2008 |
22 | EE | Hyun Jun Jang,
Dae Won Hwang,
Eul-Gyu Im:
Data Protection in Memory Using Byte Reordering.
ISI Workshops 2008: 62-68 |
2007 |
21 | EE | In-Jung Kim,
Cheol Won Lee,
Eul-Gyu Im:
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures.
ICCSA (2) 2007: 75-84 |
20 | | Che Ik Cho,
Eul-Gyu Im:
Survey on low power routing protocols in MANET from security viewpoints.
ICWN 2007: 118-124 |
19 | EE | Hyo Jung Yun,
Ki Nam Kim,
Eul-Gyu Im,
Yong Ho Song:
Effective Elimination of Redundant Packets in Wireless Sensor Networks.
MUE 2007: 214-219 |
18 | EE | Eul-Gyu Im,
Jung Sik Kim,
In Woo Noh,
Hyun Jun Jang:
A Hybrid Model for Worm Simulations in a Large Network.
PAISI 2007: 301-306 |
2006 |
17 | EE | In-Jung Kim,
Yoon Jung Chung,
YoungGyo Lee,
Eul-Gyu Im,
Dongho Won:
Information System Modeling for Analysis of Propagation Effects and Levels of Damage.
ICCSA (3) 2006: 54-63 |
16 | EE | Yoon Jung Chung,
In-Jung Kim,
Chulsoo Lee,
Eul-Gyu Im,
Dongho Won:
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model.
ICCSA (4) 2006: 777-786 |
15 | EE | Eul-Gyu Im,
Jung-Taek Seo,
Dong-Soo Kim,
Yong Ho Song,
Yongsu Park:
Hybrid Modeling for Large-Scale Worm Propagation Simulations.
ISI 2006: 572-577 |
14 | EE | Yongsu Park,
Yong Ho Song,
Eul-Gyu Im:
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.
ISI 2006: 731-732 |
13 | EE | Yong Ho Song,
Jung Min Park,
Yongsu Park,
Eul-Gyu Im:
A New Methodology of Analyzing Security Vulnerability for Network Services.
ISI 2006: 737-738 |
12 | EE | Taek Lee,
Hoh Peter In,
Eul-Gyu Im,
Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks.
WISI 2006: 163-164 |
2005 |
11 | EE | Eul-Gyu Im,
Yong Ho Song:
An Adaptive Approach to Handle DoS Attack for Web Services.
ISI 2005: 634-635 |
10 | EE | Yong Ho Song,
Eul-Gyu Im:
Secure Contents Distribution Using Flash Memory Technology.
ISI 2005: 650-651 |
9 | EE | Eul-Gyu Im,
Hoh Peter In,
Dae-Sik Choi,
Yong Ho Song:
Adaptation Policies for Web Server Intrusion-Tolerant System.
IEICE Transactions 88-B(8): 3462-3465 (2005) |
2004 |
8 | EE | Eung Ki Park,
Dae-Sik Choi,
Eul-Gyu Im,
Jung-Taek Seo,
Dongkyu Kim:
Adaptive Architecture for Web Server Survivability.
ADVIS 2004: 172-180 |
7 | EE | Hoh Peter In,
Konstantinos A. Meintanis,
Ming Zhang,
Eul-Gyu Im:
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme.
ADVIS 2004: 533-542 |
6 | EE | Joo Beom Yun,
Eung Ki Park,
Eul-Gyu Im,
Hoh Peter In:
A Scalable, Ordered Scenario-Based Network Security Simulator.
AsiaSim 2004: 487-494 |
5 | | Eung Ki Park,
Jung-Taek Seo,
Eul-Gyu Im,
Cheolwon Lee:
Vulnerability Analysis and Evaluation within an Intranet.
ISI 2004: 514-515 |
2003 |
4 | EE | Sung-Wook Ryu,
Eul-Gyu Im,
B. Clifford Neuman:
Distributed Garbage Collection by Timeouts and Backward Inquiry.
COMPSAC 2003: 426-432 |
3 | EE | Eul-Gyu Im,
B. Clifford Neuman:
A Flexible Framework for Replication in Distributed Systems.
COMPSAC 2003: 486-491 |
2 | | Taeshik Shon,
Jongsub Moon,
Cheolwon Lee,
Eul-Gyu Im,
Jung-Taek Seo:
Safe Patch Distribution Architecture in Intranet Environments.
Security and Management 2003: 455-460 |
1 | EE | Dae-Sik Choi,
Eul-Gyu Im,
Cheol Won Lee:
Intrusion-Tolerant System Design for Web Server Survivability.
WISA 2003: 124-134 |