2008 |
21 | EE | Soojin Cho,
Manpyo Hong:
Proving a Shuffle Using Representations of the Symmetric Group.
ICISC 2008: 354-367 |
2007 |
20 | EE | Irfan Ahmed,
Usman Tariq,
Shoaib Mukhtar,
Kyung-suk Lhee,
S. W. Yoo,
Piao Yanji,
Manpyo Hong:
Binding Update Authentication Scheme for Mobile IPv6.
IAS 2007: 109-114 |
2006 |
19 | EE | Usman Tariq,
Manpyo Hong,
Kyung-suk Lhee:
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques.
ADMA 2006: 1025-1036 |
18 | EE | Gunhee Lee,
Song-hwa Chae,
Inwhan Hwang,
Manpyo Hong:
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments.
EUC Workshops 2006: 619-628 |
2005 |
17 | EE | Nakhoon Baek,
Ku-Jin Kim,
Manpyo Hong:
Vehicle Area Segmentation Using Grid-Based Feature Values.
CAIP 2005: 464-471 |
16 | EE | Tao Jiang,
Wonil Kim,
Kyung-suk Lhee,
Manpyo Hong:
E-mail Worm Detection Using the Analysis of Behavior.
ICDCIT 2005: 348-356 |
15 | EE | GangShin Lee,
Heeran Lim,
Manpyo Hong,
Dong Hoon Lee:
A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks.
ICOIN 2005: 806-813 |
14 | EE | Eun-Sun Cho,
Kang-Woo Lee,
Manpyo Hong:
Abstraction for Privacy in Context-Aware Environments.
MATA 2005: 384-393 |
2004 |
13 | EE | Hyungjoon Lee,
Wonil Kim,
Manpyo Hong:
Biologically Inspired Computer Virus Detection System.
BioADIT 2004: 153-165 |
12 | EE | Cholmin Kim,
Soung-uck Lee,
Manpyo Hong:
Macroscopic Treatment to Polymorphic E-mail Based Viruses.
ICCSA (3) 2004: 867-876 |
11 | EE | Heeran Lim,
Manpyo Hong:
Effective Packet Marking Approach to Defend against DDoS Attack.
ICCSA (4) 2004: 708-716 |
10 | EE | Cholmin Kim,
Wonil Kim,
Manpyo Hong:
Effective Detector Set Generation and Evolution for Artificial Immune System.
International Conference on Computational Science 2004: 491-498 |
9 | EE | Hyungjoon Lee,
Wonil Kim,
Manpyo Hong:
Artificial Immune System against Viral Attack.
International Conference on Computational Science 2004: 499-506 |
2001 |
8 | EE | Eun-Sun Cho,
Sunho Hong,
Sechang Oh,
Hong-Jin Yeh,
Manpyo Hong,
Cheol Won Lee,
Hyundong Park,
Chun-Sik Park:
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes.
ACISP 2001: 177-189 |
2000 |
7 | | Kyuock Lee,
Youngsun Weon,
Manpyo Hong:
Multiple Pipelined Hash Joins Using Synchronization of Page Execution Time.
PDPTA 2000 |
6 | | Kyuock Lee,
Youngsun Weon,
Manpyo Hong:
Multiple Pipelined Hash Joins Using Synchronization of Page Execution Time.
PDPTA 2000 |
1999 |
5 | | Hongjin Yeh,
Kyubum Wee,
Manpyo Hong:
Optimal Scheduling Algorithms in WDM Optical Passive Star Networks.
IPPS/SPDP Workshops 1999: 887-896 |
4 | | Youngho Park,
Manpyo Hong,
Yonghwa Lee,
Kyubum Wee,
Hongjin Yeh:
Optimal Transmission Scheduling for All-to-All Broadcast in WDM Optical Passive Star Networks.
PDPTA 1999: 2300-2306 |
1997 |
3 | EE | Dong-Soo Han,
Manpyo Hong:
Performance Predictor for HPF Compilers.
ICPADS 1997: 302-307 |
1996 |
2 | | Do Park,
Jaehong Shim,
Kyunghee Choi,
K. Chung,
Dongyoon Kim,
Seungkyu Park,
Manpyo Hong:
A Real-Time Micro Kernel Implemented on Transputer.
PDPTA 1996: 1106-1117 |
1 | EE | Kyongok Yun,
Kihyun Song,
Kyunghee Choi,
Gihyun Jung,
Seungkyu Park,
Manpyo Hong,
Dugkyoo Choi:
A Heuristic Scheduling Algorithm of Imprecise Multiprocessor System with O/l Constraint.
RTCSA 1996: 307-313 |