The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Cheolho Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
    PPF Model with CTNT to Defend Web Server from DDoS Attack. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:986-995 [Conf]
  2. Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon
    A New DDoS Detection Model Using Multiple SVMs and TRA. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:976-985 [Conf]
  3. Jung-Taek Seo, Cheolho Lee, Jongsub Moon
    Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:390-397 [Conf]
  4. Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon
    SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:59-70 [Conf]
  5. Cheolho Lee, Kyunghee Choi, Seungkyu Park, Gihyun Jung, Cheolwon Lee, Namhoon Lee
    A Vulnerability Scanning Script Management System. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2002, pp:457-464 [Conf]
  6. Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jung
    Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2003, pp:286-295 [Conf]
  7. Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung
    Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2004, pp:402-408 [Conf]
  8. Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
    Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:351-354 [Conf]
  9. EunYoung Kim, Cheolho Lee, HyungGeun Oh, Jinseok Lee
    The System Modeling for Detections of New Malicious Codes. [Citation Graph (0, 0)][DBLP]
    PARA, 2004, pp:992-999 [Conf]

  10. Compiling network traffic into rules using soft computing methods for the detection of flooding attacks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002