2008 | ||
---|---|---|
25 | EE | Daewon Kim, Yangseo Choi, Ikkyun Kim, Jintae Oh, Jongsoo Jang: Function Call Mechanism Based Executable Code Detection for the Network Security. SAINT 2008: 62-67 |
24 | EE | Jabeom Gu, Jaehoon Nah, Hyeokchan Kwon, Jongsoo Jang, Sehyun Park: Random Visitor: Defense against Identity Attacks in P2P Networks. IEICE Transactions 91-D(4): 1058-1073 (2008) |
23 | EE | Ikkyun Kim, Koohong Kang, Yangseo Choi, Daewon Kim, Jintae Oh, Jongsoo Jang, Kijun Han: Executable Code Recognition in Network Flows Using Instruction Transition Probabilities. IEICE Transactions 91-D(7): 2076-2078 (2008) |
22 | EE | Daewon Kim, Ikkyun Kim, Jintae Oh, Jongsoo Jang: Tracing Stored Program Counter to Detect Polymorphic Shellcode. IEICE Transactions 91-D(8): 2192-2195 (2008) |
21 | EE | Jongsoo Jang, Buhwan Jeong, Boonserm Kulvatunyou, J. Chang, Hyunbo Cho: Discovering and integrating distributed manufacturing services with semantic manufacturing capability profiles. Int. J. Computer Integrated Manufacturing 21(6): 631-646 (2008) |
2007 | ||
20 | EE | Seungyong Yoon, Byoung-koo Kim, Jintae Oh, Jongsoo Jang: High Performance Session State Management Scheme for Stateful Packet Inspection. APNOMS 2007: 591-594 |
19 | EE | Hyeokchan Kwon, Sangchoon Kim, Jaehoon Nah, Jongsoo Jang: Public Key Management Framework for Two-tier Super Peer Architecture. ICDCS Workshops 2007: 72 |
18 | EE | Sungwon Yi, Byoung-koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das: Memory-efficient content filtering hardware for high-speed intrusion detection systems. SAC 2007: 264-269 |
2006 | ||
17 | EE | Hyeokchan Kwon, Jaehoon Nah, Jongsoo Jang: A Protocol Switching Scheme for Developing Network Management Applications. ICOIN 2006: 862-872 |
16 | EE | Wonjoo Park, Dong-il Seo, Jongsoo Jang, Daeyoung Kim: A Study on Security Middleware Framework for the Ubiquitous Platform. VTC Fall 2006: 1-5 |
15 | EE | Jabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jaekwang Lee, Jongsoo Jang: Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks. WISA 2006: 282-296 |
2005 | ||
14 | Minho Han, Kiyoung Kim, Jongsoo Jang: IXP2400 Network Processor Architecture for IPSEC Application. IMSA 2005: 28-31 | |
2004 | ||
13 | Geonlyang Kim, Jinoh Kim, Jungchan Na, Jongsoo Jang: Role-based policy distribution techniques in policy-based networks. Communications, Internet, and Information Technology 2004: 103-107 | |
12 | Gaeil Ahn, Kiyoung Kim, Jongsoo Jang: Fast and Strong Control of Congestion-Making Traffic. ICETE (2) 2004: 20-29 | |
11 | EE | Hyeyoung Cho, Daeyoung Kim, Juhong Kim, Yoonmee Doh, Jongsoo Jang: Network Processor Based Network Intrusion Detection System. ICOIN 2004: 973-982 |
2003 | ||
10 | EE | Gaeil Ahn, Kiyoung Kim, Jongsoo Jang: MF (Minority First) Scheme for defeating Distributed Denial of Service Attacks. ISCC 2003: 1233-1238 |
9 | Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang: An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. Security and Management 2003: 20-26 | |
8 | Young-Jun Heo, Jongsoo Jang: Defeating DoS Attacks Using Wavelet Analysis. Security and Management 2003: 248-252 | |
7 | Sang-Kil Park, Jongsoo Jang, BongNam Noh: Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. Security and Management 2003: 397-401 | |
6 | Dong-ho Kang, Dong-il Seo, Jongsoo Jang: A Study on Bandwidth Consumption DDoS: Attack Defense. Security and Management 2003: 491-494 | |
2002 | ||
5 | EE | Ik-Kyun Kim, Koohong Kang, Zyn-Oh Kim, Jongsoo Jang, Youngsik Baek: A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks. ICOIN (1) 2002: 17-27 |
4 | EE | Sook-Yeon Kim, Myung-Eun Kim, Kiyoung Kim, Jongsoo Jang: Information Model for Policy-Based Network Security Management. ICOIN (1) 2002: 662-672 |
3 | EE | Jinoh Kim, Kiyoung Kim, Jongsoo Jang: Policy-Based Intrusion Detection and Automated Response Mechanism. ICOIN (2) 2002: 399-408 |
2 | Gaeil Ahn, Jongsoo Jang, Woojik Chun: An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation. Telecommunication Systems 19(3-4): 481-495 (2002) | |
1997 | ||
1 | Sung Won Sohn, Jongsoo Jang, Chang Suk Oh: Architecture of Multimedia Service Interworking for Heterogeneous Multi-Carrier ATM Network. IS&N 1997: 49-60 |