|
Search the dblp DataBase
Eul-Gyu Im:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hoh Peter In, Konstantinos A. Meintanis, Ming Zhang, Eul-Gyu Im
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme. [Citation Graph (0, 0)][DBLP] ADVIS, 2004, pp:533-542 [Conf]
- Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim
Adaptive Architecture for Web Server Survivability. [Citation Graph (0, 0)][DBLP] ADVIS, 2004, pp:172-180 [Conf]
- Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter In
A Scalable, Ordered Scenario-Based Network Security Simulator. [Citation Graph (0, 0)][DBLP] AsiaSim, 2004, pp:487-494 [Conf]
- Eul-Gyu Im, B. Clifford Neuman
A Flexible Framework for Replication in Distributed Systems. [Citation Graph (0, 0)][DBLP] COMPSAC, 2003, pp:486-491 [Conf]
- Sung-Wook Ryu, Eul-Gyu Im, B. Clifford Neuman
Distributed Garbage Collection by Timeouts and Backward Inquiry. [Citation Graph (0, 0)][DBLP] COMPSAC, 2003, pp:426-432 [Conf]
- Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo
Safe Patch Distribution Architecture in Intranet Environments. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:455-460 [Conf]
- Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2006, pp:777-786 [Conf]
- In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won
Information System Modeling for Analysis of Propagation Effects and Levels of Damage. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:54-63 [Conf]
- Eul-Gyu Im, Yong Ho Song
An Adaptive Approach to Handle DoS Attack for Web Services. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:634-635 [Conf]
- Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park
Hybrid Modeling for Large-Scale Worm Propagation Simulations. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:572-577 [Conf]
- Yongsu Park, Yong Ho Song, Eul-Gyu Im
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:731-732 [Conf]
- Yong Ho Song, Eul-Gyu Im
Secure Contents Distribution Using Flash Memory Technology. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:650-651 [Conf]
- Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im
A New Methodology of Analyzing Security Vulnerability for Network Services. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:737-738 [Conf]
- Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee
Intrusion-Tolerant System Design for Web Server Survivability. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:124-134 [Conf]
- Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee
Cascade Damage Estimation Model for Internet Attacks. [Citation Graph (0, 0)][DBLP] WISI, 2006, pp:163-164 [Conf]
- Hyo Jung Yun, Ki Nam Kim, Eul-Gyu Im, Yong Ho Song
Effective Elimination of Redundant Packets in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:214-219 [Conf]
- In-Jung Kim, Cheol Won Lee, Eul-Gyu Im
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:75-84 [Conf]
- Eung Ki Park, Jung-Taek Seo, Eul-Gyu Im, Cheolwon Lee
Vulnerability Analysis and Evaluation within an Intranet. [Citation Graph (0, 0)][DBLP] ISI, 2004, pp:514-515 [Conf]
- Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang
A Hybrid Model for Worm Simulations in a Large Network. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:301-306 [Conf]
Survey on low power routing protocols in MANET from security viewpoints. [Citation Graph (, )][DBLP]
Data Protection in Memory Using Byte Reordering. [Citation Graph (, )][DBLP]
Search in 0.045secs, Finished in 0.047secs
|