Personal information

Activities

Education and qualifications (1)

Korea University: Seongbuk-gu, Seoul, KR

(School of Cyber Security)
Education
Source: Self-asserted source
Donghwan Lee

Works (25)

Subjective-Bayesian-Network-Based Interdependent Mission Impact Assessment With Game-Theoretic Attack–Defense Interactions

IEEE Internet of Things Journal
2025-03-15 | Journal article
Contributors: Han Jun Yoon; Ashrith Reddy Thukkaraju; Shou Matsumoto; Jair Feldens Ferrari; Donghwan Lee; Myung Kil Ahn; Paulo Costa; Jin-Hee Cho
Source: check_circle
Crossref

Bayesian Stackelberg game approach for cyber mission impact assessment

ICT Express
2024-04 | Journal article
Contributors: Donghwan Lee; Donghwa Kim; Myung Kil Ahn; Seongkee Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities

IEEE Access
2023 | Journal article
Contributors: Donghwa Kim; Myung Kil Ahn; Seongkee Lee; Donghwan Lee; Moosung Park; Dongkyoo Shin
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Software-Friendly Subjective Bayesian Networks: Reasoning within a Software-Centric Mission Impact Assessment Framework

2023 26th International Conference on Information Fusion, FUSION 2023
2023 | Conference paper
EID:

2-s2.0-85171584950

Contributors: Matsumoto, S.; Ferrari, J.F.; Yoon, H.J.; Thukkaraju, A.R.; Lee, D.; Ahn, M.K.; Cho, J.-H.; Costa, P.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

Subjective Bayesian Network-based Interdependent Mission Impact Assessment with Game-Theoretic Attack-Defense Interactions

TechRxiv
2023 | Other
EID:

2-s2.0-85182696536

Contributors: Yoon, H.J.; Thukkaraju, A.R.; Matsumoto, S.; Ferrari, J.F.; Lee, D.; Ahn, M.K.; Costa, P.; Cho, J.-H.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

A practical framework for cyber defense generation, enforcement and evaluation

Computer Networks
2022 | Journal article
EID:

2-s2.0-85126630992

Part of ISSN: 13891286
Contributors: Enoch, S.Y.; Moon, C.Y.; Lee, D.; Ahn, M.K.; Kim, D.S.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

A Study on Cyber Target Importance Quantification and Ranking Algorithm

Applied Sciences (Switzerland)
2022 | Journal article
EID:

2-s2.0-85124735025

Part of ISSN: 20763417
Contributors: Kim, K.; Oh, S.; Lee, D.; Kang, J.; Lee, J.; Shin, D.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

Block Double-Submission Attack: Block Withholding Can Be Self-Destructive

arXiv
2022 | Other
EID:

2-s2.0-85135979449

Part of ISSN: 23318422
Contributors: Lee, S.; Lee, D.; Kim, S.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

ICSTASY: An Integrated Cybersecurity Training System for Military Personnel

IEEE Access
2022 | Journal article
Contributors: Donghwan Lee; Donghwa Kim; Changwon Lee; Myung Kil Ahn; Wonjun Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method

IEEE Access
2022 | Journal article
EID:

2-s2.0-85135224556

Part of ISSN: 21693536
Contributors: Kim, K.; Yoon, S.; Lee, D.; Jang, J.; Oh, H.; Shin, D.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

Block Double-Submission Attack: Block Withholding Can Be Self-Destructive

2022-09-19 | Conference paper
Contributors: Suhyeon Lee; Donghwan Lee; Seungjoo Kim
Source: check_circle
Crossref

Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups

IEEE Access
2021 | Journal article
EID:

2-s2.0-85107351146

Part of ISSN: 21693536
Contributors: Lee, J.; Lee, Y.; Lee, D.; Kwon, H.; Shin, D.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

Cy-Through: Toward a Cybersecurity Simulation for Supporting Live, Virtual, and Constructive Interoperability

IEEE Access
2021 | Journal article
Contributors: Donghwan Lee; Donghwa Kim; Myung Kil Ahn; Wonwoo Jang; Wonjun Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Wireless sensor network (Wsn) configuration method to increase node energy efficiency through clustering and location information

Symmetry
2021 | Journal article
EID:

2-s2.0-85102421436

Part of ISSN: 20738994
Contributors: Kim, J.; Lee, D.; Hwang, J.; Hong, S.; Shin, D.; Shin, D.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

HARMer: Cyber-attacks automation and evaluation

arXiv
2020 | Other
EID:

2-s2.0-85169625370

Part of ISSN: 23318422
Contributors: Enoch, S.Y.; Huang, Z.; Moon, C.Y.; Lee, D.; Ahn, M.K.; Kim, D.S.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

HARMer: Cyber-Attacks Automation and Evaluation

IEEE Access
2020 | Journal article
EID:

2-s2.0-85089230138

Part of ISSN: 21693536
Contributors: Enoch, S.Y.; Huang, Z.; Moon, C.Y.; Lee, D.; Ahn, M.K.; Kim, D.S.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

Comparative performance analysis of anticollision protocols in RFID networks

RFID Handbook: Applications, Technology, Security, and Privacy
2017 | Book chapter
EID:

2-s2.0-85052603769

Contributors: Lee, W.; Myung, J.; Lee, D.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

A time-optimal anti-collision algorithm for FSA-based RFID systems

ETRI Journal
2011 | Journal article
EID:

2-s2.0-79958740410

Part of ISSN: 12256463
Contributors: Lee, D.; Choi, J.; Lee, W.; Pack, S.; Du, D.-Z.; Hong, S.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

OFSA: Optimum frame-slotted aloha for RFID tag collision arbitration

KSII Transactions on Internet and Information Systems
2011 | Journal article
EID:

2-s2.0-82755182407

Part of ISSN: 19767277
Contributors: Lee, D.; Choi, J.; Lee, W.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

Genetic algorithmic topology control for two-tiered wireless sensor networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007 | Conference paper
EID:

2-s2.0-38149060096

Part of ISSN: 16113349 03029743
Contributors: Lee, D.; Lee, W.; Kim, J.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

Impacts of repetitions and segment size variability on object-level throughput in T-DMB

Digest of Technical Papers - IEEE International Conference on Consumer Electronics
2007 | Conference paper
EID:

2-s2.0-34548026999

Part of ISSN: 0747668X
Contributors: Choi, J.; Yu, J.; Lee, D.; Kim, S.; Lee, S.; Lee, W.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

On the calculation of the maximal MOT throughput in T-DMB

IEEE Transactions on Consumer Electronics
2007 | Journal article
EID:

2-s2.0-35348864337

Part of ISSN: 00983063
Contributors: Choi, J.; Lee, D.; Yu, J.; Kim, K.; Lee, W.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

Optimal transmission policies for MOT in T-DMB

IEEE Communications Letters
2007 | Journal article
EID:

2-s2.0-38149068869

Part of ISSN: 10897798
Contributors: Lee, D.; Choi, J.; Kim, K.; Lee, W.; Lee, C.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

Q<sup>+</sup>-Algorithm: An enhanced RFID tag collision arbitration algorithm

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007 | Conference paper
EID:

2-s2.0-38049040800

Part of ISSN: 16113349 03029743
Contributors: Lee, D.; Kim, K.; Lee, W.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier

UbiComm: An Adaptive Vertical Handoff Decision Scheme for heterogeneous wireless networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | Conference paper
EID:

2-s2.0-33750713055

Part of ISSN: 16113349 03029743
Contributors: Lee, W.; Kim, E.; Yu, J.; Lee, D.; Choi, J.; Kim, J.; Shin, C.K.
Source: Self-asserted source
Donghwan Lee via Scopus - Elsevier