 |
Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park |
Interaction-Aware System Call Sequence Analysis for Android Malware Classificatio |
59 |
Seong Bean Park and Hyun Min Song |
Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD |
60 |
Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee |
Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach |
64 |
Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo |
A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems |
66 |
Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin |
Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework |
67 |
Hyungrok Jo and Junji Shikata |
PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions |
69 |
Seonghan Shin |
Toward a Stealth Mode of 5G-AKA |
Poster Session
Poster Session 1
|
Authors |
Title |
So-Eun Jeon, Jung Hoon Lee and Il-Gu Lee |
Smart Jamming with User Data: Redefining Wireless Secrecy in Multi-AP Networks |
|
Sobirova Khusnora Bakhtiyor Kizi, Cho Nwe Zin Latt and Kyung Hyune Rhee |
A Hybrid Sensitive Data Detection Framework for Structured Enterprise Data with Extension to Unstructured Text |
|
Sayeon Kim, Olmi Lee and Woohyun Jang |
Executable Protection via TPM-Sealed Key Unsealing and Memory-Only Execution in Embedded Systems |
|
Su Jin Shin, Siwan Noh and Sang Uk Shin |
BNPKM: Biometric Non-stored Private Key Management |
|
Chanhee Han, Kyeongseok Lee and Homook Cho |
DisTORbution Crawler: Active Tor Configuration for Efficient Dark Web Crawling |
|
So Yeon Kim, Dong Woo Lee, Seong Hyun Min, Jung Hun Lim, Ma Il Jo, In Jae Kim, Ja Sil Choi, Min Ho Jung, Seong Eun Park and Won Gyum Kim |
Context-Aware and Attention-Driven Deepfake Detection via Enhanced Residual Architectures |
|
Seoyun Kang, Jeongeun Ryu, Yumin Lee, Jueun Son and Seongmin Kim |
Empirical Study on Consistency of LLM-Based Policy as Code Generation for Network Policies |
|
Yumin Lee, Jeongeun Ryu Ryu, Seoyun Kang, Jueun Son and Seongmin Kim |
Exploring Prompt Strategy of LLM-based PaC Generation in Kubernetes Environment |
|
Junghyun Mok and Sokjoon Lee |
A Zero Trust Based Framework for xApp Access Control in O-RAN |
|
Juhyeon Lee, Il Whan Ji and Jung Taek Seo |
A Reinforcement Learning-Based Model for Multi-Step Attack Sequence Prediction in Industrial Control Systems |
|
Dong-Kwon Jung and Woong-Sik Kim |
Forecasting Stock Prices in the Korean Market Using News Sentiment |
|
Kyu-Hyun Kang, Jae Yoon Kim, Nam-Su Jho and Taek-Young Yoon |
Quantum-Secure Timestamp for the Integrity of Classical Signatures in Quantum Transition |
|
Donghwan Lee, Hojune Shin and Younho Lee |
Homomorphic Stationarity Testing using CKKS for Outsourced Time-series Data Analysis |
|
Sehwa Ko, Kyeongmin Lee, Eunse Kang and Junyoung Son |
FingerRatchet: A Lightweight Anonymous P2P Protocol with Out-of-Band Fingerprint Exchange |
|
I Wayan Adi Juliawan Pawana, Hoseok Kwon, Bonam Kim and Ilsun You |
Enhancing Private 5G Networks for IIoT: EAP-AKA’ Implementation in Open5GS |
|
Selynn Kim, Taehun Kim and Youngjoo Shin |
A Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation Units |
|
Sun-Jin Lee and Il-Gu Lee |
Privacy-Preserving GAN-Based Data Augmentation for Intrusion Detection Without Accuracy Degradation |
|
Yu-Na Kim, Yeon-Jin Kim and Il-Gu Lee |
Optimizing Synthetic-to-Original Data Ratio for Reliable Model Training |
|
Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo |
UGVScan: Automated Tool for Multi-layer Rule Profiling on ROS 2-based UGV platforms |
|
Kihoon Kim, Dongyeop Kim, Taeuk Ha and Jinsoo Jang |
Recent Trends in Space Cybersecurity: Attack and Defense |
|
Hye-eun Son and Hyoseung Kim |
AnonC2PA: C2PA-based Anonymous Proof of Content Authenticity |
|
Da-hyung Kim, Jeong-hwa Ryu, Su-bin Lee and Seong-min Kim |
Comparative Analysis of HTML Structure Between Legal and Illegal Streaming Websites |
|
Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo |
NMEA Under Siege: Dynamic Flooding Attacks and Defenses |
|
Poster Session 2
|
Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo |
Visual Tampering in S-52: Threats and Protections |
Jueon Choi, Gunjin Cha, Misoo Kim, Ieck-Chae Eum and Kwanghoon Choi |
A Method for Selecting Security Checklist Items Associated with Incidents by Analyzing Security Incident Reports and Vulnerability Checklists Using LLM |
|
Kiyeon Kim, Minyoung Choi, Jumi Kim, Eunjin Kim and Gibum Kim |
A Study on the Analysis and Improvement of Web-Based DRM Bypass Techniques for OTT Content Protection |
|
Yong Heon Lim, Jong Chan Seo and Hae Young Lee |
PCFG-Based Framework for Cracking Korean Users’ Passwords |
|
Heechan Kim, Jaehyun Kim, Kyungyun Lee and Junyoung Son |
Blockchain-Assisted Explainable AI Framework for Accountability in Autonomous Driving Systems |
|
Yujeong Seo and Hyunwoo Lee |
PHANTOM: Predictive Security Policy Orchestration for Detecting Multi-stage Stealthy Attacks |
|
Seokjae Gwon, Gyeonghoe Kim and Seyoung Lee |
Evaluating Domain-Specific Hallucinations in LLMs Triggered by Jeju Dialect Inputs |
|
Seokjae Gwon, Esther Kim, Huijin Lim, Nahyun Kim and Seyoung Lee |
Design and Implementation of a Security Vulnerability Practice Testbed in Agentic LLM Environments |
|
Gunseung Jin, Minseo Park and Jinsoo Jang |
Forensic Analysis of Mattermost Server |
|
Hyunjin Jang, Jiwon Yun, Yeonjeong Hwang, Morsheda Akter, Howon Kim and Junyoung Son |
Multi-class Attack Detection in CAN Networks using Lightweight 1D CNN |
|
Wibby Aldryani Astuti Praditasari, Hyejin Yoon, Hyeongyeop Kim and Okyeon Yi |
Quantum-Rekeyed Privacy for AI-Powered Financial Assistants |
|
Adi Panca Saputra Iskandar, Yongho Ko, Bonam Kim and Ilsun You |
Blockchain-Assisted Handover Authentication: A Lightweight and Scalable Approach for 5G |
|
Se-Ok Jeon, Seokhwi Kim and Kwanghoon Choi |
Analyzing the Limitations of CVE‑Based Source‑Code Vulnerability Slice Extraction |
|
Hyunji Cho, Jiyeon Yang, Woojin Im and Jinsoo Jang |
Forensic Analysis of Siri on iOS |
|
Sooin Kim, Seonghyun Min, Limjung Hoon, Jiyoung Shin and Wongyum Kim |
Enhancing Face Forgery Detection through Dual-branch Transformer and contrastive pretraining |
|
Yunsung Kim, Gyeongdeok An, Sangwon Lee and Jaecheol Ha |
CNN-based Trace Interval Detection for Fault Injection Point Identification on DNN Models |
|
Yoonjung Cho, Jeongwoo Lee, Baikjin Jung and Heejo Lee |
Poster: Enhancing Vulnerability Fix Commit Identification via Data Augmentation with Security Unrelated Commits |
|
Kyeongseok Yang, Sungyu Kim, Jeongwoo Lee, Yoongjong Na, Duyeong Kim and Heejo Lee |
Poster: HatBOM, An Automated Analysis Platform for SBOM and VEX Generation |
|
Yeonhee Kim, Soona Lee and Jongkil Kim |
On-Device RAG System with Role-Based Document Access Control: A PropertyGPT-Based Approach |
|
Dongjun Choi and Jungtaek Seo |
A Quantitative Assessment Framework for Cyber Incident Response Exercises in Nuclear Facilities |
|
Yoonsun Han, Mingi Kim, Chearin Kim and Seog Chung Seo |
Isogeny Based Quantum Secure Bootstrapping Against Fake Base Stations in 6G Networks |
|
Shin Dawit, Cho Jaehan, Son Junyoung and Kim Howon |
Quantum Machine Learning for Intrusion Detection: Analyzing QSVM on CIC-IDS2017 |
|
Mingi Kim, Yoonsun Han, Chaerin Kim and Seog Chung Seo |
A New DPKI_Based Model for Certificate Validation against FBS Attacks |
|
Poster Session 3
|
Chaerin Kim, Yoonsun Han, Mingi Kim and Seog Chung Seo |
Post Quantum Cryptography Migration for IoT–NTN Communications in 6G Networks |
Heeyeong Suh, Nayeon Ryu and Seyoung Lee |
Speak One, Leak All? Exploiting Multilingual LLMs via Monolingual Mode |
|
Gyeongdeok An, Yunsung Kim, Sangwon Lee and Jaecheol Ha |
Slope-based Sum of Absolute Differences (S-SAD) Method for Improving Pattern-matching Accuracy on Side-Channel Signal |
|
Jung Kyu Seo, Ju Hyeon Lee and Jung Taek Seo |
A Survey on AI-Based Anomaly Detection Using TypeSpecific Datasets in Industrial Control Systems |
|
Chae-wan Hong, Seung-ha Jee and Il-Gu Lee |
Feature Selection Optimization Based on Data Characteristics for Ransomware Detection |
|
Nayeon Ryu, Heeyeong Suh and Seyoung Lee |
Choices Beneath the Surface : How Dark Patterns Operate in Kiosk Interfaces Across Countries |
|
Min-ji Cho, So-Eun Jeon and Il-gu Lee |
Cooperative Machine Learning Framework for Efficient Detection of Wireless Availability Attacks in Internet of Things Networks |
|
Hyobeen Cho, Namryeong Kim, Sunwoo Jeong and Ilgu Lee |
Enhancing DeFi Smart Contract Security via LangChain and Retrieval-Augmented Generation |
|
Suji Park, Yeon-Ji Lee and Il-Gu Lee |
A Revocable Multimodal EEG Authentication Paradigm Using P300 Responses |
|
Yeonwoo Lee, Yeonji Lee and Ilgu Lee |
Improving Decision Accuracy in Multi-Sensor-Based Machine Learning Systems through Drift-Resilient Contribution Analysis |
|
Suyeong Kim, Hyeyeon Shim and Ilgu Lee |
An Analysis of the Impact of Dataset Preprocessing on the Performance of Homomorphic Encryption-Based Machine Learning |
|
Chanhyuk Kim, Changuk Jang and Okyeon Yi |
Design of a Web-Based Verification Tool for Ensuring the Reliability of PQC Algorithm Implementations |
|
Da-eun Yu, Seung-ha Jee and Il-Gu Lee |
Integrated Detection and Response Framework for DDoS and Ransomware Attacks |
|
Gyuha Son, Seo-Yi Kim and Il-Gu Lee |
Lightweight Anomaly Detection for Internet of Things: Integrating Feature Selection and Dimensionality Reduction |
|
Chaewon Song, Hyeyeon Shim and Ilgu Lee |
Privacy-Preserving Grid-Based Clustering of Medical Data Using Homommorphic Encryption |
|
Jungjoo Oh and Il-Gu Lee |
An Integrated Privacy Decision-Making Model for Multi-Factor Authentication Adoption |
|
Mi-Yeon Kim, Sang-Hoon Choi and Ki-Woong Park |
Revealing Hidden Contention through Disk I/O Analysis in Multi-Tenant Containers |
|
Hyeran Jung, Yeonsu Jeong, Seonwoo Lee and Taejin Lee |
Feedback-Driven False Alarm Detection for Network Attacks |
|
So-Yeon Kim and Il-Gu Lee |
A Multi-Link Selective Access Control Framework for Secure and Reliable IoT Communications |
|
Ye-Sin Kim, Jin-Min Lee and Il-Gu Lee |
An Interference-Aware Channel Selection Algorithm for Secure and Reliable Multi-Link Operation |
|
Hyein Lee, Hyunche Song and Il-Gu Lee |
Privacy at Risk: Evaluating Data Protection Practices in South Korea’s Leading Digital Mental Health Apps |
|
Jung-Min Moon, Na-Eun Park and Il-Gu Lee |
Wireless Channel Delay Spread-Based Dynamic Guard Interval Adjustment and Secondary Data Transmission Technique |
|
Jin-Min Lee, Hye-Yeon Shim and Il-Gu Lee |
OBSS Interference Management via Distributed ML-based Joint TX Power and RX Sensitivity Control |
Online Attendance
|
Student
|
350 USD
|
General Participants
|
||
Offline Attendance
|
Student
|
350 USD
|
Offline Attendance General Participants
|
500 USD
|
온라인 참가
|
학생(전일제)/일반
|
250,000 원
|
오프라인 참가
|
학생(전일제)
|
500,000 원
|
군•공무원
|
500,000 원
|
|
일반
|
700,000 원
|
|
시니어(63세 이상) 종신회원
|
무료
|
0원
|