The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jongsub Moon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo
    Safe Patch Distribution Architecture in Intranet Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:455-460 [Conf]
  2. Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
    PPF Model with CTNT to Defend Web Server from DDoS Attack. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:986-995 [Conf]
  3. Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon
    A New DDoS Detection Model Using Multiple SVMs and TRA. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:976-985 [Conf]
  4. Jung-Taek Seo, Yun-ju Kim, Eung Ki Park, Sang-Won Lee, Taeshik Shon, Jongsub Moon
    Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:716-724 [Conf]
  5. Jongho Kim, Jaeik Cho, Jongsub Moon
    Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:25-34 [Conf]
  6. Jung-Taek Seo, Cheolho Lee, Jongsub Moon
    Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:390-397 [Conf]
  7. Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon
    SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:59-70 [Conf]
  8. Taeshik Shon, Jung-Taek Seo, Jongsub Moon
    Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:891-894 [Conf]
  9. Taeshik Shon, Jung-Taek Seo, Jongsub Moon
    A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:313-324 [Conf]
  10. Taeshik Shon, Jongsub Moon, HongMin Choi
    Effciency Evaluation for Key Distribution Models in Satellite Terminals. [Citation Graph (0, 0)][DBLP]
    INTELLCOMM, 2004, pp:92-99 [Conf]
  11. Jongsub Moon, Taeshik Shon, Jung-Taek Seo, Jongho Kim, Jungwoo Seo
    An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2004, pp:351-362 [Conf]
  12. Taeshik Shon, Jung-Taek Seo, Jongsub Moon
    SVM Approach with a Genetic Algorithm for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2005, pp:224-233 [Conf]
  13. Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim
    Covert Channel Detection in the ICMP Payload Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:828-835 [Conf]
  14. Taeshik Shon, Taewoo Noh, Jongsub Moon
    Support Vector Machine Based ICMP Covert Channel Attack Detection. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:461-464 [Conf]
  15. Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
    Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:351-354 [Conf]
  16. Jung-Taek Seo, Dae-Sik Choi, Eung Ki Park, Taeshik Shon, Jongsub Moon
    Patch Management System for Multi-platform Environment. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:654-661 [Conf]
  17. Hee-Seon Park, Bong-Kee Sin, Jongsub Moon, Seong-Whan Lee
    A 2-D HMM Method for Offline Handwritten Character Recognition. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2001, v:15, n:1, pp:91-105 [Journal]
  18. Ji-Yeon Lee, Jeong-Seon Park, Hyeran Byun, Jongsub Moon, Seong-Whan Lee
    Automatic generation of structured hyperdocuments from document images. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2002, v:35, n:2, pp:485-503 [Journal]
  19. Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon
    An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:646-655 [Conf]
  20. Taeshik Shon, Xeno Kovah, Jongsub Moon
    Applying genetic algorithm for classifying anomalous TCP/IP packets. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2006, v:69, n:16-18, pp:2429-2433 [Journal]
  21. Taeshik Shon, Jongsub Moon
    A hybrid machine learning approach to network anomaly detection. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:18, pp:3799-3821 [Journal]

  22. A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002