2004 |
6 | EE | Hyung-Jong Kim:
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction.
AIS 2004: 81-89 |
5 | EE | Hyung-Woo Lee,
Taekyoung Kwon,
Hyung-Jong Kim:
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack.
AIS 2004: 90-99 |
4 | EE | Hyung-Jong Kim,
Joonmo Kim,
Kang Shin Lee,
Hongsub Lee,
Tae Ho Cho:
Simulation-Based Security Testing for Continuity of Essential Service.
ICCSA (1) 2004: 567-576 |
3 | EE | Eun-Jung Choi,
Hyung-Jong Kim,
Myuhng Joo Kim:
DMKB : A Defense Mechanism Knowledge Base.
ICCSA (1) 2004: 683-692 |
2003 |
2 | | Eun-Jung Choi,
Ju-Young Yu,
Young-Hyun Kim,
Myuhng Joo Kim,
Do-Yoon Ha,
Hyung-Jong Kim:
Defense Mechanism for Information and Communication Infrastructure.
International Conference on Internet Computing 2003: 325-329 |
2002 |
1 | EE | Jong-Young Koh,
Mi Ra Yi,
Tae Ho Cho,
Hyung-Jong Kim,
Hong-Geun Kim:
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies.
ICICS 2002: 374-385 |