|
Search the dblp DataBase
Kyung-suk Lhee:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Usman Tariq, Manpyo Hong, Kyung-suk Lhee
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. [Citation Graph (0, 0)][DBLP] ADMA, 2006, pp:1025-1036 [Conf]
- Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong
E-mail Worm Detection Using the Analysis of Behavior. [Citation Graph (0, 0)][DBLP] ICDCIT, 2005, pp:348-356 [Conf]
- Kyung-suk Lhee, Steve J. Chapin
Type-Assisted Dynamic Buffer Overflow Detection. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:81-88 [Conf]
- Kyung-suk Lhee, Steve J. Chapin
Detection of file-based race conditions. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:105-119 [Journal]
- Kyung-suk Lhee, Steve J. Chapin
Buffer overflow and format string overflow vulnerabilities. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 2003, v:33, n:5, pp:423-460 [Journal]
Detection of Malcodes by Packet Classification. [Citation Graph (, )][DBLP]
On Improving the Accuracy and Performance of Content-Based File Type Identification. [Citation Graph (, )][DBLP]
Fast file-type identification. [Citation Graph (, )][DBLP]
Binding Update Authentication Scheme for Mobile IPv6. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|