Search the dblp DataBase
Jintae Oh :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dae-Won Kim , Jin-Tae Oh Hardware Supports for Network Traffic Anomaly Detection. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2006, pp:230-235 [Conf ] Byoung-Koo Kim , Young-Jun Heo , Jin-Tae Oh Design and Implementation of FPGA Based High-Performance Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:724-725 [Conf ] Dong-ho Kang , Byoung-Koo Kim , Jin-Tae Oh , Taek-Yong Nam , Jong-Soo Jang FPGA Based Intrusion Detection System Against Unknown and Known Attacks. [Citation Graph (0, 0)][DBLP ] PRIMA, 2006, pp:801-806 [Conf ] Sungwon Yi , Byoung-Koo Kim , Jintae Oh , Jongsoo Jang , George Kesidis , Chita R. Das Memory-efficient content filtering hardware for high-speed intrusion detection systems. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:264-269 [Conf ] Byoung-Koo Kim , Seungyong Yoon , Jintae Oh ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP ] APNOMS, 2007, pp:344-353 [Conf ] Seungyong Yoon , Byoung-Koo Kim , Jintae Oh , Jongsoo Jang High Performance Session State Management Scheme for Stateful Packet Inspection. [Citation Graph (0, 0)][DBLP ] APNOMS, 2007, pp:591-594 [Conf ] Ik-Kyun Kim , Koohong Kang , YangSeo Choi , Daewon Kim , Jintae Oh , Kijun Han A Practical Approach for Detecting Executable Codes in Network Traffic. [Citation Graph (0, 0)][DBLP ] APNOMS, 2007, pp:354-363 [Conf ] Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme. [Citation Graph (, )][DBLP ] Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection. [Citation Graph (, )][DBLP ] Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique. [Citation Graph (, )][DBLP ] Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. [Citation Graph (, )][DBLP ] Function Call Mechanism Based Executable Code Detection for the Network Security. [Citation Graph (, )][DBLP ] Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs