The SCEAS System
Navigation Menu

Search the dblp DataBase


Sung Won Sohn: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sung Won Sohn
    Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:180-191 [Conf]
  2. Byung Gil Lee, Hyun Gon Kim, Sung Won Sohn, Kil-Houm Park
    Design of an Accounting Architecture for Load and Session Managed Diameter-Based AAA Network. [Citation Graph (0, 0)][DBLP]
    CDMA International Conference, 2002, pp:338-348 [Conf]
  3. Bo-Heung Chung, Jeong-Nyeo Kim, Sung Won Sohn
    Improve Network Security with Kernel-Level Intrusion Detection Sensor. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:409-414 [Conf]
  4. Su-Hyung Jo, Jeong-Nyeo Kim, Sung Won Sohn
    Design of Policy-Based Security Management for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:337-340 [Conf]
  5. Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang
    An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:20-26 [Conf]
  6. Yang-Seo Choi, Dong-il Seo, Sung Won Sohn, Sang-Ho Lee
    Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:31-40 [Conf]
  7. Ji-Hoon Jeong, Jae-Hoon Nah, Sung Won Sohn, Jong Tai Lee
    C-ISCAP: Controlled-Internet Secury Connectivity Assurance Platform. [Citation Graph (0, 0)][DBLP]
    ICEIS (2), 2001, pp:920-925 [Conf]
  8. Yang-Seo Choi, Dong-il Seo, Sung Won Sohn
    A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:146-159 [Conf]
  9. Hyun Joo Kim, Jung-Chan Na, Sung Won Sohn
    Shortest-Path Mailing Service Using Active Technology. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:336-345 [Conf]
  10. Geon Woo Kim, So-Hee Park, Jae-Hoon Nah, Sung Won Sohn
    Security Policy Deployment in IPsec. [Citation Graph (0, 0)][DBLP]
    ICOIN (2), 2002, pp:453-466 [Conf]
  11. Wonjoo Park, Jaehoon Nah, Sung Won Sohn
    A Study of Security Association Management Oriented to IP Security. [Citation Graph (0, 0)][DBLP]
    ICOIN (2), 2002, pp:381-388 [Conf]
  12. Su-Hyung Jo, Jae-Hoon Nah, Sung Won Sohn
    Web-based Security Management System for IPsec. [Citation Graph (0, 0)][DBLP]
    IMSA, 2001, pp:71-75 [Conf]
  13. Sung Won Sohn, Jongsoo Jang, Chang Suk Oh
    Architecture of Multimedia Service Interworking for Heterogeneous Multi-Carrier ATM Network. [Citation Graph (0, 0)][DBLP]
    IS&N, 1997, pp:49-60 [Conf]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002