The SCEAS System
Navigation Menu

Search the dblp DataBase


Jongsoo Jang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Young-Jun Heo, Jongsoo Jang
    Defeating DoS Attacks Using Wavelet Analysis. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:248-252 [Conf]
  2. Dong-ho Kang, Dong-il Seo, Jongsoo Jang
    A Study on Bandwidth Consumption DDoS: Attack Defense. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:491-494 [Conf]
  3. Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang
    An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:20-26 [Conf]
  4. Sang-Kil Park, Jongsoo Jang, BongNam Noh
    Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:397-401 [Conf]
  5. Gaeil Ahn, Kiyoung Kim, Jongsoo Jang
    Fast and Strong Control of Congestion-Making Traffic. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:20-29 [Conf]
  6. Hyeyoung Cho, Daeyoung Kim, Juhong Kim, Yoonmee Doh, Jongsoo Jang
    Network Processor Based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:973-982 [Conf]
  7. Ik-Kyun Kim, Koohong Kang, Zyn-Oh Kim, Jongsoo Jang, Youngsik Baek
    A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN (1), 2002, pp:17-27 [Conf]
  8. Jinoh Kim, Kiyoung Kim, Jongsoo Jang
    Policy-Based Intrusion Detection and Automated Response Mechanism. [Citation Graph (0, 0)][DBLP]
    ICOIN (2), 2002, pp:399-408 [Conf]
  9. Sook-Yeon Kim, Myung-Eun Kim, Kiyoung Kim, Jongsoo Jang
    Information Model for Policy-Based Network Security Management. [Citation Graph (0, 0)][DBLP]
    ICOIN (1), 2002, pp:662-672 [Conf]
  10. Hyeokchan Kwon, Jaehoon Nah, Jongsoo Jang
    A Protocol Switching Scheme for Developing Network Management Applications. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:862-872 [Conf]
  11. Minho Han, Kiyoung Kim, Jongsoo Jang
    IXP2400 Network Processor Architecture for IPSEC Application. [Citation Graph (0, 0)][DBLP]
    IMSA, 2005, pp:28-31 [Conf]
  12. Gaeil Ahn, Kiyoung Kim, Jongsoo Jang
    MF (Minority First) Scheme for defeating Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1233-1238 [Conf]
  13. Sung Won Sohn, Jongsoo Jang, Chang Suk Oh
    Architecture of Multimedia Service Interworking for Heterogeneous Multi-Carrier ATM Network. [Citation Graph (0, 0)][DBLP]
    IS&N, 1997, pp:49-60 [Conf]
  14. Sungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das
    Memory-efficient content filtering hardware for high-speed intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:264-269 [Conf]
  15. Geonlyang Kim, Jinoh Kim, Jungchan Na, Jongsoo Jang
    Role-based policy distribution techniques in policy-based networks. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2004, pp:103-107 [Conf]
  16. Gaeil Ahn, Jongsoo Jang, Woojik Chun
    An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2002, v:19, n:3-4, pp:481-495 [Journal]
  17. Seungyong Yoon, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang
    High Performance Session State Management Scheme for Stateful Packet Inspection. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:591-594 [Conf]
  18. Hyeokchan Kwon, Sangchoon Kim, Jaehoon Nah, Jongsoo Jang
    Public Key Management Framework for Two-tier Super Peer Architecture. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2007, pp:72- [Conf]
  19. Jabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jaekwang Lee, Jongsoo Jang
    Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:282-296 [Conf]

  20. Performance Prediction in Peer-to-Peer MultiAgent Networks. [Citation Graph (, )][DBLP]

  21. Function Call Mechanism Based Executable Code Detection for the Network Security. [Citation Graph (, )][DBLP]

  22. Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks. [Citation Graph (, )][DBLP]

  23. A Study on Security Middleware Framework for the Ubiquitous Platform. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002