2007 |
9 | EE | Jeong-Wook Kim,
Hyug-Hyun Cho,
Gil-Jong Mun,
Jae-Hyun Seo,
Bong-Nam Noh,
Yong-Min Kim:
Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network.
FGCN (2) 2007: 559-564 |
2006 |
8 | EE | Sang-Kyun Noh,
Yong-Min Kim,
DongKook Kim,
Bong-Nam Noh:
An Efficient Similarity Measure for Clustering of Categorical Sequences.
Australian Conference on Artificial Intelligence 2006: 372-382 |
7 | EE | Gil-Jong Mun,
Yong-Min Kim,
DongKook Kim,
BongNam Noh:
Network Intrusion Detection Using Statistical Probability Distribution.
ICCSA (2) 2006: 340-348 |
6 | EE | Sang-Kyun Noh,
Yong-Min Kim,
DongKook Kim,
BongNam Noh:
Network Anomaly Detection Based on Clustering of Sequence Patterns.
ICCSA (2) 2006: 349-358 |
5 | EE | Sang-Kyun Noh,
DongKook Kim,
Yong-Min Kim,
Bong-Nam Noh:
Modeling of Network Intrusions Based on the Multiple Transition Probability.
IWSEC 2006: 278-291 |
2005 |
4 | EE | Gil-Jong Mun,
Yong-Min Kim,
DongKook Kim,
BongNam Noh:
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.
CISC 2005: 254-264 |
3 | EE | Seong-Joo Kim,
Jong-Soo Kim,
Sung-Hyun Kim,
Yong-Min Kim:
Evolvable Recommendation System in the Portable Device Based on the Emotion Awareness.
KES (2) 2005: 251-257 |
2004 |
2 | EE | Il-Ahn Cheong,
Yong-Min Kim,
Minsoo Kim,
BongNam Noh:
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network.
ICOIN 2004: 962-972 |
1 | EE | Seungyong Lee,
Yong-Min Kim,
BongNam Noh,
HyungHyo Lee:
A New Authorization Model for Workflow Management System Using the RPI-RBAC Model.
International Conference on Computational Science 2004: 639-643 |