Search the dblp DataBase
Kuinam J. Kim :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dong Hwi Lee , Jeom Goo Kim , Kuinam J. Kim HOIDS-Based Detection Method of Vicious Event in Large Networks. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:998-1005 [Conf ] Sukwoo Han , Kuinam J. Kim , Young-Sung Kim Efficient Migration Algorithm for Mobile Agents in Wired/Wireless Internets. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2003, pp:626-636 [Conf ] Jongchan Lee , Hongjin Kim , Kuinam J. Kim Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2003, pp:555-565 [Conf ] Si Choon Noh , Dong Chun Lee , Kuinam J. Kim Multi-level Protection Building for Virus Protection Infrastructure. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:631-634 [Conf ] Dong Chun Lee , Jeom Goo Kim , Kuinam J. Kim Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2003, pp:50-59 [Conf ] Seung-Jae Yoo , Kuinam J. Kim Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2006, pp:1025-1032 [Conf ] Jae-Myung Kim , Kyu-Ho Lee , Jong-Seob Kim , Kuinam J. Kim Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database. [Citation Graph (0, 0)][DBLP ] ISCIS, 2003, pp:1098-1105 [Conf ] Si Choon Noh , Dong Chun Lee , Kuinam J. Kim Improved Structure Management of Gateway Firewall Systems for Effective Networks Security. [Citation Graph (0, 0)][DBLP ] ISCIS, 2003, pp:1076-1083 [Conf ] Dong Hwi Lee , Kyong Ho Choi , Kuinam J. Kim , Sang Min Park Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2006, pp:917-926 [Conf ] Sangho Lee , Dong Hwi Lee , Kuinam J. Kim A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2006, pp:1006-1017 [Conf ] Gang Taek Lee , Dong Hwi Lee , Kuinam J. Kim Simulation Based Nodal Analysis for Effects Based Operations. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2007, pp:166-176 [Conf ] Dong Hwi Lee , Kyong Ho Choi , Kuinam J. Kim Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2007, pp:185-194 [Conf ] Yong-Ho Kim , Dong Hwi Lee , Kuinam J. Kim A Stable Evidence Collection Procedure of a Volatile Data in Research. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2007, pp:177-184 [Conf ] Search in 0.002secs, Finished in 0.002secs