|
Search the dblp DataBase
Kiyoung Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Moonsun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim, Jinoh Kim
Applying Data Mining Techniques to Analyze Alert Data. [Citation Graph (0, 0)][DBLP] APWeb, 2003, pp:193-200 [Conf]
- Kyeong Ja Jeong, Moonsun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim
Alert Analysis Using Data Mining for Security Policy Server in Policy Based Network Security Management. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:219-225 [Conf]
- Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:20-26 [Conf]
- Miyoun Yoon, Kiyoung Kim, Yongtae Shin
Robust Multimedia Authentication in Mobile Multicast Environment. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:551-557 [Conf]
- Miyoun Yoon, Kiyoung Kim, Yongtae Shin
Robust Authentication of Multimedia Stream over Multicast Network. [Citation Graph (0, 0)][DBLP] Human.Society@Internet 2003, 2003, pp:632-637 [Conf]
- Gaeil Ahn, Kiyoung Kim, Jongsoo Jang
Fast and Strong Control of Congestion-Making Traffic. [Citation Graph (0, 0)][DBLP] ICETE (2), 2004, pp:20-29 [Conf]
- Gaeil Ahn, Kiyoung Kim
Active Host Information-Based Abnormal IP Address Detection. [Citation Graph (0, 0)][DBLP] ICN (2), 2005, pp:689-698 [Conf]
- Kiyoung Kim, Miyoun Yoon, Yongtae Shin
Error Recovery Algorithm for Multimedia Stream in the Tree-Based Multicast Environments. [Citation Graph (0, 0)][DBLP] ICOIN, 2003, pp:243-252 [Conf]
- Kiyoung Kim, Myung-Kyu Yi, Yongtae Shin, Jaesoo Kim
A State-Based Fast Handover Scheme for Hierarchical Mobile IPv6. [Citation Graph (0, 0)][DBLP] ICOIN, 2004, pp:174-183 [Conf]
- Jinoh Kim, Kiyoung Kim, Jongsoo Jang
Policy-Based Intrusion Detection and Automated Response Mechanism. [Citation Graph (0, 0)][DBLP] ICOIN (2), 2002, pp:399-408 [Conf]
- Sook-Yeon Kim, Myung-Eun Kim, Kiyoung Kim, Jongsoo Jang
Information Model for Policy-Based Network Security Management. [Citation Graph (0, 0)][DBLP] ICOIN (1), 2002, pp:662-672 [Conf]
- Kiyoung Kim, Miyoun Yoon, Yongtae Shin
Adaptive Mobile Multicast Guaranteed QoS over Heterogeneous Network. [Citation Graph (0, 0)][DBLP] International Conference on Wireless Networks, 2003, pp:520-526 [Conf]
- Myung-Jin Lee, Moon Sun Shin, Ho Sung Moon, Keun Ho Ryu, Ki Young Kim
Design and Implementation of Alert Analyzer with Data Mining Engine. [Citation Graph (0, 0)][DBLP] IDEAL, 2003, pp:1107-1112 [Conf]
- Minho Han, Kiyoung Kim, Jongsoo Jang
IXP2400 Network Processor Architecture for IPSEC Application. [Citation Graph (0, 0)][DBLP] IMSA, 2005, pp:28-31 [Conf]
- Gaeil Ahn, Kiyoung Kim, Jongsoo Jang
MF (Minority First) Scheme for defeating Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:1233-1238 [Conf]
- Sehwan Kim, Kiyoung Kim, Woontack Woo
Projection-Based Registration Using Color and Texture Information for Virtual Environment Generation. [Citation Graph (0, 0)][DBLP] PCM (1), 2004, pp:434-443 [Conf]
- Kiyoung Kim, Woontack Woo
A Multi-view Camera Tracking for Modeling of Indoor Environment. [Citation Graph (0, 0)][DBLP] PCM (1), 2004, pp:288-297 [Conf]
- Youngsoo Pi, Kiyoung Kim, Miyoun Yoon, Yongtae Shin
Reliable Multicasting with Low Control Signaling Via Regional Location Management for Mobile Hosts. [Citation Graph (0, 0)][DBLP] PDPTA, 2003, pp:921-927 [Conf]
- Hyuck Han, Jai Wug Kim, Jongpil Lee, Youngjin Yu, Kiyoung Kim, Heon Young Yeom
Practical Fault-Tolerant Framework for eScience Infrastructure. [Citation Graph (0, 0)][DBLP] e-Science, 2006, pp:57- [Conf]
Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. [Citation Graph (, )][DBLP]
USB Data leakage prevention Using hardware based data inspection technique. [Citation Graph (, )][DBLP]
MRBench: A Benchmark for MapReduce Framework. [Citation Graph (, )][DBLP]
Marker-Less Tracking for Multi-layer Authoring in AR Books. [Citation Graph (, )][DBLP]
Realization of u-Contents: u-Realism, u-Mobility and u-Intelligence. [Citation Graph (, )][DBLP]
Virtual Reality in Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]
Context-Aware Dynamic Security Configuration for Mobile Communication Device. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.303secs
|