| TLS 1.3 in practice: How TLS 1.3 contributes to the internet H Lee, D Kim, Y Kwon Proceedings of the Web Conference 2021, 70-79, 2021 | 76 | 2021 |
| maTLS: How to Make TLS middlebox-aware? H Lee, Z Smith, J Lim, G Choi, S Chun, T Chung, TT Kwon The Network and Distributed System Security (NDSS) conference, 2019 | 59 | 2019 |
| Position estimation of robotic mobile nodes in wireless testbed using GENI A Abdelhadi, F Rechia, A Narayanan, T Teixeira, R Lent, D Benhaddou, ... 2016 Annual IEEE Systems Conference (SysCon), 1-6, 2016 | 34 | 2016 |
| AppSniffer: Towards robust mobile app fingerprinting against VPN S Oh, M Lee, H Lee, E Bertino, H Kim Proceedings of the ACM Web Conference 2023, 2318-2328, 2023 | 33 | 2023 |
| Sharing cyber threat intelligence: Does it really help? B Jin, E Kim, H Lee, E Bertino, D Kim, H Kim Proceedings of the 31st Annual Network and Distributed System Security …, 2024 | 29 | 2024 |
| A preliminary study on disaster waste detection and volume estimation based on 3D spatial information HT Yoo, H Lee, S Chi, BG Hwang, J Kim Computing in Civil Engineering 2017, 428-435, 2017 | 23 | 2017 |
| MQTLS: Toward secure MQTT communication with an untrusted broker H Lee, J Lim 2019 International Conference on Information and Communication Technology …, 2019 | 19 | 2019 |
| ICN-OMF: A control, management framework for Information-Centric Network testbed L Hyunwoo, D Kim, J Suh, T Taekyoung 2015 International Conference on Information Networking (ICOIN), 416-417, 2015 | 11 | 2015 |
| Vwanalyzer: A systematic security analysis framework for the voice over wifi protocol H Lee, I Karim, N Li, E Bertino Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 10 | 2022 |
| D2TLS: delegation-based DTLS for cloud-based IoT services E Cho, M Park, H Lee, J Choi, TT Kwon Proceedings of the International Conference on Internet of Things Design and …, 2019 | 10 | 2019 |
| How to decentralize the internet: A focus on data consolidation and user privacy J Song, H Jung, S Chun, H Lee, M Kang, M Park, E Cho Computer Networks 234, 109911, 2023 | 9 | 2023 |
| An infection-identifying and self-evolving system for IoT early defense from multi-step attacks H Lee, A Mudgerikar, A Kundu, N Li, E Bertino European Symposium on Research in Computer Security, 549-568, 2022 | 9 | 2022 |
| Towards efficient privacy-preserving deep packet inspection W Wang, H Lee, Y Huang, E Bertino, N Li European Symposium on Research in Computer Security, 166-192, 2023 | 8 | 2023 |
| Machine Learning Techniques for Cybersecurity E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Springer, 2023 | 8 | 2023 |
| Analyzing spatial differences in the TLS security of delegated web services J Lee, H Lee, J Jeong, D Kim, TT Kwon Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 7 | 2021 |
| A pro-active defense framework for IoT systems E Bertino, H Lee, M Huang, C Katsis, Z Shen, B Ribeiro, D De Mello, ... 2023 IEEE 9th International Conference on Collaboration and Internet …, 2023 | 6 | 2023 |
| Ariotedef: Adversarially robust iot early defense system based on self-evolution against multi-step attacks M Huang, H Lee, A Kundu, X Chen, A Mudgerikar, N Li, E Bertino ACM Transactions on Internet of Things 5 (3), 1-34, 2024 | 5 | 2024 |
| Ztls: A dns-based approach to zero round trip delay in tls handshake S Lim, H Lee, H Kim, H Lee, T Kwon Proceedings of the ACM Web Conference 2023, 2360-2370, 2023 | 5 | 2023 |
| Enabling sdn experimentation with wired and wireless resources: The smartfire facility K Choumas, T Korakis, H Lee, D Kim, J Suh, TT Kwon, P Martinez-Julia, ... International Conference on Cloud Computing, 280-290, 2015 | 3 | 2015 |
| RAON: A recursive abstraction of SDN control-plane for large-scale production networks M Kwak, H Lee, J Shin, J Suh, T Taekyoung 2015 International Conference on Information Networking (ICOIN), 426-427, 2015 | 2 | 2015 |