Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where DongHwi Lee is active.

Publication


Featured researches published by DongHwi Lee.


Multimedia Tools and Applications | 2015

User-centered innovative technology analysis and prediction application in mobile environment

Jinhyung Kim; Do-Heon Jeong; DongHwi Lee; Hanmin Jung

Business intelligence is a critical in defining the strategy and roadmap of organizations. However, business intelligence covers too much wide coverage to consider all of fields such as data analytics, text mining, predictive analytics, and so on. Among these fields, the most important is information analysis and prediction. Therefore, we suggest a business intelligence application based on the adaptive recognition of user intention and usage patterns in the mobile environment. This application is named InSciTe Adaptive and is based on text mining and semantic web technologies. It supports technology-focused analysis and predictions, such as technology trends analysis, element technology analysis, and convergence technology discovery, as well as adaptive recognition of the user’s intention by using semi-automatic user modeling processes. Through adaptive user modeling, this application can provide a more dynamic service flow and more up-to-date analysis results based on the user’s intention, compared to existing applications, which provide static analysis results and service flow.


international conference on information science and applications | 2011

A Study on Malicious Codes Pattern Analysis Using Visualization

DongHwi Lee; In Soo Song; Kuinam J. Kim; Jun-hyeon Jeong

The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has dramatically increasing, and new or variant malicious code circulation very serious, So it is time to require analysis about malicious code. The being so malicious code pattern extract for malicious code properties of anti-virus company. Visualization possible to make one image for thousands upon thousands of malicious code. and It is possible to extract unseen pattern. Therefore this paper of object is various malicious code analysis besides new or variant malicious code type or form deduction using visualization of strong. Thus this paper proposes unseen malicious code pattern extract.


Multimedia Tools and Applications | 2015

A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention

Kyong-Ho Choi; DongHwi Lee

Systematic security policies and plans of many organizations or enterprises can be degraded due to user’s inattention and unconcern. Therefore, it is very important to guide establishing security policies through the education for users. However, existing security awareness program has problems that is not reflect for different user’s security level and not evaluation of the security policy that is established and implemented, because it use educating for users in the form of a cluster education on uniform contents. Thus in this study, we proposed a strengthening security awareness program using an intensive training method for users based on detecting violations of the established security policy. For detecting violation of established security policy, we use a physical access control method by RFID that protects data from an information system accessed by unauthorized persons through physical ways for visual checking. The strengthening security awareness program proposed in this study increases security levels for the users who have low security awareness levels and can intercept potential leakage paths of important information through improving minimum security levels in organizations or enterprises.


Multimedia Tools and Applications | 2015

A study on stable web server system using virtualization technology against attacks

Hwan-Seok Yang; DongHwi Lee; Seung-Jae Yoo

Computing environment has greatly changed by development of computing technology and distribution of extensive network. But the damage is taken seriously while attack techniques are diverse and attack target also is increasing. Thus, the normal network service should be done coping with these attacks actively. In this study, we propose new technique that can provide collection of attack information using virtualization technology and stable web service. The collection of attack information is done dynamically in honey system and managed by HSC. The continuous service of web server is performed by LBC. The superior performance of proposed method is confirmed through experiment.


Wireless Personal Communications | 2013

A Novel Secure Scheme For Wireless Ad Hoc Network

Seung-Jae Yoo; DongHwi Lee; Hwan-Seok Yang

Performance of data access is quite degraded in wireless mobile network due to limited resources and low bandwidth. Cache technique is one of widely used technique to improve performance of data search. But, it has vulnerability easily exposed to many attacks. In this paper, we propose a technique which prevents modification of cache data from malicious node and provides efficient cache. In the proposed technique, member key is used in order to prevent malicious nodes from joining in network. Cluster head is elected based on reliability value and the number of connection after MANET is divided into clusters. It evaluates reliability of MN based on received reliability value from neighbor nodes and issues member key. MNs request cache using member key and transmit data. Cluster head manages two tables to provide efficient cache. Transmission delay and overhead is reduced by doing so. We confirmed superior performance of the proposed technique through the experiment results.


international conference on it convergence and security, icitcs | 2013

A Study on the Real-Time Location Tracking Systems Using Passive RFID

Minsu Kim; DongHwi Lee; Kuinam J. Kim

The location awareness technology is a core technology to be expanded to include objects from human-oriented informatization, and active support actions have been performed in developed countries such as the United States and Japan to implement the location awareness technology and Real Time Location System (RTLS) tag and antenna technology for real-time location tracking through a variety of projects for years. However, problems have been posed by Global Positioning System (GPS) based on the location awareness technology and active bat system using sound waves in terms of the space and construction costs. In this regard, this study attempted to suggest passive RFIF-based Indoor Positioning System (IPS) for tracking the location of the moving objects (humans and assets) in real time.


international conference on it convergence and security, icitcs | 2013

A Study on the Occurrence of Crimes Due to Climate Changes Using Decision Tree

Jong Min Kim; Hwang-Kwon Ahn; DongHwi Lee

In this study, we figured out what relationship the elements (weather, temperature, precipitation, wind speed, humidity) of meteorological changes have with the incidence of the five violent crimes through data mining. For the data used in this study, the number of meteorological occurrences from January 1, 2011 to March 30, 2012 through portal sites and the elements of meteorological changes of the day recorded in the Korea Meteorological Administration were used as materials. In this study, an analysis was made using the C4.5 algorithm of decision tree to verify what crimes occur according to the elements of the climate change. As a result of such an analysis, most of the crimes were high in the incidence in the following meteorological conditions: when the weather is cloudy; when the temperature is more than 9 °C; when the precipitation is less than 10 mm; when the wind speed is less than 4 m/s; and the humidity is more than 50 %. Given these meteorological conditions, cloudy weather showed the highest rate of crime incidence.


Wireless Personal Communications | 2013

A Study on Convergence Security System for Preventing Leakage of Internal Information

Minsu Kim; DongHwi Lee; Kuinam J. Kim

Real-time tracing system blocks the used ports such as FTP, messenger, cloud and etc. to detect abnormal symptom such as leakage of internal information inside based on location tracing of the visitors as well as the internal staffs and operates mail backup server for mail management together with TCP packet monitoring as IPS that tracks the positions of moving objects (human and properties) using passive RFID, and I am willing to suggest the study of convergence security system that can prevent the leakage of internal information and trace the person who leaks the information.


international conference on information science and applications | 2011

A Study on Analysis of Malicious Codes Similarity Using N-Gram and Vector Space Model

DongHwi Lee; Won Hyung Park; Kuinam J. Kim

The development of Information and Communication gives a lot of convenience in our lives, but on the other hand, the new cyber threat like viruses, computer intrusions and so on also increases. Especially, malicious codes such as viruses over the internet are distributed in large quantities. Several studies using reverse engineering or virtual machine have been carried out to analyze malicious codes, but studies on the analysis of the implications or the similarities between malicious codes have not been carried out in variety. Therefore, we suggest the analysis of similarity using N-Gram and Vector Space Model in this paper. The results shows that we can distinguish malicious codes from others using this method.


Multimedia Tools and Applications | 2014

ETL-based interoperable data management system

Wongoo Lee; Min-Ho Lee; Yun-Soo Choi; Donghoon Choi; Min-Hee Cho; Sa-Kwang Song; Hanmin Jung; DongHwi Lee; Hwa-Mook Yoon

An explosive increase of information and demand for inter-contents association knowledge has made clear the need for integrated contents management. With contents being managed in various ways, the issue of maintaining interoperability among data also has been a consistent concern. This paper proposes possible solutions for the integration of contents management and the unification of the management processes. It has been proven that the e-Tracer system is easy to use and appropriate to the integration of metadata through user’s usage and it is able to maintain interoperability for different types of contents.

Collaboration


Dive into the DongHwi Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hanmin Jung

Korea Institute of Science and Technology Information

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Won Hyung Park

Seoul National University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Do-Heon Jeong

Korea Institute of Science and Technology Information

View shared research outputs
Top Co-Authors

Avatar

Hwa-Mook Yoon

Korea Institute of Science and Technology Information

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge