The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Taeshik Shon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo
    Safe Patch Distribution Architecture in Intranet Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:455-460 [Conf]
  2. Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
    PPF Model with CTNT to Defend Web Server from DDoS Attack. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:986-995 [Conf]
  3. Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon
    A New DDoS Detection Model Using Multiple SVMs and TRA. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:976-985 [Conf]
  4. Jung-Taek Seo, Yun-ju Kim, Eung Ki Park, Sang-Won Lee, Taeshik Shon, Jongsub Moon
    Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:716-724 [Conf]
  5. Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon
    SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:59-70 [Conf]
  6. Taeshik Shon, Jung-Taek Seo, Jongsub Moon
    Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:891-894 [Conf]
  7. Taeshik Shon, Jung-Taek Seo, Jongsub Moon
    A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:313-324 [Conf]
  8. Taeshik Shon, Jongsub Moon, HongMin Choi
    Effciency Evaluation for Key Distribution Models in Satellite Terminals. [Citation Graph (0, 0)][DBLP]
    INTELLCOMM, 2004, pp:92-99 [Conf]
  9. Jongsub Moon, Taeshik Shon, Jung-Taek Seo, Jongho Kim, Jungwoo Seo
    An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2004, pp:351-362 [Conf]
  10. Taeshik Shon, Jung-Taek Seo, Jongsub Moon
    SVM Approach with a Genetic Algorithm for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2005, pp:224-233 [Conf]
  11. Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim
    Covert Channel Detection in the ICMP Payload Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:828-835 [Conf]
  12. Taeshik Shon, Taewoo Noh, Jongsub Moon
    Support Vector Machine Based ICMP Covert Channel Attack Detection. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:461-464 [Conf]
  13. Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
    Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:351-354 [Conf]
  14. Jung-Taek Seo, Dae-Sik Choi, Eung Ki Park, Taeshik Shon, Jongsub Moon
    Patch Management System for Multi-platform Environment. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:654-661 [Conf]
  15. Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon
    An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:646-655 [Conf]
  16. Taeshik Shon, Wook Choi
    An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:88-97 [Conf]
  17. Taeshik Shon, Xeno Kovah, Jongsub Moon
    Applying genetic algorithm for classifying anomalous TCP/IP packets. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2006, v:69, n:16-18, pp:2429-2433 [Journal]
  18. Taeshik Shon, Jongsub Moon
    A hybrid machine learning approach to network anomaly detection. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:18, pp:3799-3821 [Journal]

  19. WIVA: WSN Monitoring Framework Based on 3D Visualization and Augmented Reality in Mobile Devices. [Citation Graph (, )][DBLP]


  20. Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  21. Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  22. Implementation of RF4CE-Based Wireless Auto Configuration Architecture for Ubiquitous Smart Home. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.302secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002