|
Search the dblp DataBase
Kwangsun Ko:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kwangsun Ko, Insook Jang, Yong-hyeog Kang, Jinseok Lee, Young Ik Eom
Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:1149-1156 [Conf]
- Kwangsun Ko, Gu Su Kim, June Kim, JungHyun Han, Ung-Mo Kim, Young Ik Eom
Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2006, pp:1028-1035 [Conf]
- Kwangsun Ko, Eun-kyung Cho, Taekeun Lee, Yong-hyeog Kang, Young Ik Eom
The Abnormal Traffic Control Framework Based on QoS Mechanisms. [Citation Graph (0, 0)][DBLP] ISCIS, 2004, pp:167-175 [Conf]
- Gu Su Kim, Kwangsun Ko, Ung-Mo Kim, Young Ik Eom
Implementation of OSD Security Framework and Credential Cache. [Citation Graph (0, 0)][DBLP] GPC, 2007, pp:666-671 [Conf]
- Kwangsun Ko, Seong-Goo Kang, Gyehyeon Gyeong, Young Ik Eom
Recursive Priority Inheritance Protocol for Solving Priority Inversion Problems in Real-Time Operating Systems. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (4), 2007, pp:977-980 [Conf]
Overlay Ring Based Secure Group Communication Scheme for Mobile Agents. [Citation Graph (, )][DBLP]
Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. [Citation Graph (, )][DBLP]
Design and implementation of the management agent for mobile devices based on OMA DM. [Citation Graph (, )][DBLP]
A cooperative content delivery scheme for multimedia services in contents delivery networks. [Citation Graph (, )][DBLP]
NeoMAN: Negotiation Management Method for IKE Protocol Based on X.509. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|