|
Search the dblp DataBase
Koohong Kang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:20-26 [Conf]
- Ik-Kyun Kim, Koohong Kang, Zyn-Oh Kim, Jongsoo Jang, Youngsik Baek
A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks. [Citation Graph (0, 0)][DBLP] ICOIN (1), 2002, pp:17-27 [Conf]
- Koohong Kang, Cheeha Kim
Performance analysis of statistical multiplexing of heterogeneous discrete-time Markovian arrival processes in an ATM network. [Citation Graph (0, 0)][DBLP] Computer Communications, 1997, v:20, n:11, pp:970-978 [Journal]
- Koohong Kang, Bart Steyaert
Bound analysis for WRR scheduling in a statistical multiplexer with bursty sources. [Citation Graph (0, 0)][DBLP] Telecommunication Systems, 1999, v:12, n:2-3, pp:123-147 [Journal]
- Ik-Kyun Kim, Koohong Kang, YangSeo Choi, Daewon Kim, Jintae Oh, Kijun Han
A Practical Approach for Detecting Executable Codes in Network Traffic. [Citation Graph (0, 0)][DBLP] APNOMS, 2007, pp:354-363 [Conf]
Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points. [Citation Graph (, )][DBLP]
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|