Search the dblp DataBase
Manpyo Hong :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Eun-Sun Cho , Sunho Hong , Sechang Oh , Hong-Jin Yeh , Manpyo Hong , Cheol Won Lee , Hyundong Park , Chun-Sik Park SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:177-189 [Conf ] Usman Tariq , Manpyo Hong , Kyung-suk Lhee A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. [Citation Graph (0, 0)][DBLP ] ADMA, 2006, pp:1025-1036 [Conf ] Hyungjoon Lee , Wonil Kim , Manpyo Hong Biologically Inspired Computer Virus Detection System. [Citation Graph (0, 0)][DBLP ] BioADIT, 2004, pp:153-165 [Conf ] Nakhoon Baek , Ku-Jin Kim , Manpyo Hong Vehicle Area Segmentation Using Grid-Based Feature Values. [Citation Graph (0, 0)][DBLP ] CAIP, 2005, pp:464-471 [Conf ] Gunhee Lee , Song-hwa Chae , Inwhan Hwang , Manpyo Hong A Privacy-Aware Service Protocol for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:619-628 [Conf ] Cholmin Kim , Wonil Kim , Manpyo Hong Effective Detector Set Generation and Evolution for Artificial Immune System. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:491-498 [Conf ] Hyungjoon Lee , Wonil Kim , Manpyo Hong Artificial Immune System against Viral Attack. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:499-506 [Conf ] Cholmin Kim , Soung-uck Lee , Manpyo Hong Macroscopic Treatment to Polymorphic E-mail Based Viruses. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2004, pp:867-876 [Conf ] Heeran Lim , Manpyo Hong Effective Packet Marking Approach to Defend against DDoS Attack. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2004, pp:708-716 [Conf ] Tao Jiang , Wonil Kim , Kyung-suk Lhee , Manpyo Hong E-mail Worm Detection Using the Analysis of Behavior. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:348-356 [Conf ] GangShin Lee , Heeran Lim , Manpyo Hong , Dong Hoon Lee A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. [Citation Graph (0, 0)][DBLP ] ICOIN, 2005, pp:806-813 [Conf ] Dong-Soo Han , Manpyo Hong Performance Predictor for HPF Compilers. [Citation Graph (0, 0)][DBLP ] ICPADS, 1997, pp:302-307 [Conf ] Hongjin Yeh , Kyubum Wee , Manpyo Hong Optimal Scheduling Algorithms in WDM Optical Passive Star Networks. [Citation Graph (0, 0)][DBLP ] IPPS/SPDP Workshops, 1999, pp:887-896 [Conf ] Eun-Sun Cho , Kang-Woo Lee , Manpyo Hong Abstraction for Privacy in Context-Aware Environments. [Citation Graph (0, 0)][DBLP ] MATA, 2005, pp:384-393 [Conf ] Kyuock Lee , Youngsun Weon , Manpyo Hong Multiple Pipelined Hash Joins Using Synchronization of Page Execution Time. [Citation Graph (0, 0)][DBLP ] PDPTA, 2000, pp:- [Conf ] Kyuock Lee , Youngsun Weon , Manpyo Hong Multiple Pipelined Hash Joins Using Synchronization of Page Execution Time. [Citation Graph (0, 0)][DBLP ] PDPTA, 2000, pp:- [Conf ] Do Park , Jaehong Shim , Kyunghee Choi , K. Chung , Dongyoon Kim , Seungkyu Park , Manpyo Hong A Real-Time Micro Kernel Implemented on Transputer. [Citation Graph (0, 0)][DBLP ] PDPTA, 1996, pp:1106-1117 [Conf ] Youngho Park , Manpyo Hong , Yonghwa Lee , Kyubum Wee , Hongjin Yeh Optimal Transmission Scheduling for All-to-All Broadcast in WDM Optical Passive Star Networks. [Citation Graph (0, 0)][DBLP ] PDPTA, 1999, pp:2300-2306 [Conf ] Kyongok Yun , Kihyun Song , Kyunghee Choi , Gihyun Jung , Seungkyu Park , Manpyo Hong , Dugkyoo Choi A Heuristic Scheduling Algorithm of Imprecise Multiprocessor System with O/l Constraint. [Citation Graph (0, 0)][DBLP ] RTCSA, 1996, pp:307-313 [Conf ] Fine-Grained View-Based Access Control for RDF Cloaking. [Citation Graph (, )][DBLP ] On Improving the Accuracy and Performance of Content-Based File Type Identification. [Citation Graph (, )][DBLP ] Proving a Shuffle Using Representations of the Symmetric Group. [Citation Graph (, )][DBLP ] Fast file-type identification. [Citation Graph (, )][DBLP ] EDGAR: Extended Dynamic Group-Key AgReement. [Citation Graph (, )][DBLP ] Binding Update Authentication Scheme for Mobile IPv6. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs