The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eul-Gyu Im: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hoh Peter In, Konstantinos A. Meintanis, Ming Zhang, Eul-Gyu Im
    Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme. [Citation Graph (0, 0)][DBLP]
    ADVIS, 2004, pp:533-542 [Conf]
  2. Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim
    Adaptive Architecture for Web Server Survivability. [Citation Graph (0, 0)][DBLP]
    ADVIS, 2004, pp:172-180 [Conf]
  3. Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter In
    A Scalable, Ordered Scenario-Based Network Security Simulator. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:487-494 [Conf]
  4. Eul-Gyu Im, B. Clifford Neuman
    A Flexible Framework for Replication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:486-491 [Conf]
  5. Sung-Wook Ryu, Eul-Gyu Im, B. Clifford Neuman
    Distributed Garbage Collection by Timeouts and Backward Inquiry. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:426-432 [Conf]
  6. Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo
    Safe Patch Distribution Architecture in Intranet Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:455-460 [Conf]
  7. Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won
    Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:777-786 [Conf]
  8. In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won
    Information System Modeling for Analysis of Propagation Effects and Levels of Damage. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:54-63 [Conf]
  9. Eul-Gyu Im, Yong Ho Song
    An Adaptive Approach to Handle DoS Attack for Web Services. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:634-635 [Conf]
  10. Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park
    Hybrid Modeling for Large-Scale Worm Propagation Simulations. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:572-577 [Conf]
  11. Yongsu Park, Yong Ho Song, Eul-Gyu Im
    Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:731-732 [Conf]
  12. Yong Ho Song, Eul-Gyu Im
    Secure Contents Distribution Using Flash Memory Technology. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:650-651 [Conf]
  13. Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im
    A New Methodology of Analyzing Security Vulnerability for Network Services. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:737-738 [Conf]
  14. Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee
    Intrusion-Tolerant System Design for Web Server Survivability. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:124-134 [Conf]
  15. Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee
    Cascade Damage Estimation Model for Internet Attacks. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:163-164 [Conf]
  16. Hyo Jung Yun, Ki Nam Kim, Eul-Gyu Im, Yong Ho Song
    Effective Elimination of Redundant Packets in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:214-219 [Conf]
  17. In-Jung Kim, Cheol Won Lee, Eul-Gyu Im
    Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:75-84 [Conf]
  18. Eung Ki Park, Jung-Taek Seo, Eul-Gyu Im, Cheolwon Lee
    Vulnerability Analysis and Evaluation within an Intranet. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:514-515 [Conf]
  19. Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang
    A Hybrid Model for Worm Simulations in a Large Network. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:301-306 [Conf]

  20. Survey on low power routing protocols in MANET from security viewpoints. [Citation Graph (, )][DBLP]


  21. Data Protection in Memory Using Byte Reordering. [Citation Graph (, )][DBLP]


Search in 0.045secs, Finished in 0.047secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002