|
Search the dblp DataBase
Jong-Soo Jang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sang-Woo Lee, Jeong-Nyeo Kim, Jong-Soo Jang
An Efficient Divider Architecture over GF(2m) for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP] ESA/VLSI, 2004, pp:569-576 [Conf]
- Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jong-Soo Jang
Design and Implementation of High-Performance Intrusion Detection System. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2004, pp:594-602 [Conf]
- Seung-Won Shin, Kwang-ho Baik, Ki-Young Kim, Jong-Soo Jang
QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:988-997 [Conf]
- Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang
LSAD: Lightweight SYN Flooding Attack Detector. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:385-390 [Conf]
- Sang-Woo Lee, Yong-Sung Jeon, Jeong-Nyeo Kim, Ki-Young Kim, Jong-Soo Jang
Design and Implementation of a Gigabit Router using Network Processor. [Citation Graph (0, 0)][DBLP] IMSA, 2005, pp:32-35 [Conf]
- Dong-ho Kang, Byoung-Koo Kim, Jin-Tae Oh, Taek-Yong Nam, Jong-Soo Jang
FPGA Based Intrusion Detection System Against Unknown and Known Attacks. [Citation Graph (0, 0)][DBLP] PRIMA, 2006, pp:801-806 [Conf]
- Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang
D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach. [Citation Graph (0, 0)][DBLP] SAINT, 2005, pp:430-436 [Conf]
An Optimized Time-Constraint Job Scheduling in Group Based P2P Computing Networks. [Citation Graph (, )][DBLP]
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. [Citation Graph (, )][DBLP]
An Optimized Time-constraint Job Distribution Scheme in Group based P2P Networks. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|