The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yong-Min Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sang-Kyun Noh, Yong-Min Kim, DongKook Kim, Bong-Nam Noh
    An Efficient Similarity Measure for Clustering of Categorical Sequences. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2006, pp:372-382 [Conf]
  2. Gil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh
    Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:254-264 [Conf]
  3. Seungyong Lee, Yong-Min Kim, BongNam Noh, HyungHyo Lee
    A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:639-643 [Conf]
  4. Sang-Kyun Noh, Yong-Min Kim, DongKook Kim, BongNam Noh
    Network Anomaly Detection Based on Clustering of Sequence Patterns. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:349-358 [Conf]
  5. Gil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh
    Network Intrusion Detection Using Statistical Probability Distribution. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:340-348 [Conf]
  6. Il-Ahn Cheong, Yong-Min Kim, Minsoo Kim, BongNam Noh
    The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:962-972 [Conf]
  7. Sang-Kyun Noh, DongKook Kim, Yong-Min Kim, Bong-Nam Noh
    Modeling of Network Intrusions Based on the Multiple Transition Probability. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:278-291 [Conf]
  8. Seong-Joo Kim, Jong-Soo Kim, Sung-Hyun Kim, Yong-Min Kim
    Evolvable Recommendation System in the Portable Device Based on the Emotion Awareness. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:251-257 [Conf]

  9. Parallel Approach to Fuzzy Vector Quantization for Image Compression. [Citation Graph (, )][DBLP]


  10. Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network. [Citation Graph (, )][DBLP]


  11. An Automatic Identification of a Damaged Malicious File Using HMM against Anti-Forensics. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002