dblp.uni-trier.dewww.uni-trier.de

BongNam Noh

Bong-Nam Noh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
32EESang-Kyun Noh, Joo-Hyung Oh, Jae-Seo Lee, Bong-Nam Noh, Hyun-Cheol Jeong: Detecting P2P Botnets Using a Multi-phased Flow Model. ICDS 2009: 247-253
2008
31EEJun-Hyung Park, Minsoo Kim, Bong-Nam Noh: A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. WISA 2008: 201-210
2007
30EEJeong-Wook Kim, Hyug-Hyun Cho, Gil-Jong Mun, Jae-Hyun Seo, Bong-Nam Noh, Yong-Min Kim: Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network. FGCN (2) 2007: 559-564
2006
29EESang-Kyun Noh, Yong-Min Kim, DongKook Kim, Bong-Nam Noh: An Efficient Similarity Measure for Clustering of Categorical Sequences. Australian Conference on Artificial Intelligence 2006: 372-382
28EEGil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh: Network Intrusion Detection Using Statistical Probability Distribution. ICCSA (2) 2006: 340-348
27EESang-Kyun Noh, Yong-Min Kim, DongKook Kim, BongNam Noh: Network Anomaly Detection Based on Clustering of Sequence Patterns. ICCSA (2) 2006: 349-358
26EEJung-Sun Kim, Seungyong Lee, Minsoo Kim, Jae-Hyun Seo, BongNam Noh: A Security Architecture for Adapting Multiple Access Control Models to Operating Systems. ICCSA (5) 2006: 922-931
25EEHyun-Uk Hwang, Min-Soo Kim, Bong-Nam Noh: Expert System Using Fuzzy Petri Nets in Computer Forensics. ICHIT 2006: 312-322
24 Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. D. Joshi: A similarity based technique for detecting malicious executable files for computer forensics. IRI 2006: 188-193
23EESang-Kyun Noh, DongKook Kim, Yong-Min Kim, Bong-Nam Noh: Modeling of Network Intrusions Based on the Multiple Transition Probability. IWSEC 2006: 278-291
22EEInSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee: Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. SUTC (2) 2006: 96-103
21 InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee: Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing. WEBIST (1) 2006: 190-198
20EEJae-Chul Park, Bong-Nam Noh: SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment. WISA 2006: 74-82
2005
19EEGil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh: Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. CISC 2005: 254-264
18EEYoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh: The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. EUC Workshops 2005: 490-498
17EEYoungLok Lee, HyungHyo Lee, Seungyong Lee, InSu Kim, BongNam Noh: Development of Event Manager and Its Application in Jini Environment. EUC Workshops 2005: 704-713
16EEMinsoo Kim, Jae-Hyun Seo, Il-Ahn Cheong, BongNam Noh: Auto-generation of Detection Rules with Tree Induction Algorithm. FSKD (2) 2005: 160-169
15EEMinsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choonsik Park: An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. ICCSA (2) 2005: 225-234
14EEHyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee: A Privacy Protection Model in ID Management Using Access Control. ICCSA (2) 2005: 82-91
2004
13EEJung-Sun Kim, Minsoo Kim, BongNam Noh: A Fuzzy Expert System for Network Forensics. ICCSA (1) 2004: 175-182
12EEJun-Hyung Park, Minsoo Kim, BongNam Noh: Detection Techniques for ELF Executable File Using Assembly Instruction Searching. ICCSA (1) 2004: 230-237
11EEHyungHyo Lee, Seungyong Lee, BongNam Noh: A New Role-Based Authorization Model in a Corporate Workflow Systems. ICCSA (1) 2004: 701-710
10EEIl-Ahn Cheong, Yong-Min Kim, Minsoo Kim, BongNam Noh: The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. ICOIN 2004: 962-972
9EESeong Ho Lee, HyungHyo Lee, BongNam Noh: A Rule-Based Intrusion Alert Correlation System for Integrated Security Management. International Conference on Computational Science 2004: 365-372
8EESeungyong Lee, Yong-Min Kim, BongNam Noh, HyungHyo Lee: A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. International Conference on Computational Science 2004: 639-643
7EEHyungHyo Lee, YoungLok Lee, BongNam Noh: A Framework for Modeling Organization Structure in Role Engineering. PARA 2004: 1017-1024
2003
6EEYongHoon Yi, MyongJae Kim, YoungLok Lee, HyungHyo Lee, BongNam Noh: Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. APWeb 2003: 287-292
5EEHyungHyo Lee, YoungLok Lee, BongNam Noh: A New Role-Based Delegation Model Using Sub-role Hierarchies. ISCIS 2003: 811-818
4 JongSoon Park, YoungLok Lee, HyungHyo Lee, BongNam Noh: A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. Security and Management 2003: 294-302
3 Sang-Kil Park, Jongsoo Jang, BongNam Noh: Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. Security and Management 2003: 397-401
2002
2EEHyungHyo Lee, BongNam Noh: Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management. ICOIN (2) 2002: 430-441
1999
1EEHyungHyo Lee, BongNam Noh: An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. ICPP Workshops 1999: 179-184

Coauthor Index

1Il-Ahn Cheong [10] [16]
2Hyug-Hyun Cho [30]
3Hyang-Chang Choi [14]
4Hyun-Uk Hwang [25]
5Jongsoo Jang [3]
6Hyun-Cheol Jeong [32]
7James B. D. Joshi [24]
8DongKook Kim [19] [23] [27] [28] [29]
9InSu Kim [17] [21] [22]
10Jeong-Wook Kim [30]
11Jung-Sun Kim [13] [26]
12Min-Soo Kim [25]
13Minsoo Kim [10] [12] [13] [15] [16] [24] [26] [31]
14MyongJae Kim [6]
15Yong-Min Kim [8] [10] [19] [23] [27] [28] [29] [30]
16HyungHyo Lee [1] [2] [4] [5] [6] [7] [8] [9] [11] [14] [17] [18] [21] [22]
17Jae-Seo Lee [32]
18Seong Ho Lee [9]
19Seungyong Lee [8] [11] [15] [17] [18] [21] [22] [26]
20YoungLok Lee [4] [5] [6] [7] [17] [18] [21] [22]
21Gil-Jong Mun [19] [28] [30]
22Sang-Kyun Noh [23] [27] [29] [32]
23Joo-Hyung Oh [32]
24Choonsik Park [15]
25Eung Ki Park [15]
26HeeMan Park [18] [21] [22]
27Jae-Chul Park [20]
28JongSoon Park [4]
29Jun-Hyung Park [12] [24] [31]
30Sang-Kil Park [3]
31Jae-Hyun Seo [14] [15] [16] [26] [30]
32Jung-Taek Seo [15]
33YongHoon Yi [6] [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)