2008 |
7 | EE | Ikkyun Kim,
Koohong Kang,
Yangseo Choi,
Daewon Kim,
Jintae Oh,
Jongsoo Jang,
Kijun Han:
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities.
IEICE Transactions 91-D(7): 2076-2078 (2008) |
2007 |
6 | EE | Ik-Kyun Kim,
Koohong Kang,
Yangseo Choi,
Daewon Kim,
Jintae Oh,
Kijun Han:
A Practical Approach for Detecting Executable Codes in Network Traffic.
APNOMS 2007: 354-363 |
5 | EE | Koohong Kang:
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions.
ICOIN 2007: 781-790 |
2003 |
4 | | Jinoh Kim,
Ik-Kyun Kim,
Kiyoung Kim,
Jongsoo Jang,
Sung Won Sohn,
Koohong Kang:
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
Security and Management 2003: 20-26 |
2002 |
3 | EE | Ik-Kyun Kim,
Koohong Kang,
Zyn-Oh Kim,
Jongsoo Jang,
Youngsik Baek:
A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks.
ICOIN (1) 2002: 17-27 |
1999 |
2 | | Koohong Kang,
Bart Steyaert:
Bound analysis for WRR scheduling in a statistical multiplexer with bursty sources.
Telecommunication Systems 12(2-3): 123-147 (1999) |
1997 |
1 | EE | Koohong Kang,
Cheeha Kim:
Performance analysis of statistical multiplexing of heterogeneous discrete-time Markovian arrival processes in an ATM network.
Computer Communications 20(11): 970-978 (1997) |