The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ikkyun Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang
    An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:20-26 [Conf]
  2. Ik-Kyun Kim, Koohong Kang, Zyn-Oh Kim, Jongsoo Jang, Youngsik Baek
    A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN (1), 2002, pp:17-27 [Conf]
  3. Ik-Kyun Kim, Koohong Kang, YangSeo Choi, Daewon Kim, Jintae Oh, Kijun Han
    A Practical Approach for Detecting Executable Codes in Network Traffic. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:354-363 [Conf]

  4. Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points. [Citation Graph (, )][DBLP]


  5. Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme. [Citation Graph (, )][DBLP]


  6. Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection. [Citation Graph (, )][DBLP]


  7. Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique. [Citation Graph (, )][DBLP]


  8. Function Call Mechanism Based Executable Code Detection for the Network Security. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002