|
Search the dblp DataBase
Taeshik Shon:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo
Safe Patch Distribution Architecture in Intranet Environments. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:455-460 [Conf]
- Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
PPF Model with CTNT to Defend Web Server from DDoS Attack. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:986-995 [Conf]
- Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon
A New DDoS Detection Model Using Multiple SVMs and TRA. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:976-985 [Conf]
- Jung-Taek Seo, Yun-ju Kim, Eung Ki Park, Sang-Won Lee, Taeshik Shon, Jongsub Moon
Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. [Citation Graph (0, 0)][DBLP] FSKD, 2006, pp:716-724 [Conf]
- Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon
SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. [Citation Graph (0, 0)][DBLP] GCC, 2005, pp:59-70 [Conf]
- Taeshik Shon, Jung-Taek Seo, Jongsub Moon
Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments. [Citation Graph (0, 0)][DBLP] GCC, 2004, pp:891-894 [Conf]
- Taeshik Shon, Jung-Taek Seo, Jongsub Moon
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. [Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:313-324 [Conf]
- Taeshik Shon, Jongsub Moon, HongMin Choi
Effciency Evaluation for Key Distribution Models in Satellite Terminals. [Citation Graph (0, 0)][DBLP] INTELLCOMM, 2004, pp:92-99 [Conf]
- Jongsub Moon, Taeshik Shon, Jung-Taek Seo, Jongho Kim, Jungwoo Seo
An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing. [Citation Graph (0, 0)][DBLP] ISCIS, 2004, pp:351-362 [Conf]
- Taeshik Shon, Jung-Taek Seo, Jongsub Moon
SVM Approach with a Genetic Algorithm for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP] ISCIS, 2005, pp:224-233 [Conf]
- Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. [Citation Graph (0, 0)][DBLP] ISCIS, 2003, pp:828-835 [Conf]
- Taeshik Shon, Taewoo Noh, Jongsub Moon
Support Vector Machine Based ICMP Covert Channel Attack Detection. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:461-464 [Conf]
- Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. [Citation Graph (0, 0)][DBLP] NPC, 2005, pp:351-354 [Conf]
- Jung-Taek Seo, Dae-Sik Choi, Eung Ki Park, Taeshik Shon, Jongsub Moon
Patch Management System for Multi-platform Environment. [Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:654-661 [Conf]
- Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. [Citation Graph (0, 0)][DBLP] ICIC (1), 2007, pp:646-655 [Conf]
- Taeshik Shon, Wook Choi
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. [Citation Graph (0, 0)][DBLP] NBiS, 2007, pp:88-97 [Conf]
- Taeshik Shon, Xeno Kovah, Jongsub Moon
Applying genetic algorithm for classifying anomalous TCP/IP packets. [Citation Graph (0, 0)][DBLP] Neurocomputing, 2006, v:69, n:16-18, pp:2429-2433 [Journal]
- Taeshik Shon, Jongsub Moon
A hybrid machine learning approach to network anomaly detection. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:18, pp:3799-3821 [Journal]
WIVA: WSN Monitoring Framework Based on 3D Visualization and Augmented Reality in Mobile Devices. [Citation Graph (, )][DBLP]
Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Implementation of RF4CE-Based Wireless Auto Configuration Architecture for Ubiquitous Smart Home. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.302secs
|