The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kuinam J. Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim
    HOIDS-Based Detection Method of Vicious Event in Large Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:998-1005 [Conf]
  2. Sukwoo Han, Kuinam J. Kim, Young-Sung Kim
    Efficient Migration Algorithm for Mobile Agents in Wired/Wireless Internets. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:626-636 [Conf]
  3. Jongchan Lee, Hongjin Kim, Kuinam J. Kim
    Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:555-565 [Conf]
  4. Si Choon Noh, Dong Chun Lee, Kuinam J. Kim
    Multi-level Protection Building for Virus Protection Infrastructure. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:631-634 [Conf]
  5. Dong Chun Lee, Jeom Goo Kim, Kuinam J. Kim
    Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:50-59 [Conf]
  6. Seung-Jae Yoo, Kuinam J. Kim
    Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:1025-1032 [Conf]
  7. Jae-Myung Kim, Kyu-Ho Lee, Jong-Seob Kim, Kuinam J. Kim
    Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:1098-1105 [Conf]
  8. Si Choon Noh, Dong Chun Lee, Kuinam J. Kim
    Improved Structure Management of Gateway Firewall Systems for Effective Networks Security. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:1076-1083 [Conf]
  9. Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park
    Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:917-926 [Conf]
  10. Sangho Lee, Dong Hwi Lee, Kuinam J. Kim
    A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:1006-1017 [Conf]
  11. Gang Taek Lee, Dong Hwi Lee, Kuinam J. Kim
    Simulation Based Nodal Analysis for Effects Based Operations. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:166-176 [Conf]
  12. Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim
    Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:185-194 [Conf]
  13. Yong-Ho Kim, Dong Hwi Lee, Kuinam J. Kim
    A Stable Evidence Collection Procedure of a Volatile Data in Research. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:177-184 [Conf]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002