The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kiyoung Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Moonsun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim, Jinoh Kim
    Applying Data Mining Techniques to Analyze Alert Data. [Citation Graph (0, 0)][DBLP]
    APWeb, 2003, pp:193-200 [Conf]
  2. Kyeong Ja Jeong, Moonsun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim
    Alert Analysis Using Data Mining for Security Policy Server in Policy Based Network Security Management. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:219-225 [Conf]
  3. Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang
    An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:20-26 [Conf]
  4. Miyoun Yoon, Kiyoung Kim, Yongtae Shin
    Robust Multimedia Authentication in Mobile Multicast Environment. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:551-557 [Conf]
  5. Miyoun Yoon, Kiyoung Kim, Yongtae Shin
    Robust Authentication of Multimedia Stream over Multicast Network. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet 2003, 2003, pp:632-637 [Conf]
  6. Gaeil Ahn, Kiyoung Kim, Jongsoo Jang
    Fast and Strong Control of Congestion-Making Traffic. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:20-29 [Conf]
  7. Gaeil Ahn, Kiyoung Kim
    Active Host Information-Based Abnormal IP Address Detection. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:689-698 [Conf]
  8. Kiyoung Kim, Miyoun Yoon, Yongtae Shin
    Error Recovery Algorithm for Multimedia Stream in the Tree-Based Multicast Environments. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:243-252 [Conf]
  9. Kiyoung Kim, Myung-Kyu Yi, Yongtae Shin, Jaesoo Kim
    A State-Based Fast Handover Scheme for Hierarchical Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:174-183 [Conf]
  10. Jinoh Kim, Kiyoung Kim, Jongsoo Jang
    Policy-Based Intrusion Detection and Automated Response Mechanism. [Citation Graph (0, 0)][DBLP]
    ICOIN (2), 2002, pp:399-408 [Conf]
  11. Sook-Yeon Kim, Myung-Eun Kim, Kiyoung Kim, Jongsoo Jang
    Information Model for Policy-Based Network Security Management. [Citation Graph (0, 0)][DBLP]
    ICOIN (1), 2002, pp:662-672 [Conf]
  12. Kiyoung Kim, Miyoun Yoon, Yongtae Shin
    Adaptive Mobile Multicast Guaranteed QoS over Heterogeneous Network. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2003, pp:520-526 [Conf]
  13. Myung-Jin Lee, Moon Sun Shin, Ho Sung Moon, Keun Ho Ryu, Ki Young Kim
    Design and Implementation of Alert Analyzer with Data Mining Engine. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2003, pp:1107-1112 [Conf]
  14. Minho Han, Kiyoung Kim, Jongsoo Jang
    IXP2400 Network Processor Architecture for IPSEC Application. [Citation Graph (0, 0)][DBLP]
    IMSA, 2005, pp:28-31 [Conf]
  15. Gaeil Ahn, Kiyoung Kim, Jongsoo Jang
    MF (Minority First) Scheme for defeating Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1233-1238 [Conf]
  16. Sehwan Kim, Kiyoung Kim, Woontack Woo
    Projection-Based Registration Using Color and Texture Information for Virtual Environment Generation. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2004, pp:434-443 [Conf]
  17. Kiyoung Kim, Woontack Woo
    A Multi-view Camera Tracking for Modeling of Indoor Environment. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2004, pp:288-297 [Conf]
  18. Youngsoo Pi, Kiyoung Kim, Miyoun Yoon, Yongtae Shin
    Reliable Multicasting with Low Control Signaling Via Regional Location Management for Mobile Hosts. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2003, pp:921-927 [Conf]
  19. Hyuck Han, Jai Wug Kim, Jongpil Lee, Youngjin Yu, Kiyoung Kim, Heon Young Yeom
    Practical Fault-Tolerant Framework for eScience Infrastructure. [Citation Graph (0, 0)][DBLP]
    e-Science, 2006, pp:57- [Conf]

  20. Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. [Citation Graph (, )][DBLP]


  21. USB Data leakage prevention Using hardware based data inspection technique. [Citation Graph (, )][DBLP]


  22. MRBench: A Benchmark for MapReduce Framework. [Citation Graph (, )][DBLP]


  23. Marker-Less Tracking for Multi-layer Authoring in AR Books. [Citation Graph (, )][DBLP]


  24. Realization of u-Contents: u-Realism, u-Mobility and u-Intelligence. [Citation Graph (, )][DBLP]


  25. Virtual Reality in Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]


  26. Context-Aware Dynamic Security Configuration for Mobile Communication Device. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.303secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002