|
Search the dblp DataBase
Ikkyun Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:20-26 [Conf]
- Ik-Kyun Kim, Koohong Kang, Zyn-Oh Kim, Jongsoo Jang, Youngsik Baek
A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks. [Citation Graph (0, 0)][DBLP] ICOIN (1), 2002, pp:17-27 [Conf]
- Ik-Kyun Kim, Koohong Kang, YangSeo Choi, Daewon Kim, Jintae Oh, Kijun Han
A Practical Approach for Detecting Executable Codes in Network Traffic. [Citation Graph (0, 0)][DBLP] APNOMS, 2007, pp:354-363 [Conf]
Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points. [Citation Graph (, )][DBLP]
Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme. [Citation Graph (, )][DBLP]
Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection. [Citation Graph (, )][DBLP]
Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique. [Citation Graph (, )][DBLP]
Function Call Mechanism Based Executable Code Detection for the Network Security. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|