๊ตญ์™ธ ์ „๋ฌธํ•™์ˆ ์ง€

    J. Moon, H. Bea, J. Song, and S. Choi. “Algorithmic methods of reference-line construction for estimating long-term strength of plastic pipe system.” POLYMER TESTING-LONDON-(SCI), Sep. 2016.
    E. Kim and J. Moon. “A new approach to deploying private mobile network exploits.” The Journal of Supercomputing(SCI), Jan. 2016.
    S. Kim, S. Ma, and J. Moon. โ€œA novel secure architecture of the virtualized server system.โ€ JOURNAL OF SUPERCOMPUTING, 2015.
    I. Kim, J. Seo, T. Shon, and J. Moon. โ€œA novel approach to detection of mobile rogue access points.โ€ SECURITY AND COMMUNICATION NETWORKS(SCI), Oct. 2014.
    T. Shon, J. Cho, K. Han, and H. Choi. “Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction.” MONET, vol.19, Issue 3, pp.404-413, Aug. 2014.
    J. Ji, D. Han, S. Jung, S. Lee, and J. Moon. โ€œPractical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards.โ€ INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS(SCI), Mar. 2014.
    J. Choi, J. Seo, T. Shon, J. Cho, and J. Moon. โ€œSimple secure RFID and reader communication schematic for smart meter network.โ€ INFORMATION (JAPAN)(SCOPUS), Jul. 2013.
    J. Cho, T. Shon, K. Choi, and J. Moon. โ€œDynamic learning model update of hybrid-classifiers for intrusion detection.โ€ JOURNAL OF SUPERCOMPUTING(SCI), May. 2013.
    J. Cho, K. Choi, T. Shon, and J. Moon. โ€œPower dissipation and area comparison of 512-bit and 1024-bit key AES.โ€ COMPUTERS MATHEMATICS WITH APPLICATIONS(SCI), May. 2013.
    J. Cho, H. Lee, K. Choi, and J. Moon. โ€œVisualization of abnormal behavior detection using parallel coordinate and correspondence analysis.โ€ INFORMATION (JAPAN)(SCIE), Mar. 2013.
    M. Chung, Y. Lee, T. Shon, and J. Moon. โ€œA security model for IPTV with one-time password and Conditional Access System for smart mobile platform.โ€ TELECOMMUNICATION SYSTEMS(SCIE), Feb. 2013.
    J. Lee, J. Cho, J. Seo, T. Shon, and D. Won. โ€œA Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.โ€ MONET,vol.18, Issue 1, pp.122-128, Feb. 2013.
    G. Lee, O. Lee, S. Park, J. Moon, and C. Oh. โ€œQuantitative color assessment of dermoscopy images using perceptible color regions.โ€ SKIN RESEARCH AND TECHNOLOGY(SCI), Nov. 2012.
    H. Oh, J. Seo, J. Lim, and J. Moon. โ€œA Method of Detecting Abnormal Malicious Remote Control Codes using Network Domain Information.โ€ INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL(SCIE), May. 2012.
    I. Lee, S. Jeong, S. Yeo, and J. Moon. โ€œA Novel Method for SQL Injection Attack Detection Based on Removing SQL Query Attribute Values.โ€ MATHEMATICAL AND COMPUTER MODELLING(SCIE), vol.55, pp.258-68, Issues 1-2, Jan. 2012.
    H. Kim, S. Lim, J. Moon, B. Kim, and E. Jung. โ€œA photographic forensic case study: Myths.โ€ principles and techniques, Mathematical and Computer Modelling, vol.55, Issues 1-2, pp.3-11, Jan. 2012.
    J. Cho, J. Lee, J. Seo, and T. Shon. โ€œA Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.โ€ IEEE, pp.573-577, Oct. 2011.
    J. Cho, K. Choi, T. Shon, and J. Moon. โ€œA Network Data Abstraction Method for Data Set Verification.โ€ Secure and Trust Computing(SCIE), vol.186, pp.54-62, Jun. 2011.
    H. Shin, M. Chung, and J. Moon. โ€œA distributed and Dynamic System for Detecting Malware.โ€ The 25th IEEE International Conference on Advanced Information Networking and Applications, Mar. 2011.
    J. Cho, T. Shon, K. Choi, J. Seo, and J. Moon. โ€œSimple Security Protocols based on EPC Global Generation 2.โ€ An International Interdisciplinary Journal, INT INFORMATION INST(SCIE), 2012.
    J. Cho, M. Chung, K. Choi, Y. Lee, and J. Moon. โ€œEnhanced Security Protocols for EPC Global Gen2 on Smart Grid Network.โ€ 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and App, 2010.
    S. Pyo, Christian Tischler, S. Choi, and J. Moon. โ€œOn-set slow cracking time detection for the Notched Ring Test.โ€ POLYMER TESTING(SCI), Jun. 2010.
    J. Cho, C. Lee, S. Cho, J. Song, J. Lim, and J. Moon. โ€œA statistical model for network data analysis: KDD CUP 99′ data evaluation and its comparing with MIT Lincoln Laboratory network data.โ€ SIMULATION MODELLING PRACTICE AND THEORY, vol.18, Issue 4, Apr. 2010.
    S. Lee, S. Jeong, S. Yeo, and J. Moon. โ€œA Novel Method for SQL Injection Attack Detection Based on Removing SQL Query.โ€ The 2010 FTRA World Convergence Conference, 2010.
    J. Cho, H. Lee, K. Choi, and J. Moon. โ€œVisualization of Abnormal Behavior Detection using Parallel Coordinate and Correspondence Analysis.โ€ The 2010 FTRA World Convergence Conference, 2010.
    J. Chung and Y. Lee. โ€œA Security Model for IPTV with One-Time Password and Conditional Access System for Smart Mobile Platforms.โ€ WCC 2010 FTRA World Convergence Conference, 2010.
    I. Kim, I. Lee, J. Cho, and J. Moon. โ€œVisualization of Network Components for Attack Analysisโ€, IEEE Symposium Series on Computational Intelligence 2009, 2009
    S. Kwon, S. Bae, J. Cho, and J. Moon. โ€œStudy of Fuzzy Clustering Methods for Malicious Codes Using Native API Call Frequency.โ€ IEEE Symposium Series on Computational Intelligence, 2009.
    M. Chung, J. Cho, and J. Moon. โ€œAn Effective Denial of Service Detection Method using Kernel Based Data.โ€ IEEE Symposium Series on Computational Intelligence, 2009.
    J. Cho, M. Chung, and J. Moon. โ€œA Kernel Data Analysis Method for Detecting Flood Attacks.โ€ Journal of Information Assurance and Security, 2009.
    J. Cho, C. Lee, S. Cho, H. Jung, J. Lim, and J. Moon. โ€œA Statistical Model for Network Data Analysis : KDD CUP 99′ Data Evaluation and its Comparing with MIT Lincoln Laboratory Network Data.โ€ Simulation Modelling Practice and Theory, vol.18, Issue 4, pp.431-435, Apr. 2010.
    H. Oh, S. Kang, J. Seo, I. Lee, and J. Moon. โ€œStudy on a Safe and Efficient mOTP(mobile-OTP) Authentication Mechanism for the Mobile Environment.โ€ Journal of Internet Technology, 2009.
    S. Chae, H. Lee, J. Cho, M. Jung, J. Lim, and J. Moon. โ€œA Regression Method to compare Network Data and Modeling Data using Generalized Additive Model.โ€ Lecture Notes in Computer Science, 2008.
    I. Kim, J. Cho, J. Moon, and J. Lim. โ€œA Bayesian Approach to Universal Language E-mail Analysis.โ€ The 3rd International Joint Workshop on Information Security and Its Applications, 2008.
    M. Lee, T. Shon, K. Cho, M. Chung, J. Seo, and J. Moon. โ€œAn approach for classifying worms based on temporal behavior and worm packet flows.โ€ Lecture Notes In Computer Science, pp.646-655, 2007.
    K. Cho, J. Lee, J. Lim, and J. Moon. โ€œVerification Method of Network Simulation for Pervasive Environments.โ€ 2007 Third International conference on Security and Privacy in Communication Networks and the Workshops, 2007.
    T. Shon and J. Moon. โ€œA hybrid machine learning approach to network anomaly detection.โ€ Information Sciences, 2007.
    J. Seo, Y. Kim, E. Park, S. Lee, T. Shon, and J. Moon. “Design and implementation of a patch management system to remove security vulnerability in multi-platforms.” LNAI 4223, pp.716-724, 2006.
    T. Shon, Xeno Kovah, and J. Moon. “Applying genetic algorithm for classifying anomalous TCP/IP packets.” Neurocomputing, 2006.
    J. Seo, Y. Kim, T. Shon, and J. Moon. “Design of a Centralized Security Patch Management System.” International Workshop on Security Engineering and Information Technology on High Performance Network, 2006.
    J. Cho, S. Cho, and J. Moon. “Sampling the Smallest Network Packet Dataset for Efficient Intrusion Detection.” European Conference on Computer Network Defence, 2005.
    J. Seo, c. Lee, T. Shon, K. Cho, and J. Moon. “A New DDoS Detection Model using Multiple SVMs and TRA.” LNCS, SecUbiq 2005, pp.976-985, 2005.
    J. Seo, C. Lee, J. Kim, T. Shon, and J. Moon. “PPF Model with CTNT to Defend Web Server from DDoS Attack.” LNCS, SecUbiq 2005, 2005.
    J. Seo, C. Lee, T. Shon, and J. Moon. “SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing.” LNCS, GCC 2005, 2005.
    J. Seo, C. Lee, J. Kim, T. Shon, and J. Moon. “Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks.” Lecture Notes in Computer Science, 2005.
    T. Shon, J. Seo, and J. Moon. “SVM Approach with a Genetic Algorithm for Network Intrusion Detection.” LNCS, ISCIS 2005, 2005.
    J. Seo, C. Lee, T. Shon, and J. Moon. “A New Approach to Detect DDoS Attacks using Support Vector Machine.” The 20th International Symposium on Computer and Information Sciences, 2005.
    J. Kim, J. Cho, and J. Moon. “Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection.” Lecture Notes in Computer Science, 2005.
    T. Shon, Y. Kim, C. Lee, and J. Moon. “A Machine Learning Framework for Network Anomaly Detection using SVM and GA.” The 6th IEEE Information Assurance Workshop(IAW), 2005.
    J. Seo, C. Lee, T. Shon, and J. Moon. “SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing.” LNCS, GCC 2005, 2005.
    S. Son, S. Park, G. Park, M. Kim, J. Moon, and C. Oh. “Objective evaluation for severity of atopic dermatitis by morphologic study of skin surface contours.” Skin Research and Technology 2005, 2005.
    S. Park, S. Ha, D. Yu, S. Son, D. Kim, I. Kim, J. Moon, M. Kim, and C. Oh. “Quantitatave Evaluation of Severity in Psoriatic lesions using three-dimensional morphometry.” Experimental Dermatology, 2004.
    M. Kim, S. Park, S. Ha, and C. Oh. “Objective Interpretation of severity of SLS induced edima by stereoimaging.” Journal of Dermatogical Science, 2004.
    J. Seo, C. Lee, and J. Moon. “Depending DDos Attacks using Network Traffic Analysis and Probabilistic Packet Drop.” Lecture Note on Computer Science 3252, 2004.
    T. Sohn, J. Seo, and J. Moon. “Simple Key Agreement and its Efficient Analysis for Grid Computing Environments.” Lecture Note on Computer Science 3251, 2004.
    J. Moon, T. Shon, J. Seo, J. Kim, and J. Seo. “An approach for Spam E-mail detection with Support Vector Machine and N-Gram Indexing.” Lecture Note on Computer Science 3280, 2004.
    T. Shon, J. Moon, adn H. Choi. “Efficiency Evaluation for Key Distribution Models in Satellite Terminals.” Lecture Note on Computer Science 3283, 2004.
    J. Seo, D. Choi, E. Park, T. Shon, and J. Moon. “patch management System for Multi-platform Environment.” Lecture Note on Computer Science, 3320, 2004.
    J. Yune, S. Park, H. Oh, D. Kim, D. You, I. Kim, J. Moon, M. Kim and C. Oh. “Objective Assessment of Involved surface area in patient with psoriasis.” Skin and Research and Technology, 2003.
    S. Lee, E. Im, J. Sohn, T. Sohn, J. Moon, and D. Kim. “A Secure Patch Distribution Architecture.” Intelligent Systems Design and Applications, A. Abraham Eds, Advances in Soft Computing, Springer-Verlag, 2003.
    T. Sohn, T. Noh, and J. Moon. “Support Vector Machine Based ICMP Covert Channel Atteck Detection.” Computer Security Network, LNCS2776, 2003.
    T. Sohn, J. Seo, and J. Moon. “A study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.” Information and Communications Security, LNCS2836, 2003.
    T. Sohn, J. Moon, S. Lee, D. Lee, and J. Lim. “Covert Channel Detection in the ICMP payload using Support Vector Machine.” Computer and Information Science-ISCIS 2003, 2003.
    T. Sohn, J. Moon, and J. Lim. “A Perfomance Ananlysis of Key Distribution Methods in Satellite Communication Environments.” ICOIN, 2003.
    T. Sohn, J. Moon, J. Seo, E. Im, and C. Lee. “Safe Patch Distribution Architecture in Intranet Environments.” SAM, 2003.
    S. Lee, J. Park, H. Byun, J. Moon, and S. Lee. “Automatic generation of structured hyper documents from document images.” International Journal of Pattern Recognition, 2002.
    S. Kim, S. Hong, S. Son, C. Oh, and J. Moon. “Quantitative histopathologic findings of erythromelanosis follicularis faciei et colli.” Cutaneous Pathology, 2001.
    J. Moon and C. Oh. “Solar Damages in Skin Tumors: Quantification of Elastotic Material.” Dematology, 2001.
    J. Cho, Y. Im, J. Park, J. Moon, and D. Park. “Design of GBSB Neural Network Using Solution Space Parameterization and Optimization Approach.” International Journal of Fuzzy Logic and Intelligent System, 2001.
    J. Cho, J. Park, J. Moon, and D. Park. “Synthesis of GBSB-based Neural Associative Memories Using Evolution Program.” International Journal of Fuzzy Logic and Intelligent System, 2001.
    J. Park, T. No, J. Seo, I. Park, J. Kim, J. Moon, K. Han, D. Choi, and J. Ko. “Using Adaptive Resonance Theory2 for Intrusion Detection System.” KIISC, 2001.
    M. Oh, M. Kim, and J. Moon. “Evaluation of skin furrows in aging process using stereo images.” Skin Research and Technology, 1997.

๊ตญ๋‚ด ์ „๋ฌธํ•™์ˆ ์ง€

    ์ „์Šนํ˜ธ, ๋ฌธ์ข…์„ญ. “๋Œ์—ฐ๋ณ€์ด ์—ฐ์‚ฐ ๊ธฐ๋ฐ˜ ํšจ์œจ์  ์‹ฌ์ธต ์‹ ๊ฒฝ๋ง ๋ชจ๋ธ.” ์ •๋ณด์ฒ˜๋ฆฌํ•™ํšŒ, Dec. 2017.
    ์ „์žฌ์Šน, ๋ฌธ์ข…์„ญ. “CAPTCHA์— ์‚ฌ์šฉ๋˜๋Š” ์ˆซ์ž๋ฐ์ดํ„ฐ๋ฅผ ์ž๋™์œผ๋กœ ํŒ๋…ํ•˜๊ธฐ ์œ„ํ•œ Autoencoder ๋ชจ๋ธ๋“ค์˜ ํŠน์„ฑ ์—ฐ๊ตฌ.” ํ•œ๊ตญ์ธํ„ฐ๋„ท์ •๋ณดํ•™ํšŒ, Dec. 2017.
    ์„œ์ค€ํ˜ธ, ๋ฌธ์ข…์„ญ. “BadUSB ์ทจ์•ฝ์  ๋ถ„์„ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ.” ๋Œ€ํ•œ์ž„๋ฒ ๋””๋“œ๊ณตํ•™ํšŒ, Dec. 2017.
    ๊น€๋™์œจ, ๋ฌธ์ข…์„ญ. “์•ˆ๋“œ๋กœ์ด๋“œ์—์„œ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋ฉ”๋ชจ๋ฆฌ ๋ณดํ˜ธ๋ฅผ ์œ„ํ•œ ์—ฐ๊ตฌ.” ํ•œ๊ตญ์ธํ„ฐ๋„ท์ •๋ณดํ•™ํšŒ, Dec. 2016.
    ์žฅ์ง„๊ตฌ, ๋ฌธ์ข…์„ญ. “์›น ์‚ฌ์šฉ์ž์˜ ์‹ค์‹œ๊ฐ„ ์‚ฌ์šฉ ํŒจํ„ด ๋ถ„์„์„ ์ด์šฉํ•œ ์ •์ƒ ์‚ฌ์šฉ์ž ํŒ๋ณ„ ๋ฐฉ๋ฒ•.” ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, Dec. 2016.
    ๊น€์ง€์ˆ˜, ๋ฌธ์ข…์„ญ. “์›น ๋กœ์ปฌ์Šคํ† ๋ฆฌ์ง€ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ์„ ์œ„ํ•œ ์—ฐ๊ตฌ”, ํ•œ๊ตญ์ธํ„ฐ๋„ท์ •๋ณดํ•™ํšŒ, Dec. 2016.
    ๋งˆ์Šน์˜, ์ฃผ์ •ํ˜ธ, ๋ฌธ์ข…์„ญ. โ€œํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ๋ณด์•ˆ ์œ„ํ˜‘์— ๊ธฐ๋ฐ˜ ํ•œ ์„œ๋ฒ„ ๊ฐ€์ƒํ™” ์‹œ์Šคํ…œ ๋ณด์•ˆ ์š”๊ตฌ ์‚ฌํ•ญ ์ œ์•ˆ.โ€ ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, Dec. 2015.
    ์ฃผ์ •ํ˜ธ, ๋งˆ์Šน์˜, ๋ฌธ์ข…์„ญ. โ€œํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ๋ณด์•ˆ ์œ„ํ˜‘์— ๋Œ€์ฒ˜ ํ•œ ์ €์žฅ์žฅ์น˜ ๊ฐ€์ƒํ™” ์‹œ์Šคํ…œ ๋ณด์•ˆ ์š”๊ตฌ ์‚ฌํ•ญ ์ œ์•ˆ.โ€ ๋ณด์•ˆ๊ณตํ•™์—ฐ๊ตฌ๋…ผ๋ฌธ์ง€, Dec. 2014.
    ์ด์‹œ์˜, ๊ฐ•ํฌ์ˆ˜, ๋ฌธ์ข…์„ญ. โ€œ์•ˆ๋“œ๋กœ์ด๋“œ ํ”Œ๋žซํผ ํ™˜๊ฒฝ์—์„œ์˜ ์Šค๋ฏธ์‹ฑ ์ฐจ๋‹จ์— ๊ด€ํ•œ ์—ฐ๊ตฌ.โ€ ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, Oct. 2014.
    ์œ ์ฐฝํ›ˆ, ๋ฌธ์ข…์„ญ, โ€œ์›น ํŽ˜์ด์ง€์—์„œ ์‚ฌ์šฉ์ž ์ž…๋ ฅ ๊ฐ’ ๋ณ€์กฐ ๋ฐฉ์ง€์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2014๋…„ 8์›”
    ์ด์žฌ์šฑ, ์ด์‹œ์˜, ๋ฌธ์ข…์„ญ, โ€œk-SVM์„ ์ด์šฉํ•œ Rogue AP ํƒ์ง€ ๊ธฐ๋ฒ• ์—ฐ๊ตฌโ€, ์ •๋ณดํ˜ธํ˜ธํ•™ํšŒ, 2014๋…„ 2์›”
    ์ด์ฐฌ์šฐ, ๊น€์ƒ๊ณค, ์—ฌ์˜๋ฏผ, ๋ฌธ์ข…์„ญ, โ€œํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ๋ณด์•ˆ ๊ธฐ์ˆ  ํ‘œ์ค€ํ™”๋ฅผ ์œ„ํ•œ ๊ณ„์ธต ๋ฐ ์—ญํ• ๋ณ„ ๋ณด์•ˆ ์š”๊ตฌ์‚ฌํ•ญ ์ œ์•ˆโ€, ๋ณด์•ˆ๊ณตํ•™์—ฐ๊ตฌํšŒ, 2013๋…„ 8์›”
    ๋ฐฐ์„ฑ์žฌ, ์กฐ์žฌ์ต, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, โ€œNative API์˜ ํšจ๊ณผ์ ์ธ ์ „์ฒ˜๋ฆฌ ๋ฐฉ๋ฒ•์„ ์ด์šฉํ•œ ์•…์„ฑ ์ฝ”๋“œ ํƒ์ง€ ๋ฐฉ๋ฒ•์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2012๋…„ 8์›”
    ์–‘๋Œ€์—ฝ, ์ •๋งŒํ˜„, ์กฐ์žฌ์ต, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ โ€œ ๋ฉ”๋ชจ๋ฆฌ ์ดˆ๊ธฐํ™”๋ฅผ ์ด์šฉํ•œ ์‚ฌ์šฉ์ž ๋ฐ์ดํ„ฐ ์œ ์ถœ ๋ฐฉ์ง€์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ๋Œ€ํ•œ ์ „์ž ๊ณตํ•™ํšŒ, 2012๋…„ 7์›”
    ์‹ ์Šนํ›ˆ, ์ •๋งŒํ˜„, ๋ฌธ์ข…์„ญ, โ€œ๋ฐ˜๊ฐ€์ƒํ™” ํ™˜๊ฒฝ Guest OS ๋ณดํ˜ธ๋ฅผ ์œ„ํ•œ ํšจ์œจ์ ์ธ ์„œ๋น„์Šค ๊ฑฐ๋ถ€ ๊ณต๊ฒฉ ํƒ์ง€ ๋ฐฉ๋ฒ•์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2012๋…„ 6์›”
    ๊น€์ •์ œ, ์ •๋งŒํ˜„, ์กฐ์žฌ์ต, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, “์ผํšŒ์„ฑ ์•”ํ˜ธ๋ฅผ ์ด์šฉํ•œ ํšจ์œจ์ ์ด๊ณ  ์•ˆ์ „ํ•œ SIP ์‚ฌ์šฉ์ž ์ธ์ฆ ๋ฐ SDP ์•”ํ˜ธํ™” ๊ธฐ๋ฒ•”, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2012๋…„ 6์›”
    ๊ณต์ต์„ , ์กฐ์žฌ์ต, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, โ€œ์‹ค์‹œ๊ฐ„ ํ–‰์œ„ ๋ถ„์„์„ ์ด์šฉํ•œ ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ ์›นํŽ˜์ด์ง€ ํƒ์ง€ ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด์ฒ˜๋ฆฌํ•™ํšŒ, 2012๋…„ 6์›”
    ๊น€์ •์ œ, ์ •๋งŒํ˜„, ์กฐ์žฌ์ต, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, โ€œ์ผํšŒ์„ฑ ์•”ํ˜ธ๋ฅผ ์ด์šฉํ•œ ํšจ์œจ์ ์ด๊ณ  ์•ˆ์ „ํ•œ SIP ์‚ฌ์šฉ์ž ์ธ์ฆ ๋ฐ SDP ์•”ํ˜ธํ™” ๊ธฐ๋ฒ•โ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2012๋…„ 6์›”
    ๊น€์ด๋ฃฉ, ์กฐ์žฌ์ต, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, โ€œ3G๋ง์„ ์‚ฌ์šฉํ•˜๋Š” ์ธ๊ฐ€๋˜์ง€ ์•Š์€ AP ํƒ์ง€ ๋ฐฉ๋ฒ•โ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2012๋…„ 4์›”
    ์ด์ˆ˜์˜, ๋ฌธ์ข…์„ญ, โ€œ๊ฒฐ์ •ํŠธ๋ฆฌ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ด์šฉํ•œ ์šฐ์ˆ˜ ํŠนํ—ˆ ์„ ๋ณ„๋ฐฉ๋ฒ•์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ง€์‹์ •๋ณด๊ธฐ์ˆ ํ•™ํšŒ2012๋…„ 4์›”
    ์ด์˜ํ›ˆ, ์ •๋งŒํ˜„, ์ •ํ˜„์ฒ , ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, โ€œ์—”ํŠธ๋กœํ”ผ ๊ฐ’ ๋ณ€ํ™” ๋ถ„์„์„ ์ด์šฉํ•œ ์‹คํ–‰ ์••์ถ• ํ•ด์ œ ๋ฐฉ๋ฒ• ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2012๋…„ 4์›”
    ์ •์ˆœ๊ธฐ, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, โ€œํด๋ผ์šฐ๋“œ์ปดํ“จํŒ… ๊ฐ€์ƒํ™” ๋ณด์•ˆ์„ ์œ„ํ•œ ์•„ํ‚คํ…์ฒ˜ ๊ตฌ์„ฑ ๋ฐ ๊ธฐ๋Šฅ ๋ถ„์„ ์—ฐ๊ตฌโ€, ๋ณด์•ˆ๊ณตํ•™์—ฐ๊ตฌ์ง€์›์„ผํ„ฐ, 2011๋…„ 10์›”
    ๋ชจ์ •ํ›ˆ, ์ •๋งŒํ˜„, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œBHO ์ด์šฉํ•œ ์›น ์ปจํ…์ธ  ๋ณ€์กฐ ํƒ์ง€ ๋ฐฉ๋ฒ•โ€, ํ•œ๊ตญํ•ญํ–‰ํ•™ํšŒ, 2011๋…„ 8์›”
    ์–‘๋Œ€์—ฝ, ์กฐ์žฌ์ต, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, โ€œ์œˆ๋„์šฐ ํ™˜๊ฒฝ์˜ ๋ฉ”๋ชจ๋ฆฌ ์ทจ์•ฝ์ ์„ ์ด์šฉํ•œ ๊ณต๊ฒฉ ๋ฐ ๋ฐฉ์–ดโ€, ํ•œ๊ตญ์ •๋ณด๊ธฐ์ˆ ์œตํ•ฉํ•™ํšŒ, 2011๋…„ 7์›”
    ์‹ ํ™”์ˆ˜, ๋ฌธ์ข…์„ญ, ์•…์„ฑ์ฝ”๋“œ ์€๋‹‰์‚ฌ์ดํŠธ์˜ ๋ถ„์‚ฐ์ ,๋™์ ํƒ์ง€๋ฅผ ํ†ตํ•œ ๊ฐ์—ผํ”ผํ•ด ์ตœ์†Œํ™” ๋ฐฉ์•ˆ ์—ฐ๊ตฌ, ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ , 2011๋…„ 6์›”
    ๊น€ํƒœํ›ˆ, ์„œ๊ธฐํƒ, ์ด์˜ํ›ˆ, ์ž„์ข…์ธ, ๋ฌธ์ข…์„ญ, โ€œ์—”ํŠธ๋กœํ”ผ๋ฅผ ์ด์šฉํ•œ ๋ถ„์‚ฐ ์„œ๋น„์Šค ๊ฑฐ๋ถ€ ๊ณต๊ฒฉ ํƒ์ง€์— ํšจ๊ณผ์ ์ธ ํŠน์ง• ์ƒ์„ฑ ๋ฐฉ๋ฒ• ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2010๋…„ 8์›”
    ์„œ๊ธฐํƒ, ๊น€ํƒœํ›ˆ, ๊น€์ •์ œ, ์ž„์ข…์ธ, ๋ฌธ์ข…์„ญ, โ€œIPTV ์‹œ์Šคํ…œ์—์„œ์˜ ํšจ๊ณผ์ ์ธ ์ฝ˜ํ…์ธ  ๋ณดํ˜ธ๋ฅผ ์œ„ํ•œ ์ผํšŒ์„ฑ ์•”ํ˜ธ์™€ ์ˆ˜์‹ ์ œํ•œ์‹œ์Šคํ…œ์„ ์‚ฌ์šฉํ•œ ๋ณด์•ˆ ๋ชจ๋ธโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2010๋…„ 8์›”
    ๋ฐ•์ค€์‹, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œRole Based Petri Net : ๊ณต๊ฒฉ ์‹œ๋‚˜๋ฆฌ์˜ค์˜ ํšจ์œจ์  ์„ค๊ณ„๋ฅผ ์œ„ํ•œ ์—ญํ•  ๊ธฐ๋ฐ˜ ํ‘œํ˜„ ๋ชจ๋ธโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2010๋…„ 2์›”
    ๋ฐ•์„ฑ์šฉ, ๋ฌธ์ข…์„ญ, โ€œ๋ณด์•ˆ ์ธ์ฆ์„ ํ†ตํ•œ ActiveX Control ๋ณด์•ˆ ๊ด€๋ฆฌ ๋ชจ๋ธ์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2009๋…„ 12์›”
    ์ตœ์„ฑ์šด, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œ๋ฉ”๋ชจ๋ฆฌ ์‹คํ–‰์˜์—ญ ์ถ”์ ์„ ์‚ฌ์šฉํ•œ ๋ฒ„ํผ์˜ค๋ฒ„ํ”Œ๋กœ ์•…์„ฑ์ฝ”๋“œ ํƒ์ง€๊ธฐ๋ฒ•โ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2009๋…„ 10์›”
    ๊ฐ•์‹ ๋ช…, ๋ฌธ์ข…์„ญ, โ€œ๊ณต์ธ์ „์ž๋ฌธ์„œ๋ณด๊ด€์†Œ์—์„œ ์ƒ์„ฑ๋˜๋Š” ๋กœ๊ทธ์˜ ํšจ์œจ์ ์ด๊ณ  ์•ˆ์ „ํ•œ ๋ณด๊ด€๋ฐฉ๋ฒ•์— ๋Œ€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์‚ฌ์ด๋ฒ„ํ…Œ๋Ÿฌ์ •๋ณด์ „ํ•™ํšŒ, 2009๋…„ 4์›”
    ์œ ๊ด‘์ง„, ์ด์žฌ์šฑ, ๋ฐฐ์„ฑ์žฌ, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œAHP-ํผ์ง€์ ๋ถ„์„ ์ด์šฉํ•œ ์นจ์ž…๊ฐ๋‚ด ์‹œ์Šคํ…œ ๋„์ž… ์ ์ ˆ์„ฑ ํ‰๊ฐ€๋ฅผ ์œ„ํ•œ ์ •๋Ÿ‰์  ํ‰๊ฐ€๋ฐฉ๋ฒ• ์—ฐ๊ตฌโ€, ์ •๋ณด๊ณผํ•™ํšŒ, 2009๋…„ 4์›”
    ๊ถŒ์˜ค์ฒ , ๋ฐฐ์„ฑ์žฌ, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œNative API ๋นˆ๋„ ๊ธฐ๋ฐ˜์˜ ํผ์ง€ ๊ตฐ์ง‘ํ™”๋ฅผ ์ด์šฉํ•œ ์•…์„ฑ์ฝ”๋“œ ์žฌ๊ทธ๋ฃนํ™” ๊ธฐ๋ฒ•์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2008๋…„ 12์›”
    ์ดํ˜ธ์„ญ, ์กฐ์žฌ์ต, ์ •๋งŒํ˜„, ๋ฌธ์ข…์„ญ, โ€œ๋น„์ •์ƒ ๋ฌธ์ž ์กฐํ•ฉ์œผ๋กœ ๊ตฌ์„ฑ๋œ ์ŠคํŒธ ๋ฉ”์ผ์˜ ํƒ์ง€ ๋ฐฉ๋ฒ•โ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2008๋…„ 12์›”
    ์ด์ธ์šฉ, ์กฐ์žฌ์ต, ์กฐ๊ทœํ˜•, ๋ฌธ์ข…์„ญ, โ€œSQL ์งˆ์˜ ์• ํŠธ๋ฆฌ๋ทฐํŠธ ๊ฐ’ ์ œ๊ฑฐ ๋ฐฉ๋ฒ•์„ ์ด์šฉํ•œ ํšจ๊ณผ์ ์ธ SQL Injection ๊ณต๊ฒฉ ํƒ์ง€ ๋ฐฉ๋ฒ• ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2008๋…„ 10์›”
    ๊น€ํ˜ธ์ธ, ์กฐ์žฌ์ต, ์ด์ธ์šฉ, ๋ฌธ์ข…์„ญ, โ€œ๋„คํŠธ์›Œํฌ ๋ฐ์ดํ„ฐ ๋ชจ๋ธ๋ง์„ ์œ„ํ•œ ํšจ๊ณผ์ ์ธ ์„ฑ๋ถ„ ์„ ํƒโ€, ํ•œ๊ตญ๋ฐฉ์†ก๊ณตํ•™ํšŒ, 2008๋…„ 1์›”
    ์กฐ์žฌ์ต, ๊น€ํ˜ธ์ธ, ๋ฌธ์ข…์„ญ, โ€œํ†ต๊ณ„์  ์ˆ˜๋Ÿ‰ํ™” ๋ฐฉ๋ฒ•์„ ์ด์šฉํ•œ ํšจ๊ณผ์ ์ธ ๋„คํŠธ์›Œํฌ ๋ฐ์ดํ„ฐ ๋น„๊ต ๋ฐฉ๋ฒ•โ€, ํ•œ๊ตญ๋ฐฉ์†ก๊ณตํ•™ํšŒ, 2008๋…„ 1์›”
    ๊ฐ•ํƒœ์šฐ, ์กฐ์žฌ์ต, ์ •๋งŒํ˜„, ๋ฌธ์ข…์„ญ, โ€œAPI call ์˜ ๋‹จ๊ณ„๋ณ„ ๋ณตํ•ฉ ๋ถ„์„์„ ํ†ตํ•œ ์•…์„ฑ์ฝ”๋“œ ํƒ์ง€โ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2007
    ์ „์˜ํƒœ, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, โ€œAAWP์™€ LAAWP ๋ฅผ ํ™•์žฅํ•œ ์›œ ์ „ํŒŒ ๋ชจ๋ธ๋ง ๊ธฐ๋ฒ• ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ, 2007
    ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œ๋Œ€์‘๋ถ„์„ ๋ฐฉ๋ฒ•์„ ์ด์šฉํ•œ ๋„คํŠธ์›Œํฌ ๋ฐ์ดํ„ฐ ๋น„๊ต ๋ถ„์„ ๋ฐฉ๋ฒ•โ€, ์‚ฌ์ด๋ฒ„์ •๋ณด์ „ํ•™ํšŒ, 2006
    ์ด๋ฏผ์ˆ˜, ์†ํƒœ์‹, ์กฐ์ƒํ˜„, ๋ฌธ์ข…์„ญ, ๊น€๋™์ˆ˜, ์„œ์ •ํƒ, ์†๊ธฐ์šฑ, “์‹œ๊ฐ„์ ์ธ ํ–‰๋™ ํŒจํ„ด์„ ๊ณ ๋ คํ•œ ์›œ์˜ ์ •ํ˜• ํ‘œํ˜„๊ธฐ๋ฒ• ์—ฐ๊ตฌ”, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 2006
    ๋ฏผ๋™์˜ฅ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, โ€œURL ์Šคํ‘ธํ•‘์„ ์ด์šฉํ•œ ํ”ผ์‹ฑ๊ณต๊ฒฉ์˜ ๋ฐฉ์–ด์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 2005
    ์†ํƒœ์‹, ๋ฐ•์ข…์„ฑ, ๋ฌธ์ข…์„ญ, โ€œ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ์˜ ์ •๋ณด์€๋‹‰ ๊ธฐ๋ฒ• ๋ถ„์„โ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒํ•™ํšŒ์ง€, 2004
    ๋ฐ•์ข…์„ฑ, ์ตœ์šดํ˜ธ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, โ€œ์ž๋™ํ™”๋œ ์นจํ•ด ์‚ฌ๊ณ ๋Œ€์‘ ์‹œ์Šคํ…œ์—์„œ์˜ ๋„คํŠธ์› ํฌ๋ Œ์‹ ์ •๋ณด์— ๋Œ€ํ•œ ์ •์˜โ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ๋…ผ๋ฌธ์ง€, 2004
    ์„œ์ •์šฐ, ์†ํƒœ์‹, ์„œ์ •ํƒ, ๋ฌธ์ข…์„ญ, โ€œn-Gram ์ƒ‰์ธํ™”์™€ Support Vector Machine์„ ์‚ฌ์šฉํ•œ ์ŠคํŒธ๋ฉ”์ผ ํ•„ํ„ฐ๋ง์— ๋Œ€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ๋…ผ๋ฌธ์ง€, 2004
    ์†ํƒœ์‹, ์„œ์ •์šฐ, ์„œ์ •ํƒ, ๋ฌธ์ข…์„ญ, ์ตœํ™๋ฏผ, โ€œSupport Vector Machine ๊ธฐ๋ฐ˜ TCP/IP ํ—ค๋”์˜ ์€๋‹‰์ฑ„๋„ ํƒ์ง€์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 2004
    ์„œ์ •์šฐ, ๋ฏผ๋™์˜ฅ, ๋ฌธ์ข…์„ญ, โ€œ๋‹ค์ค‘์ƒ์ฒด์ธ์‹ ์‹œ์Šคํ…œ์„ ์ด์šฉํ•œ ์‚ฌ์šฉ์ž์ธ์ฆ์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ, 2003
    ์†ํƒœ์‹, ์„œ์ •์šฐ, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, ์ž„์„๊ทœ, ์ด์ฒ ์›, “์•ˆ์ „ํ•œ ๋ณด์•ˆ ํŒจ์น˜ ๋ถ„๋ฐฐ ๊ตฌ์กฐ์˜ ์„ค๊ณ„ ๋ฐ ๊ตฌํ˜„”, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ๋…ผ๋ฌธ์ง€, 2003
    ์†ํƒœ์‹, ์„œ์ •์šฐ, ๊ตฌ์›๋ณธ, ๋ฏผ๋™์˜ฅ, ๋ฌธ์ข…์„ญ, ๋ฐ•ํ˜„๋ฏธ, ์ด๋ณ‘๊ถŒ, “๋ณด์•ˆ๋„๊ตฌ์— ๋Œ€ํ•œ ์šฐํšŒ๊ณต๊ฒฉ ๊ธฐ๋ฒ• ๋ถ„๋ฅ˜ ๋ฐ ๋ถ„์„”, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ํ•™ํšŒ์ง€, 2003
    ์„œ์ •์šฐ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, ์ด์ฒ ์›, โ€œ๋ณด์•ˆํŒจ์น˜ ๋ถ„๋ฐฐ์— ์žˆ์–ด์„œ ํŒจ์น˜์„œ๋ฒ„๋ฅผ ๋Œ€์ฒดํ•˜๋Š” ๋ฐฉ๋ฒ• ์—ฐ๊ตฌโ€, JCCI, 2003
    ๊น€์ง„์›, ๋…ธํƒœ์šฐ, ๊ณ ์žฌ์˜, ์ตœ๋Œ€์‹, ํ•œ๊ด‘ํƒ, ๋ฌธ์ข…์„ญ, โ€œAdaptive Resonance Theory 2๋ฅผ ์ด์šฉํ•œ ๋„คํŠธ์›Œํฌ๊ธฐ๋ฐ˜์˜ ์นจ์ž…ํƒ์ง€ ๋ชจ๋ธ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 2002
    ์žฅ๋•์„ฑ, ๋ฌธ์ข…์„ญ, ๋ฐ•์ฒ ์ˆœ, ์œค๊ฒฝ์‹, “์œ ์ „์ž ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ด์šฉํ•œ InGaP/GaAs HBT ์†Œ์‹ ํ˜ธ๋“ฑ๊ฐ€ํšŒ๋กœํŒŒ๋ผ๋ฏธํ„ฐ์ถ”์ถœ”, ํผ์ง€ ๋ฐ ์ง€๋Šฅ ์‹œ์Šคํ…œํ•™ํšŒ ๋…ผ๋ฌธ์ง€, 2001

    ๋Œ€ํ•™ ํ•™์ˆ ์ง€

    • ๊น€์šฉ๊ด‘, ๋ฌธ์ข…์„ญ, “์†๋ชฉ ์ฐฉ์šฉํ˜• ์›จ์–ด๋Ÿฌ๋ธ” ๊ธฐ๊ธฐ์˜ ๊ฐ€์†๋„ ์„ผ์„œ๋ฅผ ์‚ฌ์šฉํ•œ ์‚ฌ์šฉ์ž ์ธ์ฆ”, 2016
    • ์ดํ˜ธ์„ญ, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œA Method for Comparing Network Data and Modeling Data using Generalized Additive Modelingโ€, KoreaCrypt07, 2007
    • ?์กฐ์žฌ์ต, ์ดํ˜ธ์„ญ, ๋ฌธ์ข…์„ญ, โ€œNetwork Data Set Composition and Evaluation Using a Multivariate Quantification Modelโ€, KoreaCrypt07, 2007
    • ๊น€์—ฐํฌ, ๋ฌธ์ข…์„ญ, “ARP ์ฆ๊ฐ€๋Ÿ‰์œผ๋กœ ๋ณธ ์›œ ํƒ์ง€”, KoreaCrypt04, 2004
    • ๊น€์œค์ฃผ, ์ด์ƒ์›, ์„œ์ •ํƒ, ๋ฌธ์ข…์„ญ, “๋‹ค์–‘ํ•œ ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ์—์„œ ๋ณด์•ˆ ์ทจ์•ฝ์  ํ•ด๊ฒฐ์„ ์œ„ํ•œ ํŒจ์น˜ ๊ด€๋ฆฌ ์‹œ์Šคํ…œ(PMS)์˜ ์„ค๊ณ„ ๋ฐ ๊ตฌํ˜„”, KoreaCrypt04, 2004
    • ๊น€์ข…ํ˜ธ, ๋ฌธ์ข…์„ญ, “ํ™•๋ฅ ์  ํŒจํ‚ท ๊ฒ€์‚ฌ๋ฅผ ํ†ตํ•œ ์„œ๋น„์Šค๊ฑฐ๋ถ€ ๊ณต๊ฒฉ์˜ ์ž๋™ํ™” ๋ฐฉ์–ด ๋ชจ๋ธ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ,” KoreaCrypt04, 2004
    • ?์œค๋•์ƒ, ๋ฌธ์ข…์„ญ, “๋น„๋Œ€์นญ ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝํ™”์—์„œ ๋ณต์ˆ˜ ๋ฐฉํ™”๋ฒฝ์˜ ๊ณ ๊ฐ€์šฉ์„ฑ ๋ฐ ๋ถ€ํ•˜ ๋ถ„์‚ฐ ๊ธฐ๋Šฅ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, KoreaCrypt04, 2004
    • ?์ด์ƒ์›, ๊น€์œค์ฃผ, ๋ฌธ์ข…์„ญ, “Windows ๋ณด์•ˆ ํŒจ์น˜ ๊ฒ€์ƒ‰ ๋ฐฉ์‹์—์„œ์˜ ์ทจ์•ฝ์  ๋ถ„์„ ๋ฐ ๋Œ€์‘๋ฐฉ์•ˆ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, KoreaCrypt04, 2004
    • ๋ฌธ๋•ํ™˜, ๋ฌธ์ข…์„ญ, “IPv6 ND(Neighbor Discovery)์˜ ๋ณด์•ˆ ์ทจ์•ฝ์„ฑ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, KoreaCrypt04, 2004
    • ๋ฐ•์ข…์„ฑ, ์ตœ์šดํ˜ธ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, “์ž๋™ํ™”๋œ ์นจํ•ด ์‚ฌ๊ณ ๋Œ€์‘์‹œ์Šคํ…œ์—์„œ์˜ ๋„คํŠธ์› ํฌ๋ Œ์‹ ์ •๋ณด์— ๋Œ€ํ•œ ์ •์˜”, KoreaCrypt04, 2004
    • ๊น€๋™์ฃผ, ๋ฌธ์ข…์„ญ, “P2P ๋ฐฉ์‹์—์„œ ์ €์ž‘๋ฌผ ๋ณดํ˜ธ ์‹œ์Šคํ…œ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, Koreacript03, 2003
    • ๊น€์„ ํฌ, ๋ฌธ์ข…์„ญ, ์ž„์ข…์ธ, “HFC๋ง์—์„œ์˜ VPN ์„ฑ๋Šฅ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, Koreacript03, 2003
    • ์„œ์ •์šฐ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, “N-gram ์ƒ‰์ธํ™”์™€ SVM์„ ์‚ฌ์šฉํ•œ ์ŠคํŒธ๋ฉ”์ผ ํƒ์ง€ ๋ฐฉ์•ˆ์— ๊ด€ํ•œ ์—ฐ๊ตฌ” Koreacript03, 2003
    • ์†ํƒœ์‹, ์„œ์ •์šฐ, ๊ตฌ์›๋ณธ, ๋ฏผ๋™์˜ฅ, ์ด์ƒ์›, ๊น€๋Œ€๊ณต, ๊น€์œค์ฃผ, ๋ฌธ์ข…์„ญ, “๋Œ€๊ทœ๋ชจ ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ์—์„œ์˜ ํŒจ์น˜ ๋ถ„๋ฐฐ ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ”, Koreacript03, 2003
    • ๊น€์„ฑ๋„, ๊น€ํ˜„์ƒ, ๊น€์Šนํƒ, ๋ฌธ์ข…์„ญ, “๊ทธ๋ž˜ํ”ฝ ์‚ฌ์šฉ์ž ์ธํ„ฐํŽ˜์ด์Šค(GUI), ๊ธฐ๋ฐ˜์˜ ๋ฆฌ๋ˆ…์Šค์šฉ ํฌ๋ Œ์‹ ํˆด ๊ตฌํ˜„”, Koreacript03, 2003
    • ๋ฐ•์ข…์„ฑ, ๋ฌธ์ข…์„ญ, “๋ถ„์‚ฐ๋กœ๊ทธ ์ •๋ณด์˜ ์‹ค์‹œ๊ฐ„ ์ธ์ฆ ๋ฐฑ์—… ๋ชจ๋ธ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, Koreacript03, 2003

    ํ•™์ˆ ํšŒ์˜ ๊ฒŒ์žฌ ๋…ผ๋ฌธ (๊ตญ๋‚ด ์ผ๋ฐ˜ํ•™์ˆ ์ง€)

    • ์ •๋งŒํ˜„, ์ •์ˆœ๊ธฐ, ๋ฌธ์ข…์„ญ, โ€œ๋Œ€์šฉ๋Ÿ‰ ๋„คํŠธ์›Œํฌ์—์„œ์˜ ๋น„์ •์ƒ ํ–‰์œ„์˜ ์—ฐ๊ฒฐ ํ‘œํ˜„ ๋ฐ ๋ถ„๋ฅ˜ ํ‘œํ˜„ ๋ฐฉ๋ฒ•โ€, ๊ตญ๋ฐฉ๊ณผํ•™์—ฐ๊ตฌ์†Œ ์ฐฝ์„ค 40์ฃผ๋…„ ๊ธฐ๋… ์ข…ํ•ฉํ•™์ˆ ๋Œ€ํšŒ, 2010
    • ์ •์ˆœ๊ธฐ, ์„œํ˜ธ์ง„, ๊น€๊ฒฝ๋ฅœ, ๋ฌธ์ข…์„ญ, โ€œHTTP Data ๋ชจ๋‹ˆํ„ฐ๋ง์„ ํ†ตํ•œ HTTP Flooding DDoS ๊ณต๊ฒฉ ํƒ์ง€ ์—ฐ๊ตฌโ€, 2010๋…„ ํ•œ๊ตญ์ •๋ณด๊ธฐ์ˆ ์œตํ•ฉํ•™ํšŒ ํ•˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2010
    • ์ด์žฌ์šฑ, ๊น€ํ˜ธ์ธ, ๋ฌธ์ข…์„ญ, โ€œ์ธ์ฆ๋œ ์‚ฌ์šฉ์ž์˜ ์•”ํ˜ธํ™”๋œ URL ์ ‘๊ทผ ๊ธฐ๋ฒ• ์—ฐ๊ตฌโ€, 2008๋…„๋„ ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ํ•˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2008
    • ์„œ๊ธฐํƒ, ๊น€ํ˜ธ์ธ, ๋ฌธ์ข…์„ญ, โ€œPhishing ๊ธฐ๋ฒ• ๋ฐ Anti-Phishing ๊ธฐ๋ฒ•์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, 2008๋…„๋„ ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ํ•˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2008
    • ๊น€ํƒœํ›ˆ, ์ด์ธ์šฉ, ๋ฌธ์ข…์„ญ, โ€œ์›น ๋กœ๊ทธ์˜ ์‹œ๊ฐํ™”๋ฅผ ์ด์šฉํ•œ ์ด์ƒํƒ์ง€ ๊ธฐ๋ฒ• ์ œ์•ˆโ€, 2008๋…„๋„ ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ํ•˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2008
    • ๋ฐฐ์„ฑ์žฌ, ๊ถŒ์˜ค์ฒ , ๋ฌธ์ข…์„ญ, ์ž„์ข…์ธ, โ€œWindows ์•…์„ฑ์ฝ”๋“œ ํƒ์ง€๋ฅผ ์œ„ํ•œ Native API ๋นˆ๋„์— ๊ธฐ๋ฐ˜ํ•œ ์ ‘๊ทผ ๋ฐฉ๋ฒ•์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, 2008 ํ•œ๊ตญ์ปดํ“จํ„ฐ์ข…ํ•ฉํ•™์ˆ ๋Œ€ํšŒ, 2008
    • ์ด์ธ์šฉ, ์ด์ˆ˜์˜, ๋ฌธ์ข…์„ญ, ์ž„์ข…์ธ, โ€œํŒจ์น˜๊ด€๋ฆฌ์‹œ์Šคํ…œ์˜ ํšจ์œจ์ ์ธ ๊ตฌ์„ฑ์š”์†Œ์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, 2008 ํ•œ๊ตญ๋ฐฉ์†ก๊ณตํ•™ํšŒ ๋™๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2008
    • ๊ถŒ์˜ค์ฒ , ๋ฐฐ์„ฑ์žฌ, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œ๋„คํŠธ์›Œํฌ ๊ณต๊ฒฉ ๋ฐ ๋ฐฉ์–ด ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ํ”„๋ ˆ์ž„์›Œํฌ ์ œ์•ˆโ€, 2008 ํ•œ๊ตญ๋ฐฉ์†ก๊ณตํ•™ํšŒ ๋™๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2008
    • ์ด์ˆ˜์˜, ์ด์ธ์šฉ, ๋ฌธ์ข…์„ญ, โ€œP2P๋ฅผ ์ด์šฉํ•œ ํŒจ์น˜ ๋ถ„๋ฐฐ ์‹œ์Šคํ…œ์˜ ํšจ์œจ์ ์ธ ํŒจ์น˜ ํŒŒ์ผ ๋ถ„๋ฐฐ ๋ฐฉ์•ˆ ์—ฐ๊ตฌโ€, 2008 ํ•œ๊ตญ๋ฐฉ์†ก๊ณตํ•™ํšŒ ๋™๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2008
    • ์ด์ˆ˜์˜, ์ด์ธ์šฉ, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œํŒจ์น˜๋ถ„๋ฐฐ ์‹œ์Šคํ…œ์„ ์œ„ํ•œ ํšจ๊ณผ์ ์ธ ๊ณ„์ธต์  ์†Œํ”„ํŠธ์›จ์–ด ์•„ํ‚คํ…์ฒ˜ ํ‘œํ˜„ ๋ฐฉ์•ˆโ€, ํ•œ๊ตญ์ •๋ณด์ฒ˜๋ฆฌํ•™ํšŒ ์ œ 28ํšŒ ์ถ”๊ณ„ํ•™์ˆ ๋ฐœํ‘œ๋Œ€ํšŒ, 2007
    • ๋ฐฐ์„ฑ์žฌ, ์ •๋งŒํ˜„, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œ๋ฒ”์šฉ ์šด์˜์ฒด์ œ๋ฅผ ์œ„ํ•œ ๊ณ„์ธต์  ํŒจ์น˜ ๋ถ„๋ฐฐ ๊ตฌ์กฐ์—์„œ์˜ ํšจ๊ณผ์ ์ธ ์‹œ์Šคํ…œ ์ธ์ฆ ๋ฐฉ๋ฒ•โ€, ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํ•™ํšŒ ์ œ 34ํšŒ ์ถ”๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2007
    • ๊ถŒ์˜ค์ฒ , ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œํ–‰๋™๊ธฐ๋ฐ˜ ํƒ์ง€๋ฅผ ์šฐํšŒํ•˜๋Š” ์›œ ์ž๊ธฐ๋ฐฉ์–ด ๊ธฐ๋ฒ• ์ œ์•ˆโ€, ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํ•™ํšŒ ์ œ 34ํšŒ ์ถ”๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2007
    • ์ด์ธ์šฉ, ์ด์ˆ˜์˜, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œ๋ฒ”์šฉ์  ํŒจ์น˜๋ถ„๋ฐฐ ์‹œ์Šคํ…œ์„ ์œ„ํ•œ ํšจ์œจ์ ์ธ DB์„ค๊ณ„โ€, ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํ•™ํšŒ ์ œ 34ํšŒ ์ถ”๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2007
    • ์ •๋งŒํ˜„, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œ๊ฐ์‚ฌ๋ฐ์ดํ„ฐ์— ๊ธฐ๋ฐ˜ํ•œ ์›น ๊ณต๊ฒฉ ํƒ์ง€๋ฐฉ์•ˆ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ๋™๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2007
    • ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œ์นจ์ž… ํƒ์ง€ ์‹œ์Šคํ…œ์„ ์œ„ํ•œ ํšจ๊ณผ์ ์ธ ๋ฐ์ดํ„ฐ ์…‹ ๊ตฌ์„ฑ ๋ฐฉ๋ฒ•โ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ๋™๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2007
    • ๋ชจ์ •ํ›ˆ, ์ž„์ข…์ธ, ๋ฌธ์ข…์„ญ, โ€œ๋ฒ ์ด์ง€์–ธ์„ ์ด์šฉํ•œ ์›น ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ณต๊ฒฉ์˜ ์‹ค์‹œ๊ฐ„ ํƒ์ง€์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ๋ฐฉ์†ก๊ณตํ•™ํšŒ, 2007
    • ์ดํ˜ธ์„ญ, ์ด์ˆ˜์˜, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, โ€œGAM์„ ์ด์šฉํ•œ ๊ฐ€์ƒ Malware์™€ ์‹ค์ œ Malware์˜ ๋„คํŠธ์›Œํฌ ๋ฐ์ดํ„ฐ ๋น„๊ต ๋ฐ ๊ฒ€์ฆโ€, ํ•œ๊ตญ๋ฐฉ์†ก๊ณตํ•™ํšŒ์ง€, 2007
    • ์กฐ๊ทœํ˜•, ์ดํ˜์ค€, ์ž„์ข…์ธ ๋ฌธ์ข…์„ญ, โ€œNFR์„ ์ด์šฉํ•œ ์ž์ฒด ์ „ํŒŒ ์›œ์˜ ์Šคํ…Œ๋ ˆ์˜ค ํƒ€์ž… ์ •์˜์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ๋ฐฉ์†ก๊ณตํ•™ํšŒ์ง€, 2007
    • ์ด์ˆ˜์˜, ๊ตฌ๋ณธํ˜„, ์กฐ์žฌ์ต, ์กฐ๊ทœํ˜•, ๋ฌธ์ข…์„ญ, โ€œ์›น ๋กœ๊ทธ ๋ฐ์ดํ„ฐ ์…‹์„ ์ด์šฉํ•œ ์นจ์ž… ์ƒํƒœ ์‹œ๊ฐํ™” ๋ฐฉ์•ˆ์— ๊ด€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ๋ฐฉ์†ก๊ณตํ•™ํšŒ์ง€, 2007
    • ๋ชจ์ •ํ›ˆ, ์ด๋ฏผ์ˆ˜, ์กฐ๊ทœํ˜•, ๋ฌธ์ข…์„ญ, “์ธํ„ฐ๋„ท ์›œ ๋ถ„์„ํ™˜๊ฒฝ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, ํ•œ๊ตญ2006๋…„ ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ๋™๊ณ„์ •๋ณด๋ณดํ˜ธํ•™์ˆ ๋Œ€ํšŒ, 2006
    • ๋ฌธ์ข…์„ญ, ์กฐ๊ทœํ˜•, ์กฐ์žฌ์ต, ์ดํ˜ธ์„ญ, ์ •๋งŒํ˜„, ์ฑ„์ˆ˜์˜, “MIT์˜ IDS ์„ฑ๋Šฅ ํ‰๊ฐ€ ๋ฐ์ดํ„ฐ์™€ KDD CUP 99 ์˜ IDS ์„ฑ๋Šฅ ํ‰๊ฐ€ ์‹คํ—˜ ๋ฐ์ดํ„ฐ์˜ ๋น„๊ต ๋ถ„์„”, WISC 06, 2006
    • ๊ตฌ๋ณธํ˜„, ์กฐ๊ทœํ˜•, ์กฐ์ƒํ˜„, ๋ฌธ์ข…์„ญ, “HTTP Header๋ฅผ ์ด์šฉํ•œ ์‹ค์‹œ๊ฐ„ ์›น ๊ณต๊ฒฉ ํƒ์ง€์‹œ๊ฐํ™” ๋„๊ตฌ์˜ ์„ค๊ณ„ ๋ฐ ๊ตฌํ˜„”, 2006๋…„ ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ํ•˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2006
    • ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, “๋Œ€์‘๋ถ„์„ ๋ฐฉ๋ฒ•์„ ์ด์šฉํ•œ ๋„คํŠธ์›Œํฌ ๋ฐ์ดํ„ฐ ๋น„๊ต ๋ถ„์„ ๋ฐฉ๋ฒ•”, ์‚ฌ์ด๋ฒ„์ •๋ณด์ „ํ•™ํšŒ, 2006
    • ์ด๋ฏผ์ˆ˜, ์กฐ์žฌ์ต, ๊ตฌ๋ณธํ˜„, ๋ฌธ์ข…์„ญ, “์ธํ„ฐ๋„ท ์›œ ์ „ํŒŒ ํŠน์„ฑ ํŒŒ์•…์„ ์œ„ํ•œ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ํ™˜๊ฒฝ ์—ฐ๊ตฌ”, ํ•œ๊ตญ ์ปดํ“จํ„ฐ ์ข…ํ•ฉ ํ•™์ˆ  ๋Œ€ํšŒ, 2005
    • ๊ตฌ๋ณธํ˜„, ์ด๋ฏผ์ˆ˜, ์กฐ์žฌ์ต, ๋ฌธ์ข…์„ญ, “XML ๊ธฐ๋ฐ˜์˜ ๋ชจ๋ฐ”์ผ ์ „์ž๊ฒฐ์žฌ์‹œ์Šคํ…œ ๊ตฌํ˜„”, ์ •๋ณด๊ณผํ•™ํšŒ ์ถ˜๊ณ„ํ•™์ˆ ๋ฐœํ‘œํšŒ, 2005
    • ์กฐ์žฌ์ต, ์ด๋ฏผ์ˆ˜, ๋ฌธ์ข…์„ญ, โ€œ์›œํŠน์„ฑ ๋ถ„์„์„ ์œ„ํ•œ ๊ฐ€์ƒ๋ง ๊ตฌ์„ฑ ๋ฐฉ๋ฒ•์— ๋Œ€ํ•œ ์—ฐ๊ตฌโ€, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ํ•˜๊ณ„์ •๋ณด๋ณดํ˜ธํ•™์ˆ ๋Œ€ํšŒ, 2005
    • ์กฐ์žฌ์ต, ๊ตฌ๋ณธํ˜„, ์ด๋ฏผ์ˆ˜, ๋ฌธ์ข…์„ญ, โ€œ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ํ™˜๊ฒฝ ๊ตฌ์ถ•์„ ์œ„ํ•œ ํŒจํ‚ท ๋ถ„ํฌ์— ๋”ฐ๋ฅธ ๋„คํŠธ์›Œํฌ ๋ฐ์ดํ„ฐ ์…‹ ๊ตฌ์„ฑ ๋ฐฉ์•ˆโ€, ์ •๋ณด๊ณผํ•™ํšŒ ์ถ˜๊ณ„ํ•™์ˆ ๋ฐœํ‘œํšŒ, 2005
    • ์ด๋ฏผ์ˆ˜, ์กฐ์žฌ์ต, ๊ตฌ๋ณธํ˜„, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, “NS-2๋ฅผ ์ด์šฉํ•œ ์›œ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ํ™˜๊ฒฝ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”,ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ ํ•˜๊ณ„์ •๋ณด๋ณดํ˜ธํ•™์ˆ ๋Œ€ํšŒ, 2005
    • ๊ตฌ๋ณธํ˜„, ์ด์ข…์„ฑ, ๋ฌธ์ข…์„ญ, ๊น€๋™์Šค, ์„œ์ •ํƒ, ๋ฐ•์‘๊ธฐ, “๋„คํŠธ์›Œํฌ ์›œ ์ „ํŒŒ ์‹œ๋ฎฌ๋ ˆ์ดํ„ฐ์˜ ์„ค๊ณ„ ๋ฐ ๊ตฌํ˜„”, ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2005
    • ์ด์Šน๊ทœ, ์กฐ๊ทœํ˜•, ์ด๋ฏผ์ˆ˜, ๋ฌธ์ข…์„ญ, ๊น€๋™์ˆ˜, ์„œ์ •ํƒ, ๋ฐ•์‘๊ธฐ, “์ „ํŒŒํŠน์„ฑ์— ๋”ฐ๋ฅธ ์ธํ„ฐ๋„ท ์›œ์˜ ๋ถ„๋ฅ˜”, ์ •๋ณด๊ณผํ•™ํšŒ 2005 ๊ฐ€์„ ์ถ”๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2005
    • ์ด์ƒ์›, ๊น€์œค์ฃผ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, “๋ฉ€ํ‹ฐํ”Œ๋žซํผ ํ™˜๊ฒฝ์—์„œ์˜ ๋ณด์•ˆํŒจ์น˜ ๋ถ„๋ฐฐ๋ฅผ ์œ„ํ•œ DB๊ตฌ์ถ• ๋ฐ ๊ฒ€์ƒ‰ ๋ฐฉ๋ฒ•์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, 2004๋…„ ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ์ด์ƒ์›, ๊น€์œค์ฃผ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, ์ตœ๋Œ€์‹, ๋ฐ•์‘๊ธฐ, “RMI์™€ SSL๋ฅผ ์ด์šฉํ•œ ๋ฉ€ํ‹ฐํ”Œ๋žซํผ ํ™˜๊ฒฝ์—์„œ์˜ ์•ˆ์ „ํ•œ ๋ณด์•ˆํŒจ์น˜ ๋ถ„๋ฐฐ์‹œ์Šคํ…œ ์„ค๊ณ„”, 2004๋…„ ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ๊น€์œค์ฃผ, ์ด์ƒ์›, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, ์œค์ฃผ๋ฒ”, ๋ฐ•์‘๊ธฐ, “ํ™•์žฅ์„ฑ์„ ๊ณ ๋ คํ•œ ๊ณ„์ธต์  ํŒจ์น˜ ๋ถ„๋ฐฐ ์‹œ์Šคํ…œ ํ”„๋ ˆ์ž„์›Œํฌ ์„ค๊ณ„”, 2004๋…„ ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ๊น€๋Œ€๊ณต, ๋ฏผ๋™์˜ฅ, ์ด์ƒ์›, ๊น€์œค์ฃผ, ์†ํƒœ์‹, ์„œ์ •ํƒ, ๋ฌธ์ข…์„ญ, “๋ณด์•ˆํŒจ์น˜ ์ž๋™ ๋ถ„๋ฐฐ ์‹œ์Šคํ…œ์—์„œ LINUX/UNIX ๊ณ„์—ด์—์„œ์˜ ํŒจ์น˜ ๋ถ„๋ฐฐ ๋ฐ ์„ค์น˜์‹œ ์˜์กด์„ฑ ํ•ด๊ฒฐ ๋ฐฉ์•ˆ”, 2004๋…„ ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ. 2004
    • ๊น€๋Œ€๊ณต, ๋ฌธ์ข…์„ญ, “ํ™•์žฅ ๊ฐ€๋Šฅํ•œ ๋‹ค๊ณ„์ธต ํŒจ์น˜๋ถ„๋ฐฐ ๊ธฐ์ˆ ”, 2004๋…„ ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ˜๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ๊น€๋Œ€๊ณต, ๋ฏผ๋™์˜ฅ, ์ด์ƒ์›, ๊น€์œค์ฃผ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, “ํŒจ์น˜๋ถ„๋ฐฐ ์‹œ์Šคํ…œ์—์„œ Unix๊ณ„์—ด ํŒจ์น˜ ์˜์กด์„ฑ ํ•ด๊ฒฐ ์—ฐ๊ตฌ๋ฐฉ์•ˆ”, WISC2004, 2004๋…„
    • ๊น€์œค์ฃผ, ์ด์ƒ์›, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, ์ตœ๋Œ€์‹, ๋ฐ•์‘๊ธฐ, “๊ณ„์ธต์  ๋ณด์•ˆ ํŒจ์น˜ ๋ถ„๋ฐฐ ์‹œ์Šคํ…œ์˜ ์•ˆ์ •์„ฑ ํ™•๋ณด๋ฅผ ์œ„ํ•œ ํ”„๋ ˆ์ž„ ์›Œํฌ ์„ค๊ณ„ ๋ฐ ๊ตฌํ˜„”, WISC2004, 2004
    • ์ด์ƒ์›, ๊น€์œค์ฃผ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, ๋ฐ•์‘๊ธฐ, “Windows ํ™˜๊ฒฝ์—์„œ์˜ ์˜์กด์„ฑ ํ•ด๊ฒฐ์„ ์œ„ํ•œ ๋ณด์•ˆํŒจ์น˜ ๋ถ„๋ฐฐ ์‹œ์Šคํ…œ ์„ค๊ณ„ ๋ฐ ๊ตฌํ˜„”, 2004 ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ๊น€์œค์ฃผ, ์ด์ƒ์›, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, ์ด์€์˜, ๋ฐ•์‘๊ธฐ, “XML์„ ์ด์šฉํ•œ ๋ณด์•ˆ ํŒจ์น˜ ์ค‘์•™ ๊ด€๋ฆฌ ์‹œ์Šคํ…œ ์„ค๊ณ„”, 2004 ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ์ด์ƒ์›, ๊น€์œค์ฃผ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, ์ด์€์˜, ์ด๋„ํ›ˆ, “์ผ๋ฐ˜ํ™”๋œ ๋ณด์•ˆํŒจ์น˜ ๋ถ„๋ฐฐ๋ฐ ๊ด€๋ฆฌ ์‹œ์Šคํ…œ์„ ์œ„ํ•œ ํ”„๋ ˆ์ž„์›Œํฌ ์„ค๊ณ„”, 2004 ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ๋ฏผ๋™์˜ฅ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, “Self-Organizing Feature Maps ๊ธฐ๋ฐ˜ IP ํŒจํ‚ท์˜ ์›œ ํƒ์ง€์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, 2004 ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ๋ฏผ๋™์˜ฅ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, “ESM ์‹œ์Šคํ…œ๊ฐ„ ๊ฐ์‚ฌ ๊ธฐ๋ก ๊ตํ™˜ ๋ฐฉ์‹์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, 2004 ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ๊น€์ข…ํ˜ธ, ์„œ์ •ํƒ, ๋ฌธ์ข…์„ญ, “Support Vector Machine์„ ์ด์šฉํ•œ Dos ํƒ์ง€์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, 2004 ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ ํ•™์ˆ ๋Œ€ํšŒ, 2004
    • ๋ฏผ๋™์˜ฅ, ์†ํƒœ์‹, ์„œ์ •ํƒ, ๊ตฌ์›๋ณธ, ์žฅ์ •์•„, ๋ฌธ์ข…์„ญ, “๋ณด์•ˆํŒจ์น˜ ์ž๋™๋ถ„๋ฐฐ๋ฅผ ์œ„ํ•œ ํŒจ์น˜ DB ์ž๋™๊ตฌ์„ฑ ๋ฐฉ์•ˆ”, ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ:ํ•™์ˆ ๋Œ€ํšŒ์ง€, 2004
    • ๋ฐ•์ข…์„ฑ, ๋ฌธ์ข…์„ญ, ์ตœ์šดํ˜ธ, “์ž๋™ํ™”๋œ ์นจํ•ด์‚ฌ๊ณ ๋Œ€์‘์‹œ์Šคํ…œ์—์„œ์˜ ๋„คํŠธ์› ํฌ๋ Œ์‹ ์ •๋ณด์— ๋Œ€ํ•œ ์—ฐ๊ตฌ”, ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ:ํ•™์ˆ ๋Œ€ํšŒ์ง€, 2004
    • ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, “Support Vector Machine์„ ์‚ฌ์šฉํ•œ ICMP ์€๋‹‰ ์ฑ„๋„ ํƒ์ง€ ๊ธฐ๋ฒ• ์—ฐ๊ตฌ”, JCCI, 2003
    • ์„œ์ •ํƒ, ์œค์ฃผ๋ฒ”, ์ž„์„๊ทœ, ์ด์ฒ ์›, ์žฅ๋ณ‘ํ™”, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, “์•ˆ์ „ํ•œ ํŒจ์น˜ ์ž๋™ ๋ถ„๋ฐฐ ๋ฐ ์„ค์น˜ ๊ธฐ๋ฒ•”, JCCI, 2003
    • ์„œ์ •์šฐ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, ์„œ์ •ํƒ, ์ด์ฒ ์›, “์‹ ๋ขฐํ™œ ์ˆ˜ ์žˆ๋Š” ํŒจ์น˜์„œ๋ฒ„ ๋ฐ ํ†ต์‹  ์ฑ„๋„์— ๋Œ€ํ•œ ์—ฐ๊ตฌ”, WISC2003, 2003
    • ๋ฌธ์ข…์„ญ, ์†ํƒœ์‹, ์„œ์ •์šฐ, ๋ฏผ๋™์˜ฅ, “Support Vector Machine์„ ์‚ฌ์šฉํ•œ ICMP ํ”„๋กœํ† ์ฝœ์˜ ์€๋‹‰ ์ฑ„๋„ ํƒ์ง€ ๋ฐฉ์•ˆ”, WISC2003, 2003
    • ์†ํƒœ์‹, ์„œ์ •์šฐ, ์„œ์ •ํƒ, ๋ฌธ์ข…์„ญ, “๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ์˜ ์€๋‹‰ ์ฑ„๋„์— ๋Œ€ํ•œ ์—ฐ๊ตฌ”, 2003 ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2003
    • ์„œ์ •์šฐ, ์†ํƒœ์‹, ์„œ์ •ํƒ, ๋ฌธ์ข…์„ญ, “Support Vector Machine์„ ์‚ฌ์šฉํ•œ ์ŠคํŒธ๋ฉ”์ผ ํƒ์ง€ ๋ฐฉ์•ˆ”, 2003 ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2003
    • ๋ฐ•์ข…์„ฑ, ๋ฌธ์ข…์„ญ, ์†ํƒœ์‹, “๋ถ„์‚ฐ๋œ ๋กœ๊ทธ ์ •๋ณด์˜ ์‹ค์‹œ๊ฐ„ ์•”ํ˜ธํ™” ๋ฐฑ์—…๋ชจ๋ธ์„ ํ†ตํ•œ ๋ฒ•์  ์‹ ๋น™์„ฑ ํš๋“์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, 2003 ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ ์ถ”๊ณ„ํ•™์ˆ ๋Œ€ํšŒ, 2003
    • ๊น€์„ ํฌ, ๋ฌธ์ข…์„ญ, ์ž„์ข…์ธ, “HFC๋ง์—์„œ์˜ VPN ์„ฑ๋Šฅ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, CISC, 2003, 2003
    • ์„œ์ •ํƒ, ์œค์ฃผ๋ฒ”, ์ตœ๋Œ€์‹, ๋ฐ•์‘๊ธฐ, ์„œ์ •์šฐ, ์†ํƒœ์‹, ๋ฌธ์ข…์„ญ, “๋ฉ€ํ‹ฐํ”Œ๋žซํผ์„ ์ง€์›ํ•˜๋Š” ํŒจ์น˜ ์ž๋™๊ด€๋ฆฌ์‹œ์Šคํ…œ”, ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ:ํ•™์ˆ ๋Œ€ํšŒ์ง€, 2003
    • ๋ฐ•์ข…์„ฑ, ๋ฌธ์ข…์„ญ, ์†ํƒœ์‹, “๋ถ„์‚ฐ๋œ ๋กœ๊ทธ ์ •๋ณด์˜ ์‹ค์‹œ๊ฐ„ ์•”ํ˜ธํ™” ๋ฐฑ์—…๋ชจ๋ธ์„ ํ†ตํ•œ ๋ฒ•์  ์‹ ๋น™์„ฑ ํš๋“์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ:ํ•™์ˆ ๋Œ€ํšŒ์ง€, 2003
    • ์„œ์ •์šฐ, ๋ฏผ๋™์˜ฅ, ๋ฌธ์ข…์„ญ, “๋‹ค์ค‘์ƒ์ฒด์ธ์‹ ์‹œ์Šคํ…œ์„ ์ด์šฉํ•œ ์‚ฌ์šฉ์ž์ธ์ฆ์— ๊ด€ํ•œ ์—ฐ๊ตฌ”, ํ•œ๊ตญ์ •๋ณด๊ณผํ•™ํšŒ:ํ•™์ˆ ๋Œ€ํšŒ์ง€, 2003

     


    ์—ฐ๊ตฌ ๋ณด๊ณ ์„œ

      2017

    • ์‘์šฉ S/W ํ†ต์‹  ํ”„๋กœํ† ์ฝœ ์—ฐ๊ตฌ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • ๋”ฅ ๋Ÿฌ๋‹์„ ์ด์šฉํ•œ ์‹œ์Šคํ…œ ๋…๋ฆฝ์  ์•…์„ฑ์ฝ”๋“œ ๋ฐ ์ทจ์•ฝ์  ํƒ์ง€ ๊ธฐ์ˆ  ๊ฐœ๋ฐœ, IITP
    • 2016

    • ๋„คํŠธ์›Œํฌ ์—ฐ๋™์žฅ์น˜์˜ ๋‚ด์žฅ ์†Œํ”„ํŠธ์›จ์–ด ๋ถ„์„ ๊ธฐ์ˆ  ์—ฐ๊ตฌ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • ๋ฐ์ดํ„ฐ ๋งˆ์ด๋‹ ๊ธฐ๋ฐ˜ ์›น ์‚ฌ์šฉ์ž ํ–‰์œ„ ๋ถ„์„์„ ํ†ตํ•œ ์ด์ƒ ์ง•ํ›„ ํƒ์ง€ ์‹œ์Šคํ…œ, ์ค‘์†Œ๊ธฐ์—…์ฒญ
    • 2011

    • ํผ๋ธ”๋ฆญ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค์—์„œ์˜ ๋„คํŠธ์›Œํฌ ์นจํ•ด ๋Œ€์‘ ๋ฐฉ์•ˆ ์—ฐ๊ตฌ, (์ฃผ)์ด๋…ธ๊ทธ๋ฆฌ๋“œ
    • ๋ฉ”๋ชจ๋ฆฌ๋คํ”„ ๊ณต๊ฒฉ ๊ธฐ๋ฒ• ๋ถ„์„ ๋ฐ ๋Œ€์‘์— ๊ด€ํ•œ ์—ฐ๊ตฌ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • 2010

    • ์‹คํ–‰์••์ถ•๋œ ์•…์„ฑ์ฝ”๋“œ ์ž๋™ ๋ถ„์„์„ ์œ„ํ•œ ๋ฌด๋ ฅํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์—ฐ๊ตฌ, ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›
    • ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ์•„ํ‚คํ…์ฒ˜ ๋ ˆ์ด์–ด๋ณ„ ๋ณด์•ˆ์ทจ์•ฝ์  ๋ถ„์„, ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›
    • 2009

    • ๊ตญ๊ฐ€ ์Šˆํผ์ปดํ“จํŒ… ๊ณต๋™ ํ™œ์šฉ ์ฒด์ œ ํ™˜๊ฒฝ์˜ ๋ณด์•ˆ ์ฒด๊ณ„ ๊ตฌ์ถ•์— ๋Œ€ํ•œ ์—ฐ๊ตฌ, ํ•œ๊ตญ๊ณผํ•™๊ธฐ์ˆ ์ •๋ณด์›
    • ๋„คํŠธ์›Œํฌ ์ทจ์•ฝ์  ์ ๊ฒ€ ํ•ญ๋ชฉ ํ•œ๊ธ€ํ™”, (์ฃผ)์ด๊ธ€๋ฃจ์‹œํ๋ฆฌํ‹ฐ
    • 2008

    • ์ปค๋„๊ธฐ๋ฐ˜ ๋ฐ์ดํ„ฐ ๋ถ„์„์„ ํ†ตํ•œ ์นจํˆฌ์‹œํ—˜ ๋ชจ๋ธ์— ๊ด€ํ•œ ์—ฐ๊ตฌ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • ๊ฐ€์ƒ์‚ฌ์ด๋ฒ„/๋ฐฉ์–ด์ฒด๊ณ„์— ๋Œ€ํ•œ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ธฐ์ˆ (1๋‹จ๊ณ„), ๊ตญ๋ฐฉ๊ณผํ•™์—ฐ๊ตฌ์†Œ
    • ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ ๋ชจ๋ธ๋ง ๋ฐฉ๋ฒ•์— ๊ด€ํ•œ ์—ฐ๊ตฌ, ํ•œ๊ตญํ•™์ˆ ์ง„ํฅ์žฌ๋‹จ
    • 2007

    • ์‹œ์Šคํ…œ ํฌ๋ Œ์‹ ๊ด€์ ์—์„œ์˜ ๋กœ๊ทธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘ ๋ฐ ๋ถ„์„์— ๊ด€ํ•œ ์—ฐ๊ตฌ ๊ฐœ๋ฐœ, (์ฃผ)๋””์ง€ํ„ธ์‹œํ
    • ์›น ์‘์šฉ ์ œํ’ˆ ์นจํˆฌ์‹œํ—˜ ๊ธฐ์ˆ ์˜ ํ™•๋ฅ ์  ๋น„๊ต ๋ถ„์„์— ๊ด€ํ•œ ์—ฐ๊ตฌ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • 2006

    • ์›น ์‘์šฉ ์ œํ’ˆ ์นจํˆฌ์‹œํ—˜ ๊ธฐ์ˆ ์˜ ๋น„๊ต ๋ถ„์„์— ๊ด€ํ•œ ์—ฐ๊ตฌ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • 2005

    • ์„ผ์„œ๋„คํŠธ์›Œํฌ๋ฅผ ์œ„ํ•œ ๋ณด์•ˆ ํ”„๋กœํ† ์ฝœ ๊ฐœ๋ฐœ, ํ•œ๊ตญ์ „์žํ†ต์‹ ์—ฐ๊ตฌ์›
    • ์ธํ„ฐ๋„ท ์›œ ๋™์ž‘ ๋ฐ ์ „ํŒŒ ํŠน์„ฑ ๋ชจ๋ธ๋ง ๊ธฐ๋ฒ• ์—ฐ๊ตฌ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • ํ™•์žฅ ๊ฐ€๋Šฅํ•œ ๋‹ค๊ณ„์ธต ํŒจ์น˜ ๋ถ„๋ฐฐ ๊ธฐ์ˆ , ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • 2003

    • ๋ฉ€ํ‹ฐํ”Œ๋žซํผ ํ™˜๊ฒฝ์—์„œ์˜ ์•ˆ์ „ํ•œ ๋ณด์•ˆํŒจ์น˜ ๊ด€๋ฆฌ ํ”„๋ ˆ์ž„์›Œํฌ ๊ฐœ๋ฐœ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • Adaptive Resonance Theory๋ฅผ ์‚ฌ์šฉํ•œ ๋„คํŠธ์›Œํฌ ์ƒ์˜ ์นจ์ž…ํƒ์ง€ ์‹œ์Šคํ…œ ์—ฐ๊ตฌ, ๊ณ ๋ ค๋Œ€ํ•™๊ต
    • 2002

    • ๋ณด์•ˆํŒจ์น˜ ์ž๋™๋ถ„๋ฐฐ์— ๊ด€ํ•œ ์—ฐ๊ตฌ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ
    • ๋ณด์•ˆ๋„๊ตฌ ์šฐํšŒ๊ณต๊ฒฉ ๋ฐ ๋ฐฉ์–ด์— ๊ด€ํ•œ ์—ฐ๊ตฌ, ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธ์ง„ํฅ์›
    • ์ƒ๋ฌผํ•™์  ์‹œ๊ฐ์˜ ํŠน์„ฑ์„ ์ด์šฉํ•œ ๋‚ด์šฉ๊ธฐ๋ฐ˜ ์˜์ƒ ๊ฒ€์ƒ‰, ์ •๋ณดํ†ต์‹ ์—ฐ๊ตฌ์ง„ํฅ์›
    • ์ฒฉ๋ณด์—์ด์ „ํŠธ ํ™œ์„ฑํ™”๋ฅผ ์œ„ํ•œ ์นจ์ž…์ž ํŒ๋ณ„ ๊ธฐ์ˆ  ์—ฐ๊ตฌ, ๊ตญ๊ฐ€๋ณด์•ˆ๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ