2007 | ||
---|---|---|
6 | EE | Byung Ryong Kim, Ki-Chang Kim: Query Processing to Efficient Search in Ubiquitous Computing. International Conference on Computational Science (4) 2007: 849-852 |
2006 | ||
5 | EE | Byung Ryong Kim, Ki-Chang Kim: Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback. CSR 2006: 427-437 |
4 | EE | Byung Ryong Kim, Ki-Chang Kim: A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. ICCSA (3) 2006: 476-485 |
3 | EE | Byung Ryong Kim, Ki-Chang Kim: Efficient Caching Strategies for Gnutella-Like Systems to Achieve Anonymity in Unstructured P2P File Sharing. NGITS 2006: 117-128 |
2 | EE | Byung Ryong Kim, Ki-Chang Kim: Packet Manipulating Based on Zipf's Distribution to Protect from Attack in P2P Information Retrieval. Advances in Web Intelligence and Data Mining 2006: 121-130 |
2005 | ||
1 | EE | Byung Ryong Kim, Ki-Chang Kim: Anonymous Communication Systems in P2P Network with Random Agent Nodes. GCC 2005: 767-775 |
1 | Ki-Chang Kim | [1] [2] [3] [4] [5] [6] |