{"id":1205,"date":"2018-02-17T15:34:12","date_gmt":"2018-02-17T06:34:12","guid":{"rendered":"http:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=1205"},"modified":"2026-04-01T14:17:25","modified_gmt":"2026-04-01T05:17:25","slug":"awards","status":"publish","type":"page","link":"https:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=1205","title":{"rendered":"Awards"},"content":{"rendered":"<h2>2025<\/h2>\n<ol>\n<li>\uc1a1\ubbfc\ud76c, &#8220;On-Device AI \ubaa8\ub378 \uc18c\uc720\uad8c \uc99d\uba85\uc744 \uc704\ud55c \uc6cc\ud130\ub9c8\ud0b9 \ud504\ub808\uc784\uc6cc\ud06c&#8221;,\u00a0<em>\uc138\uc885\ub300\ud559\uad50 \uc815\ubcf4\ubcf4\ud638\ud559\uacfc 2025\ud559\ub144\ub3c4 \ud559\uc220\uc81c<\/em>, 2025\ub144 11\uc6d4 28\uc77c (\ucd5c\uc6b0\uc218\uc0c1)<\/li>\n<li>\ubbfc\uc724\ud64d, &#8220;Dual-Recovery SEIR \ud655\uc7a5 \ubaa8\ub378\uc744 \ud65c\uc6a9\ud55c \uc5f0\ud569\ud559\uc2b5 \uc624\uc5fc \uacf5\uaca9 \ubc29\uc5b4 \uc804\ub7b5 \ubd84\uc11d&#8221;, <em>\uc138\uc885\ub300\ud559\uad50 \uc815\ubcf4\ubcf4\ud638\ud559\uacfc 2025\ud559\ub144\ub3c4 \ud559\uc220\uc81c<\/em>, 2025\ub144 11\uc6d4 28\uc77c (\uc6b0\uc218\uc0c1)<\/li>\n<li>\uc774\uc9c4\uc218, \uae40\uc9c0\ud61c, \uc774\ud558\ub298, \uc774\uc885\ud601, \u201c\ubd84\uc0b0\uc6d0\uc7a5 \uae30\ubc18 \ubd84\uc0b0\uc2e0\uc6d0\uad00\ub9ac \uc2dc\uc2a4\ud15c\uc5d0\uc11c\uc758 \uc2e0\ub8b0 \uc575\ucee4\uc5d0 \ub300\ud55c \uac1c\uc778\uc815\ubcf4\ubcf4\ud638 \ubc29\uc548 \uc5f0\uad6c\u201d,\u00a0<em>2025 \ud45c\uc900\uc778\uc99d\uc548\uc804\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c<\/em>, 2025\ub144 10\uc6d4 31\uc77c(\uc6b0\uc218\ub17c\ubb38\uc0c1)<\/li>\n<li>\uad8c\uc21c\ud64d, \uc190\uc6b0\uc601, \uc774\uc885\ud601, \u201cPolicy-Driven Contextual Risk Evaluation in OAuth 2.0 Authentication Frameworks for AI chatbot-based RPA Systems\u201d,\u00a0<em>2025\ub144 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804<\/em>, 2025\ub144 10\uc6d4 23\uc77c(\ud2b9\ubcc4\uc0c1)<\/li>\n<li>\uc190\uc6b0\uc601, \uad8c\uc21c\ud64d, \uc774\uc885\ud601, \u201cGNN-Based Predictive Model for Adversarial Cyber Behavior Using the MITRE ATT&amp;CK\u201d,\u00a0<em>2025\ub144 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804<\/em>, 2025\ub144 10\uc6d4 23\uc77c(\ud2b9\ubcc4\uc0c1)<\/li>\n<li>\uc1a1\ubbfc\ud76c, \ubc15\uc7ac\ud615, \uc6b0\uc2b9\ucc2c, \uc774\uc885\ud601, \u201cOn-Device AI \ubaa8\ub378 \uc18c\uc720\uad8c \uc99d\uba85\uc744 \uc704\ud55c \uc6cc\ud130\ub9c8\ud0b9 \ud504\ub808\uc784\uc6cc\ud06c\u201d,\u00a0<em>2025 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ucda9\uccad\uc9c0\ubd80 \ud559\uc220\ub300\ud68c<\/em>, 2025\ub144 9\uc6d4 30\uc77c(\uc6b0\uc218\ub17c\ubb38\uc0c1)<\/li>\n<li>\uc774\uc885\ud601, &#8220;Best Editor Award&#8221;, <em>ICT Express<\/em>, 2025\ub144 7\uc6d4 9\uc77c<\/li>\n<li>\uc774\ud0dc\uc591, &#8220;Best Reviewer Award&#8221;, <em>ICT Express<\/em>, 2025\ub144 7\uc6d4 9\uc77c<\/li>\n<li>\uc774\ud558\ub298, &#8220;Best Reviewer Award&#8221;, <em>ICT Express<\/em>, 2025\ub144 7\uc6d4 9\uc77c<\/li>\n<li>\uae40\uc9c0\ud61c, &#8220;Best Reviewer Award&#8221;, <em>ICT Express<\/em>, 2025\ub144 7\uc6d4 9\uc77c<\/li>\n<li>\uc190\uc6b0\uc601, \uad8c\uc21c\ud64d, \uc774\uc885\ud601, &#8220;Advanced Acoustic Covert Channel Techniques for Air-Gap Evasion: Signal Optimization and Security Implications in Cyber Warfare&#8221;\u00a0, <em>\ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ubd80\ucc44\ub110\uc815\ubcf4\ubd84\uc11d \uacbd\uc9c4\ub300\ud68c<\/em>, 2025\ub144 7\uc6d4 2\uc77c(\ub300\ud55c\uc804\uc790\uacf5\ud559\ud68c \ud68c\uc7a5\uc0c1)<\/li>\n<li>\uc190\uc6b0\uc601, \uad8c\uc21c\ud64d, \uc774\uc885\ud601, \u201cSEIR \uc804\uc5fc\ubcd1 \ud655\uc0b0 \ubaa8\ub378\uc744 \ud65c\uc6a9\ud55c AI Chatbot \uae30\ubc18 RPA \uc2dc\uc2a4\ud15c \ubcf4\uc548 \uc704\ud611 \ubd84\uc11d\u201d,\u00a0<span class=\"notion-enable-hover\" data-token-index=\"3\"><em>\ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c<\/em>,\u00a0<\/span>2025\ub144 06\uc6d4 24\uc77c(\uc6b0\uc218\ub17c\ubb38\uc0c1)<\/li>\n<li>\uc190\uc6b0\uc601, &#8220;ATT-LAS: ATT&amp;CK-based Multi-Cloud Log Analytics for Scenario Prediction Dashboard&#8221;, <em>\uc138\uc885\ub300\ud559\uad50 2025\ub144 \uc815\ubcf4\ubcf4\ud638 \ucea1\uc2a4\ud1a4\ub514\uc790\uc778 \uacbd\uc9c4\ub300\ud68c<\/em>, 2025\ub144 6\uc6d4 24\uc77c (\ucd5c\uc6b0\uc218\uc0c1)<\/li>\n<li>\uc190\uc6b0\uc601, \uad8c\uc21c\ud64d, \uc774\uc885\ud601, &#8220;\ub2e4\uc0c9 \uac15\ub3c4 \uc870\uc815 \uae30\ubc18 \uad11\ud559 \uc2e0\ud638 \uc5d0\uc5b4\uac2d \uacf5\uaca9\u201d, <em>\ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c<\/em>, 2025\ub144 2\uc6d4 7\uc77c(\uc6b0\uc218\ub17c\ubb38\uc0c1)<\/li>\n<\/ol>\n<h2>2024<\/h2>\n<ol>\n<li>\uc190\uc6b0\uc601, \uc774\uc815\ubbfc, &#8220;Noise Cancellation System-Echo Shield&#8221;,<em> oneM2M International Hackathon 2024<\/em>, 2024\ub144 12\uc6d4 13\uc77c (3rd Place Awarded)<\/li>\n<li>\uc190\uc6b0\uc601, \uad8c\uc21c\ud64d, \uc774\uc815\ubbfc, \uc774\uc885\ud601, &#8220;Exploration of Optimal Frequency Bands for Acoustic Signal Air-Gap Attacks&#8221;, <em>\uc138\uc885\ub300\ud559\uad50 \uc815\ubcf4\ubcf4\ud638\ud559\uacfc 2024\ud559\ub144\ub3c4 \ud559\uc220\uc81c<\/em>, 2024\ub144 11\uc6d4 29\uc77c (\ucd5c\uc6b0\uc218\uc0c1)<\/li>\n<li>\uae40\uc9c0\ud61c, \uc774\uc9c4\uc218, \uc774\uc885\ud601, &#8220;\ubd84\uc0b0\uc6d0\uc7a5 \uae30\ubc18 \ubd84\uc0b0\ud615 \uc2e0\uc6d0\uad00\ub9ac \uc2dc\uc2a4\ud15c\uc5d0\uc11c\uc758 \uc2e0\ub8b0 \uc575\ucee4\uc5d0 \uc758\ud55c \uac1c\uc778\uc815\ubcf4 \ucc98\ub9ac \ubc29\uc548 \uc5f0\uad6c&#8221;, <em>2024 \ud45c\uc900\uc778\uc99d\uc548\uc804\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c<\/em>, 2024\ub144 11\uc6d4 9\uc77c(\uc6b0\uc218\ub17c\ubb38\uc0c1)<\/li>\n<li>\uad8c\uc21c\ud64d, \uc190\uc6b0\uc601, \uc774\uc885\ud601, &#8220;AI Chatbot\uc744 \ud1b5\ud55c RPA \uc2dc\uc2a4\ud15c\uc5d0\uc11c\uc758 \ucee8\ud14d\uc2a4\ud2b8 \uae30\ubc18 OAuth 2.0 \ud1b5\ud569 \uc778\uc99d \ud504\ub808\uc784\uc6cc\ud06c&#8221;,\u00a0<em>\ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ucda9\uccad\uc9c0\ubd80 \uc815\ubcf4\ubcf4\ud559\uc220\ub17c\ubb38\ubc1c\ud45c\ub300\ud68c, <\/em>2024\ub144 9\uc6d4 27\uc77c(\uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc7a5\uc0c1)<\/li>\n<li>\uae40\uc9c0\ud61c, \ubc15\uc7ac\ud615, \uc774\uc885\ud601, &#8220;ARP Spoofing Mitigation for the E2 Interface in Open RAN: AN xApp Approach&#8221;, WISA 2024, 2024\ub144 8\uc6d4 22\uc77c(Best Paper)<\/li>\n<li>\uc190\uc6b0\uc601, \uad8c\uc21c\ud64d, \uc774\uc885\ud601, \u201cOptimal Frequency Range Exploration for Acoustic Signal Air-Gap Attacks\u201d, <em>\ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ubd80\ucc44\ub110\uc815\ubcf4\ubd84\uc11d \uacbd\uc9c4\ub300\ud68c<\/em>, 2024\ub144 7\uc6d4 4\uc77c(\ub300\ud55c\uc804\uc790\uacf5\ud559\ud68c \ud68c\uc7a5\uc0c1)<\/li>\n<li>\uc774\ud558\ub298, \uc774\uc885\ud601, \u201cIIoT \uae30\ubc18 \uc2a4\ub9c8\ud2b8\uacf5\uc7a5 \ubcf4\uc548\uc744 \uc704\ud55c \uad6d\uc81c \ud45c\uc900\ud654 \ub3d9\ud5a5\u201d, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c ASK 2024, 2024\ub144 5\uc6d4 24\uc77c(\uc6b0\uc218\ub17c\ubb38\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uc774\uc885\ud601, \uc5f0\uad6c\uc6b0\uc218\uad50\uc218\uc0c1, \uc138\uc885\ub300\ud559\uad50, 2024\ub144 2\uc6d4 27\uc77c<\/li>\n<\/ol>\n<h2>2023<\/h2>\n<ol>\n<li>\uad8c\uc21c\ud64d, \uc190\uc6b0\uc601, \uc774\uc885\ud601, &#8220;VDIRS: Vulnerable Docker Image Response System&#8221;, ICEA 2023, 2023\ub144 12\uc6d4 14\uc77c(Best Paper Award Gold \ucd5c\uc6b0\uc218 \ub17c\ubb38\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uc774\uc885\ud601, \uc774\ud0dc\uc591, &#8220;\ubaa8\ubc14\uc77c \uc2e0\ubd84\uc99d \u2013 \uc81c1\ubd80: \ubd84\uc0b0 \uc2dd\ubcc4\uc790 \uae30\ubc18 \ubaa8\ubc14\uc77c \uc6b4\uc804\uba74\ud5c8\uc99d(TTAK.KO-10.1502-Part1)&#8221;, \uc6b0\uc218\ud45c\uc900 \uc218\uc0c1, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\uae30\uc220\ud611\ud68c(TTA), 2023\ub144 12\uc6d4 6\uc77c<\/li>\n<li>\ubc15\uc7ac\ud615, \uc6b0\uc2b9\ucc2c, \uc774\uc885\ud601, &#8220;\ucfe0\ubc84\ub124\ud2f0\uc2a4 \uae30\ubc18 \ub2e4\uc911 5G-Advanced SA \ucf54\uc5b4 \ub124\ud2b8\uc6cc\ud06c \uad00\ub9ac \ubc0f NF \ub9ac\uc18c\uc2a4 \ubaa8\ub2c8\ud130\ub9c1 \uc2dc\uc2a4\ud15c&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2023\ub144 12\uc6d4 2\uc77c(\ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc7a5\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uc774\uc885\ud601, \uacfc\ud559\uae30\uc220\uc815\ubcf4\ud1b5\uc2e0\ubd80 \uc7a5\uad00 \ud45c\ucc3d, \uacfc\ud559\uae30\uc220\uc815\ubcf4\ud1b5\uc2e0\ubd80, 2023\ub144 11\uc6d4 15\uc77c<\/li>\n<li>\uad8c\uc21c\ud64d, \uc190\uc6b0\uc601, \uc774\uc885\ud601, &#8220;5G-Advanced \ud658\uacbd\uc5d0\uc11c \ucfe0\ubc84\ub124\ud2f0\uc2a4 \uae30\ubc18 MEC \ud50c\ub7ab\ud3fc\uc744 \uc704\ud55c \ubcf4\uc548 \uad00\uc81c \uc2dc\uc2a4\ud15c&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ucda9\uccad\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2023\ub144 9\uc6d4 8\uc77c(\ud55c\uad6d\uacfc\ud559\uae30\uc220\uc815\ubcf4\uc5f0\uad6c\uc6d0(KISTI) \uc6d0\uc7a5\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uc774\ud558\ub298, \uae40\uc9c0\ud61c, \uc6b0\uc2b9\ucc2c, et al., &#8220;\uc774\uc0c1\uc9d5\ud6c4 \ud0d0\uc9c0\ub97c \uc704\ud55c \uac70\uc2dc\uc801 \uad00\uc810\uc5d0\uc11c\uc758 \ub370\uc774\ud130 \uc2dc\uac01\ud654 \ud504\ub808\uc784\uc6cc\ud06c&#8221;, <em>2023\ub144 \ubd80\ucc44\ub110\uc815\ubcf4\ubd84\uc11d \uacbd\uc9c4\ub300\ud68c<\/em>, 2023\ub144 7\uc6d4 6\uc77c (\ubd80\ucc44\ub110\ubd84\uc11d\uc5f0\uad6c\ud68c \ud68c\uc7a5\uc0c1)<\/li>\n<\/ol>\n<h2>2022<\/h2>\n<ol>\n<li>\uc6b0\uc2b9\ucc2c, \uae40\uc9c0\ud61c, \uc720\ub7fd\uc804\uae30\ud1b5\uc2e0\ud45c\uc900\ud611\ud68c(ETSI) \uc6d0\uc7a5\uc0c1 \uc218\uc0c1, \uc81c6\ud68c oneM2M \uad6d\uc81c \ud574\ucee4\ud1a4, 2022\ub144 11\uc6d4 28\uc77c<\/li>\n<li>\uc774\uc885\ud601, \ud589\uc815\uc548\uc804\ubd80 \uc7a5\uad00 \ud45c\ucc3d, \ud589\uc815\uc548\uc804\ubd80, 2022\ub144 4\uc6d4 21\uc77c<\/li>\n<\/ol>\n<h2>2021<\/h2>\n<ol>\n<li>\uc774\ud0dc\uc591, \ubc15\uc7ac\ud615, \uc774\uc885\ud601, &#8220;B5G\ub97c \uc704\ud55c \ub124\ud2b8\uc6cc\ud06c \uc2ac\ub77c\uc774\uc2f1 \ud504\ub85c\ube44\uc800\ub2dd \ub2e8\uacc4\ubcc4 \ubcf4\uc548\uc704\ud611 \ubd84\uc11d&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2021\ub144 11\uc6d4 27\uc77c(\ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0(KISA) \uc6d0\uc7a5\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uc774\uc885\ud601, &#8220;Best Editor Award&#8221;, ICT Express, 2021\ub144 8\uc6d4<\/li>\n<li>\ucd5c\ucc3d\uc900, &#8220;Best Reviewer Award&#8221;, ICT Express, 2021\ub144 8\uc6d4<\/li>\n<li>\uad8c\uc21c\ud64d, &#8220;Best Reviewer Award&#8221;, ICT Express, 2021\ub144 8\uc6d4<\/li>\n<li>\uad8c\uc21c\ud64d, \ucd5c\ucc3d\uc900, \uc624\uc131\ud754, \uc774\uc885\ud601, &#8220;\ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638\ub97c \uc704\ud55c DID \uae30\ubc18 \ubd88\ubc95 \ucf58\ud150\uce20 \ucd94\uc801 \uc2dc\uc2a4\ud15c \uc124\uacc4&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ucda9\uccad\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021\ub144 8\uc6d4 27\uc77c(\uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c \uc18c\uc7a5\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uc774\uc885\ud601, &#8220;WISA \uacf5\ub85c\uc0c1&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 2021\ub144 8\uc6d4 12\uc77c<\/li>\n<\/ol>\n<h2>2020<\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;Best Editor Award&#8221;, ICT Express, 2020\ub144 7\uc6d4\u00a0 31\uc77c<\/li>\n<li>\ucd5c\uc11c\uc724, \uc774\uc885\ud601, &#8220;IoT \ud658\uacbd\uc5d0\uc11c\uc758 \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ubd84\uc0b0\ub41c \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc5c5\ub370\uc774\ud2b8 \uc544\ud0a4\ud14d\ucc98&#8221;, \ud55c\uad6d\uc2a4\ub9c8\ud2b8\ubbf8\ub514\uc5b4\ud559\ud68c \ucd98\uacc4\ud559\uc220\ub300\ud68c, 2020\ub144 5\uc6d4 23\uc77c (\uc6b0\uc218\ub17c\ubb38\uc0c1 \uc218\uc0c1)<\/li>\n<\/ol>\n<h2>2019<\/h2>\n<ol>\n<li>\uba85\uc138\uc778, \uc774\uc885\ud601, &#8220;MEC \ud658\uacbd\uc5d0\uc11c\uc758 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uc7ac\ubc30\uce58 \ubd84\uc11d&#8221;, \ud55c\uad6d\uc2a4\ub9c8\ud2b8\ubbf8\ub514\uc5b4\ud559\ud68c \ucd98\uacc4\ud559\uc220\ub300\ud68c, 2019\ub144 4\uc6d4 27\uc77c (\uc6b0\uc218\ub17c\ubb38\uc0c1 \uc218\uc0c1)<\/li>\n<\/ol>\n<h2>2018<\/h2>\n<ol>\n<li>\uc0c1\uba85\ub300 \ubcf4\uc548\ub3d9\uc544\ub9ac\u00a0CodeCure (\uc9c0\ub3c4\uad50\uc218: \uc774\uc885\ud601), \ub9ac\ud3ec\ud130\uc0c1 \uc218\uc0c1,\u00a0\ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0, 2018\ub144 12\uc6d4 19\uc77c<\/li>\n<li>\uc774\uc885\ud601, &#8220;Anonymous Authentication for Wireless Body Area Networks with Provable Security&#8221;, 2018 IEEE Systems Journal Best Paper Award, 2018\ub144 10\uc6d4 2\uc77c<\/li>\n<li>\uc774\uc885\ud601, 2017\ub144\ub3c4 \uad50\uc218\uc5c5\uc801\ud3c9\uac00 \uc6b0\uc218\uad50\uc6d0 \ud45c\ucc3d, \uc0c1\uba85\ub300\ud559\uad50, 2018\ub144 8\uc6d4 21\uc77c<\/li>\n<li>\ucd5c\uc11c\uc724, \uba85\uc138\uc778, \ubb38\uae30\uc6b4, \uc774\uc885\ud601, &#8220;\ub9c8\uc774\ud06c\ub85c\uadf8\ub9ac\ub4dc \ud658\uacbd\uc5d0\uc11c\uc758 \uc2a4\ub9c8\ud2b8 \ucee8\ud2b8\ub799\ud2b8 \uae30\ubc18 \ube44\uacf5\uac1c \uc804\ub825 \uacbd\ub9e4&#8221;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2018\ub144 6\uc6d4 21\uc77c (\uc6b0\uc218\ub17c\ubb38 \uc7a5\ub824\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uba85\uc138\uc778, \uacfd\uc218\uc9c4, \ucd5c\uc11c\uc724, \uc774\uc885\ud601, &#8220;\uc774\ub354\ub9ac\uc6c0 RLPx, Wire \ud504\ub85c\ud1a0\ucf5c \ubd84\uc11d&#8221;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2018\ub144 6\uc6d4 20\uc77c (\uc6b0\uc218\ub17c\ubb38\uc0c1 \uc218\uc0c1)<\/li>\n<\/ol>\n<h2><strong>2017<\/strong><\/h2>\n<ol>\n<li>\uc774\uc885\ud601, \ud574\ub3d9\uc2e0\uc9c4\ud559\uc220\uc0c1,\u00a0\ud574\ub3d9\uacfc\ud559\ubb38\ud654\uc7ac\ub2e8\/\ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 2017\ub144 12\uc6d4 1\uc77c<\/li>\n<li>\uc0c1\uba85\ub300 \ubcf4\uc548\ub3d9\uc544\ub9ac\u00a0CodeCure (\uc9c0\ub3c4\uad50\uc218: \uc774\uc885\ud601), \ub9ac\ud3ec\ud130\uc0c1 \uc218\uc0c1,\u00a0\ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0, 2017\ub144 12\uc6d4 21\uc77c<\/li>\n<li>\uc774\uc885\ud601, \ub300\ud55c\ubbfc\uad6d\uc778\ubb3c\ub300\uc0c1(\ud559\uc220-\uc18c\ud504\ud2b8\uc6e8\uc5b4 \ubd84\uc57c),\u00a0\ub300\ud55c\ubbfc\uad6d\uc778\ubb3c\ub300\uc0c1\uc120\uc815\uc704\uc6d0\ud68c\/\uc5f0\ud569\ub9e4\uc77c\uc2e0\ubb38, 2017\ub144 11\uc6d4 3\uc77c<\/li>\n<li>\uc774\uc885\ud601, 2016\ub144\ub3c4 \uad50\uc218\uc5c5\uc801\ud3c9\uac00 \uc6b0\uc218\uad50\uc6d0 \ud45c\ucc3d, \uc0c1\uba85\ub300\ud559\uad50, 2017\ub144 8\uc6d4 17\uc77c<\/li>\n<li>\uc774\uc131\ubc94, \uc774\ubd80\ud615, \uba85\uc138\uc778, \uc774\uc885\ud601, \u201c\ube14\ub85d\uccb4\uc778 \ub3d9\uc791 \uacfc\uc815\uc5d0 \ub530\ub978 \ubcf4\uc548 \ubd84\uc11d\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ubc1c\ud45c\ud68c, 2017\ub144 6\uc6d4 23\uc77c (\ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0 \uc6d0\uc7a5\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uc1a1\uc601\uc900, \uc804\uc0c1\uae30, \uc784\uc5f0\uc8fc, \uc774\uc885\ud601, \u201cShadow Brokers\uc5d0 \uc758\ud574 \uc720\ucd9c\ub41c NSA \uc708\ub3c4\uc6b0 \ud574\ud0b9 \ud234 \ubd84\uc11d\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ubc1c\ud45c\ud68c, 2017\ub144 6\uc6d4 23\uc77c (\uc6b0\uc218 \ub17c\ubb38\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uc774\ubbfc\uc601, \uace0\ud604\uc11c, \uba85\uc18c\ud76c, \uae40\ubbf8\uc625, \uc774\uc885\ud601 \u201cWhisper \uae30\ubc18\uc758 \uc548\uc804\ud55c \ubaa8\ubc14\uc77c \uba54\uc2e0\uc800 \uc124\uacc4\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2017\ub144 1\uc6d4 18\uc77c (\uc6b0\uc218 \ub17c\ubb38\uc0c1 \uc218\uc0c1)<\/li>\n<\/ol>\n<h2><strong>2016<\/strong><\/h2>\n<ol>\n<li>\ubb38\uae30\uc6b4, \uc774\uc885\ud601 \u201cPowerShell \uacf5\uaca9 \ub3c4\uad6c\ub97c \ud65c\uc6a9\ud55c \uc708\ub3c4\uc6b0 \uc6b4\uc601\uccb4\uc81c \uad00\ub9ac\uc790 \uad8c\ud55c \ud68d\ub4dd\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2016\ub144 12\uc6d4 3\uc77c(\uc6b0\uc218 \ub17c\ubb38\uc0c1 \uc218\uc0c1)<\/li>\n<li>\uc774\uc885\ud601, 2015\ub144\ub3c4 \uad50\uc678\uc5f0\uad6c\ube44 \uc218\ud61c \uc2e4\uc801 \uc6b0\uc218 \ud45c\ucc3d, \uc0c1\uba85\ub300\ud559\uad50, 2016\ub144 2\uc6d4 18\uc77c<\/li>\n<\/ol>\n<h2><strong>2015<\/strong><\/h2>\n<ol>\n<li>\uc774\uc885\ud601,\u00a0Best Land Transportation Paper Award, IEEE Vehicular Technology Society, 2015 \ub144 9\uc6d4<\/li>\n<li>\uc774\uc885\ud601, 2014\ub144\ub3c4 \uc678\ubd80\uc5f0\uad6c\ube44 \uc218\ud61c \uc2e4\uc801 \uc6b0\uc218 \ud45c\ucc3d, \uc0c1\uba85\ub300\ud559\uad50, 2015\ub1442\uc6d416\uc77c<\/li>\n<\/ol>\n<h2><strong>2014<\/strong><\/h2>\n<ol>\n<li>\uc774\uc885\ud601, \uc774\ub2ec\uc758\uc2e0\uc9c4\uc5f0\uad6c\uc790, \ud55c\uad6d\uc5f0\uad6c\uc7ac\ub2e8 \uc6f9\uc9c4, 2014\ub144 11\uc6d4<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>2025 \uc1a1\ubbfc\ud76c, &#8220;On-Device AI \ubaa8\ub378 \uc18c\uc720\uad8c \uc99d\uba85\uc744 \uc704\ud55c \uc6cc\ud130\ub9c8\ud0b9 \ud504\ub808\uc784\uc6cc\ud06c&#8221;,\u00a0\uc138\uc885\ub300\ud559\uad50 \uc815\ubcf4\ubcf4\ud638\ud559\uacfc 2025\ud559\ub144\ub3c4 \ud559\uc220\uc81c, 2025\ub144 11\uc6d4 28\uc77c (\ucd5c\uc6b0\uc218\uc0c1) \ubbfc\uc724\ud64d, &#8220;Dual-Recovery SEIR \ud655\uc7a5 \ubaa8\ub378\uc744 \ud65c\uc6a9\ud55c \uc5f0\ud569\ud559\uc2b5 \uc624\uc5fc \uacf5\uaca9 \ubc29\uc5b4 \uc804\ub7b5 \ubd84\uc11d&#8221;, \uc138\uc885\ub300\ud559\uad50 \uc815\ubcf4\ubcf4\ud638\ud559\uacfc 2025\ud559\ub144\ub3c4 \ud559\uc220\uc81c, 2025\ub144 11\uc6d4 28\uc77c (\uc6b0\uc218\uc0c1) \uc774\uc9c4\uc218, \uae40\uc9c0\ud61c, \uc774\ud558\ub298, \uc774\uc885\ud601, \u201c\ubd84\uc0b0\uc6d0\uc7a5 \uae30\ubc18 \ubd84\uc0b0\uc2e0\uc6d0\uad00\ub9ac \uc2dc\uc2a4\ud15c\uc5d0\uc11c\uc758 \uc2e0\ub8b0 \uc575\ucee4\uc5d0 \ub300\ud55c \uac1c\uc778\uc815\ubcf4\ubcf4\ud638 \ubc29\uc548 \uc5f0\uad6c\u201d,\u00a02025 \ud45c\uc900\uc778\uc99d\uc548\uc804\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2025\ub144 10\uc6d4 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/1205"}],"collection":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1205"}],"version-history":[{"count":55,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/1205\/revisions"}],"predecessor-version":[{"id":4278,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/1205\/revisions\/4278"}],"wp:attachment":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}