![]() | ![]() |
2008 | ||
---|---|---|
5 | EE | Jianhua Yang, Byong Lee, Stephen S. H. Huang: Monitoring Network Traffic to Detect Stepping-Stone Intrusion. AINA Workshops 2008: 56-61 |
4 | EE | Jianhua Yang, Byong Lee: Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. ATC 2008: 2-12 |
2007 | ||
3 | EE | Su-Hong Min, Byong Lee, Dong-Sub Cho: Dynamic Workload Balancing for Collaboration Strategy in Hybrid P2P System. GPC 2007: 374-384 |
2 | EE | Su-Hong Min, Byong Lee, Dong-Sub Cho: Efficient Content Distribution Method Based on Location and Similarity in Unstructured P2P System. KES (1) 2007: 781-788 |
2006 | ||
1 | EE | Jianhua Yang, Byong Lee, Yongzhong Zhang: Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. CANS 2006: 303-317 |
1 | Dong-Sub Cho | [2] [3] |
2 | Stephen S. H. Huang | [5] |
3 | Su-Hong Min | [2] [3] |
4 | Jianhua Yang | [1] [4] [5] |
5 | Yongzhong Zhang | [1] |