| 2008 |
| 7 | EE | Ikkyun Kim,
Koohong Kang,
Yangseo Choi,
Daewon Kim,
Jintae Oh,
Jongsoo Jang,
Kijun Han:
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities.
IEICE Transactions 91-D(7): 2076-2078 (2008) |
| 2007 |
| 6 | EE | Ik-Kyun Kim,
Koohong Kang,
Yangseo Choi,
Daewon Kim,
Jintae Oh,
Kijun Han:
A Practical Approach for Detecting Executable Codes in Network Traffic.
APNOMS 2007: 354-363 |
| 5 | EE | Koohong Kang:
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions.
ICOIN 2007: 781-790 |
| 2003 |
| 4 | | Jinoh Kim,
Ik-Kyun Kim,
Kiyoung Kim,
Jongsoo Jang,
Sung Won Sohn,
Koohong Kang:
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
Security and Management 2003: 20-26 |
| 2002 |
| 3 | EE | Ik-Kyun Kim,
Koohong Kang,
Zyn-Oh Kim,
Jongsoo Jang,
Youngsik Baek:
A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks.
ICOIN (1) 2002: 17-27 |
| 1999 |
| 2 | | Koohong Kang,
Bart Steyaert:
Bound analysis for WRR scheduling in a statistical multiplexer with bursty sources.
Telecommunication Systems 12(2-3): 123-147 (1999) |
| 1997 |
| 1 | EE | Koohong Kang,
Cheeha Kim:
Performance analysis of statistical multiplexing of heterogeneous discrete-time Markovian arrival processes in an ATM network.
Computer Communications 20(11): 970-978 (1997) |