|
Search the dblp DataBase
Jong Sou Park:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park
A Framework of Survivability Model for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:515-522 [Conf]
- Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee
Network Security Modeling and Cyber Attack Simulation Methodology. [Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:320-333 [Conf]
- Khin Mi Mi Aung, Jong Sou Park
A Framework of Software Rejuvenation for Survivability. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:507-510 [Conf]
- Dong Seong Kim, Ha-Nam Nguyen, Jong Sou Park
Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:155-158 [Conf]
- Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi
Linux-Based System Modelling for Cyber-attack Simulation. [Citation Graph (0, 0)][DBLP] AIS, 2004, pp:585-596 [Conf]
- Jong Sou Park, Khin Mi Mi Aung
Transient Time Analysis of Network Security Survivability Using DEVS. [Citation Graph (0, 0)][DBLP] AIS, 2004, pp:607-616 [Conf]
- Jang-Se Lee, Dong Seong Kim, Jong Sou Park, Sung-Do Chi
Design of Intelligent Security Management System Using Simulation-Based Analysis. [Citation Graph (0, 0)][DBLP] Australian Conference on Artificial Intelligence, 2005, pp:766-775 [Conf]
- Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
Survival of the Internet Applications: A Cluster Recovery Model. [Citation Graph (0, 0)][DBLP] CCGRID, 2006, pp:33- [Conf]
- Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
A rejuvenation methodology of cluster recovery. [Citation Graph (0, 0)][DBLP] CCGRID, 2005, pp:90-95 [Conf]
- Syng-Yup Ohn, Ha-Nam Nguyen, Dong Seong Kim, Jong Sou Park
Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm. [Citation Graph (0, 0)][DBLP] CIS, 2004, pp:895-902 [Conf]
- Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. [Citation Graph (0, 0)][DBLP] CISC, 2005, pp:279-289 [Conf]
- Khin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim, Byungil Lee
A Survivability Model for Cluster System Under DoS Attacks. [Citation Graph (0, 0)][DBLP] HPCC, 2005, pp:567-572 [Conf]
- Jong Ha Hwang, Jae Ho Ro, Keung Hae Lee, Jong Sou Park, Soochan Hwang
An XML-Based 3-Dimensional Graphic Database System. [Citation Graph (0, 0)][DBLP] Human.Society@Internet, 2001, pp:454-467 [Conf]
- Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
A Survivability Model for Cluster System. [Citation Graph (0, 0)][DBLP] ICA3PP, 2005, pp:73-82 [Conf]
- Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
A Model of ITS Using Cold Standby Cluster. [Citation Graph (0, 0)][DBLP] ICADL, 2005, pp:1-10 [Conf]
- Khin Mi Mi Aung, Jong Sou Park
Software Rejuvenation Approach to Security Engineering. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2004, pp:574-583 [Conf]
- Jong Sou Park, Jang-Se Lee, Hwan Kuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi
SECUSIM: A Tool for the Cyber-Attack Simulation. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:471-475 [Conf]
- Dong Seong Kim, Jong Sou Park
Network-Based Intrusion Detection with Support Vector Machines. [Citation Graph (0, 0)][DBLP] ICOIN, 2003, pp:747-756 [Conf]
- Mohammed Golam Sadi, Dong Seong Kim, Jong Sou Park
GBR: Grid Based Random Key Predistribution for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:310-315 [Conf]
- Dong Seong Kim, Sang Min Lee, Jong Sou Park
Building Lightweight Intrusion Detection System Based on Random Forest. [Citation Graph (0, 0)][DBLP] ISNN (2), 2006, pp:224-230 [Conf]
- Dong Seong Kim, Ha-Nam Nguyen, Syng-Yup Ohn, Jong Sou Park
Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System. [Citation Graph (0, 0)][DBLP] ISNN (3), 2005, pp:415-420 [Conf]
- Dong Seong Kim, Sang Min Lee, Jong Sou Park
Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2006, pp:981-989 [Conf]
- Dong Seong Kim, Jong Sou Park
A Survivable Distributed Sensor Networks Through Stochastic Models. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2006, pp:185-194 [Conf]
- Jong Sou Park, Sung-Hwan Kim, Dong Seong Kim
A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security. [Citation Graph (0, 0)][DBLP] KES (1), 2006, pp:935-942 [Conf]
- Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim, Young Deog Song
A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network. [Citation Graph (0, 0)][DBLP] MADNES, 2005, pp:2-13 [Conf]
- Dong Seong Kim, Sang Min Lee, Jong Sou Park
Toward Lightweight Detection and Visualization for Denial of Service Attacks. [Citation Graph (0, 0)][DBLP] MICAI, 2006, pp:632-640 [Conf]
- Khaja Mohammad Shazzad, Jong Sou Park
Optimization of Intrusion Detection through Fast Hybrid Feature Selection. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:264-267 [Conf]
- Jong Sou Park, Hong Tae Jin, Dong Seong Kim
Intrusion Detection System for Securing Geographical Information System Web Servers. [Citation Graph (0, 0)][DBLP] W2GIS, 2004, pp:110-119 [Conf]
- Sung-Do Chi, Jong Sou Park, Jang-Se Lee
A Role of DEVS Simulation for Information Assurance. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:27-41 [Conf]
- Misun Moon, Dong Seong Kim, Jong Sou Park
Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:743-749 [Conf]
- Dong Seong Kim, Taek-Hyun Shin, Byungil Lee, Jong Sou Park
Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:887-893 [Conf]
- Su Thawda Win, Thandar Thein, Jong Sou Park
To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2007, pp:1-10 [Conf]
- Dong Seong Kim, Mohammed Golam Sadi, Jong Sou Park
A Key Revocation Scheme for Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2007, pp:41-49 [Conf]
- Shu Qin Ren, Dong Seong Kim, Jong Sou Park
A Secure Data Aggregation Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2007, pp:32-40 [Conf]
Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. [Citation Graph (, )][DBLP]
A Security Framework in RFID Multi-domain System. [Citation Graph (, )][DBLP]
Privacy Preserving Support Vector Machines in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
A Privacy Enhanced Data Aggregation Model. [Citation Graph (, )][DBLP]
Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks. [Citation Graph (, )][DBLP]
A New Centralized Group Key Distribution and Revocation in Sensor Network. [Citation Graph (, )][DBLP]
A Hybrid Approach for Real-Time Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]
Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. [Citation Graph (, )][DBLP]
Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization Algorithm. [Citation Graph (, )][DBLP]
Increasing Availability and Survivability of Cluster Head in WSN. [Citation Graph (, )][DBLP]
Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics. [Citation Graph (, )][DBLP]
Improving Fault Tolerance by Virtualization and Software Rejuvenation. [Citation Graph (, )][DBLP]
The Multi Agent System Solutions for Wireless Sensor Network Applications. [Citation Graph (, )][DBLP]
Cloud computing: future solution for e-governance. [Citation Graph (, )][DBLP]
An Efficient Music Retrieval Using Noise Cancellation. [Citation Graph (, )][DBLP]
Spam Detection Using Feature Selection and Parameters Optimization. [Citation Graph (, )][DBLP]
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. [Citation Graph (, )][DBLP]
A Recovery Model for Survivable Distributed Systems through the Use of Virtualization. [Citation Graph (, )][DBLP]
Density Mining Based Resilient Data Aggregation for Wireless Sensor Network. [Citation Graph (, )][DBLP]
Self Organized Mobility in Nanosensor Network Based on Particle Swarm Optimization and Coverage Criteria. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.008secs
|