The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jong Sou Park: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park
    A Framework of Survivability Model for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:515-522 [Conf]
  2. Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee
    Network Security Modeling and Cyber Attack Simulation Methodology. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:320-333 [Conf]
  3. Khin Mi Mi Aung, Jong Sou Park
    A Framework of Software Rejuvenation for Survivability. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:507-510 [Conf]
  4. Dong Seong Kim, Ha-Nam Nguyen, Jong Sou Park
    Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:155-158 [Conf]
  5. Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi
    Linux-Based System Modelling for Cyber-attack Simulation. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:585-596 [Conf]
  6. Jong Sou Park, Khin Mi Mi Aung
    Transient Time Analysis of Network Security Survivability Using DEVS. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:607-616 [Conf]
  7. Jang-Se Lee, Dong Seong Kim, Jong Sou Park, Sung-Do Chi
    Design of Intelligent Security Management System Using Simulation-Based Analysis. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2005, pp:766-775 [Conf]
  8. Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
    Survival of the Internet Applications: A Cluster Recovery Model. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2006, pp:33- [Conf]
  9. Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
    A rejuvenation methodology of cluster recovery. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2005, pp:90-95 [Conf]
  10. Syng-Yup Ohn, Ha-Nam Nguyen, Dong Seong Kim, Jong Sou Park
    Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:895-902 [Conf]
  11. Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim
    Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:279-289 [Conf]
  12. Khin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim, Byungil Lee
    A Survivability Model for Cluster System Under DoS Attacks. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:567-572 [Conf]
  13. Jong Ha Hwang, Jae Ho Ro, Keung Hae Lee, Jong Sou Park, Soochan Hwang
    An XML-Based 3-Dimensional Graphic Database System. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2001, pp:454-467 [Conf]
  14. Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
    A Survivability Model for Cluster System. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:73-82 [Conf]
  15. Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
    A Model of ITS Using Cold Standby Cluster. [Citation Graph (0, 0)][DBLP]
    ICADL, 2005, pp:1-10 [Conf]
  16. Khin Mi Mi Aung, Jong Sou Park
    Software Rejuvenation Approach to Security Engineering. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:574-583 [Conf]
  17. Jong Sou Park, Jang-Se Lee, Hwan Kuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi
    SECUSIM: A Tool for the Cyber-Attack Simulation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:471-475 [Conf]
  18. Dong Seong Kim, Jong Sou Park
    Network-Based Intrusion Detection with Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:747-756 [Conf]
  19. Mohammed Golam Sadi, Dong Seong Kim, Jong Sou Park
    GBR: Grid Based Random Key Predistribution for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:310-315 [Conf]
  20. Dong Seong Kim, Sang Min Lee, Jong Sou Park
    Building Lightweight Intrusion Detection System Based on Random Forest. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:224-230 [Conf]
  21. Dong Seong Kim, Ha-Nam Nguyen, Syng-Yup Ohn, Jong Sou Park
    Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2005, pp:415-420 [Conf]
  22. Dong Seong Kim, Sang Min Lee, Jong Sou Park
    Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:981-989 [Conf]
  23. Dong Seong Kim, Jong Sou Park
    A Survivable Distributed Sensor Networks Through Stochastic Models. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:185-194 [Conf]
  24. Jong Sou Park, Sung-Hwan Kim, Dong Seong Kim
    A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:935-942 [Conf]
  25. Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim, Young Deog Song
    A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:2-13 [Conf]
  26. Dong Seong Kim, Sang Min Lee, Jong Sou Park
    Toward Lightweight Detection and Visualization for Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    MICAI, 2006, pp:632-640 [Conf]
  27. Khaja Mohammad Shazzad, Jong Sou Park
    Optimization of Intrusion Detection through Fast Hybrid Feature Selection. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:264-267 [Conf]
  28. Jong Sou Park, Hong Tae Jin, Dong Seong Kim
    Intrusion Detection System for Securing Geographical Information System Web Servers. [Citation Graph (0, 0)][DBLP]
    W2GIS, 2004, pp:110-119 [Conf]
  29. Sung-Do Chi, Jong Sou Park, Jang-Se Lee
    A Role of DEVS Simulation for Information Assurance. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:27-41 [Conf]
  30. Misun Moon, Dong Seong Kim, Jong Sou Park
    Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:743-749 [Conf]
  31. Dong Seong Kim, Taek-Hyun Shin, Byungil Lee, Jong Sou Park
    Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:887-893 [Conf]
  32. Su Thawda Win, Thandar Thein, Jong Sou Park
    To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:1-10 [Conf]
  33. Dong Seong Kim, Mohammed Golam Sadi, Jong Sou Park
    A Key Revocation Scheme for Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:41-49 [Conf]
  34. Shu Qin Ren, Dong Seong Kim, Jong Sou Park
    A Secure Data Aggregation Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:32-40 [Conf]

  35. Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. [Citation Graph (, )][DBLP]


  36. A Security Framework in RFID Multi-domain System. [Citation Graph (, )][DBLP]


  37. Privacy Preserving Support Vector Machines in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  38. A Privacy Enhanced Data Aggregation Model. [Citation Graph (, )][DBLP]


  39. Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks. [Citation Graph (, )][DBLP]


  40. A New Centralized Group Key Distribution and Revocation in Sensor Network. [Citation Graph (, )][DBLP]


  41. A Hybrid Approach for Real-Time Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  42. Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. [Citation Graph (, )][DBLP]


  43. Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization Algorithm. [Citation Graph (, )][DBLP]


  44. Increasing Availability and Survivability of Cluster Head in WSN. [Citation Graph (, )][DBLP]


  45. Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics. [Citation Graph (, )][DBLP]


  46. Improving Fault Tolerance by Virtualization and Software Rejuvenation. [Citation Graph (, )][DBLP]


  47. The Multi Agent System Solutions for Wireless Sensor Network Applications. [Citation Graph (, )][DBLP]


  48. Cloud computing: future solution for e-governance. [Citation Graph (, )][DBLP]


  49. An Efficient Music Retrieval Using Noise Cancellation. [Citation Graph (, )][DBLP]


  50. Spam Detection Using Feature Selection and Parameters Optimization. [Citation Graph (, )][DBLP]


  51. Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. [Citation Graph (, )][DBLP]


  52. A Recovery Model for Survivable Distributed Systems through the Use of Virtualization. [Citation Graph (, )][DBLP]


  53. Density Mining Based Resilient Data Aggregation for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  54. Self Organized Mobility in Nanosensor Network Based on Particle Swarm Optimization and Coverage Criteria. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.022secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002