Search the dblp DataBase
Kyubum Wee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sungsu Kim , Kyubum Wee Limits of Signature-Based Detection of Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:288-293 [Conf ] Kyechan Lee , Kyubum Wee Detection of Loadable Kernel Module Rootkit. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:385-389 [Conf ] Kyubum Wee , Woosuk Lee Extensions and Variations on Construction of Autoreplicators in Typogenetics. [Citation Graph (0, 0)][DBLP ] ECAL, 2005, pp:685-694 [Conf ] Hongjin Yeh , Kyubum Wee , Manpyo Hong Optimal Scheduling Algorithms in WDM Optical Passive Star Networks. [Citation Graph (0, 0)][DBLP ] IPPS/SPDP Workshops, 1999, pp:887-896 [Conf ] Kyubum Wee , Byungeun Moon Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:206-216 [Conf ] Kyubum Wee , Sinjae Kim Construction of Finite Automata for Intrusion Detection from System Call Sequences by Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] PAKDD, 2006, pp:594-602 [Conf ] Youngho Park , Manpyo Hong , Yonghwa Lee , Kyubum Wee , Hongjin Yeh Optimal Transmission Scheduling for All-to-All Broadcast in WDM Optical Passive Star Networks. [Citation Graph (0, 0)][DBLP ] PDPTA, 1999, pp:2300-2306 [Conf ] Chohwa Gwak , Kyubum Wee Construction of Hypercycles in Typogenetics with Evolutionary Algorithms. [Citation Graph (0, 0)][DBLP ] ECAL, 2007, pp:1060-1068 [Conf ] Search in 0.001secs, Finished in 0.002secs