Bong-Nam Noh
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
32 | EE | Sang-Kyun Noh, Joo-Hyung Oh, Jae-Seo Lee, Bong-Nam Noh, Hyun-Cheol Jeong: Detecting P2P Botnets Using a Multi-phased Flow Model. ICDS 2009: 247-253 |
2008 | ||
31 | EE | Jun-Hyung Park, Minsoo Kim, Bong-Nam Noh: A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. WISA 2008: 201-210 |
2007 | ||
30 | EE | Jeong-Wook Kim, Hyug-Hyun Cho, Gil-Jong Mun, Jae-Hyun Seo, Bong-Nam Noh, Yong-Min Kim: Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network. FGCN (2) 2007: 559-564 |
2006 | ||
29 | EE | Sang-Kyun Noh, Yong-Min Kim, DongKook Kim, Bong-Nam Noh: An Efficient Similarity Measure for Clustering of Categorical Sequences. Australian Conference on Artificial Intelligence 2006: 372-382 |
28 | EE | Gil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh: Network Intrusion Detection Using Statistical Probability Distribution. ICCSA (2) 2006: 340-348 |
27 | EE | Sang-Kyun Noh, Yong-Min Kim, DongKook Kim, BongNam Noh: Network Anomaly Detection Based on Clustering of Sequence Patterns. ICCSA (2) 2006: 349-358 |
26 | EE | Jung-Sun Kim, Seungyong Lee, Minsoo Kim, Jae-Hyun Seo, BongNam Noh: A Security Architecture for Adapting Multiple Access Control Models to Operating Systems. ICCSA (5) 2006: 922-931 |
25 | EE | Hyun-Uk Hwang, Min-Soo Kim, Bong-Nam Noh: Expert System Using Fuzzy Petri Nets in Computer Forensics. ICHIT 2006: 312-322 |
24 | Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. D. Joshi: A similarity based technique for detecting malicious executable files for computer forensics. IRI 2006: 188-193 | |
23 | EE | Sang-Kyun Noh, DongKook Kim, Yong-Min Kim, Bong-Nam Noh: Modeling of Network Intrusions Based on the Multiple Transition Probability. IWSEC 2006: 278-291 |
22 | EE | InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee: Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. SUTC (2) 2006: 96-103 |
21 | InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee: Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing. WEBIST (1) 2006: 190-198 | |
20 | EE | Jae-Chul Park, Bong-Nam Noh: SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment. WISA 2006: 74-82 |
2005 | ||
19 | EE | Gil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh: Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. CISC 2005: 254-264 |
18 | EE | YoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh: The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. EUC Workshops 2005: 490-498 |
17 | EE | YoungLok Lee, HyungHyo Lee, Seungyong Lee, InSu Kim, BongNam Noh: Development of Event Manager and Its Application in Jini Environment. EUC Workshops 2005: 704-713 |
16 | EE | Minsoo Kim, Jae-Hyun Seo, Il-Ahn Cheong, BongNam Noh: Auto-generation of Detection Rules with Tree Induction Algorithm. FSKD (2) 2005: 160-169 |
15 | EE | Minsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choonsik Park: An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. ICCSA (2) 2005: 225-234 |
14 | EE | Hyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee: A Privacy Protection Model in ID Management Using Access Control. ICCSA (2) 2005: 82-91 |
2004 | ||
13 | EE | Jung-Sun Kim, Minsoo Kim, BongNam Noh: A Fuzzy Expert System for Network Forensics. ICCSA (1) 2004: 175-182 |
12 | EE | Jun-Hyung Park, Minsoo Kim, BongNam Noh: Detection Techniques for ELF Executable File Using Assembly Instruction Searching. ICCSA (1) 2004: 230-237 |
11 | EE | HyungHyo Lee, Seungyong Lee, BongNam Noh: A New Role-Based Authorization Model in a Corporate Workflow Systems. ICCSA (1) 2004: 701-710 |
10 | EE | Il-Ahn Cheong, Yong-Min Kim, Minsoo Kim, BongNam Noh: The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. ICOIN 2004: 962-972 |
9 | EE | Seong Ho Lee, HyungHyo Lee, BongNam Noh: A Rule-Based Intrusion Alert Correlation System for Integrated Security Management. International Conference on Computational Science 2004: 365-372 |
8 | EE | Seungyong Lee, Yong-Min Kim, BongNam Noh, HyungHyo Lee: A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. International Conference on Computational Science 2004: 639-643 |
7 | EE | HyungHyo Lee, YoungLok Lee, BongNam Noh: A Framework for Modeling Organization Structure in Role Engineering. PARA 2004: 1017-1024 |
2003 | ||
6 | EE | YongHoon Yi, MyongJae Kim, YoungLok Lee, HyungHyo Lee, BongNam Noh: Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. APWeb 2003: 287-292 |
5 | EE | HyungHyo Lee, YoungLok Lee, BongNam Noh: A New Role-Based Delegation Model Using Sub-role Hierarchies. ISCIS 2003: 811-818 |
4 | JongSoon Park, YoungLok Lee, HyungHyo Lee, BongNam Noh: A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. Security and Management 2003: 294-302 | |
3 | Sang-Kil Park, Jongsoo Jang, BongNam Noh: Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. Security and Management 2003: 397-401 | |
2002 | ||
2 | EE | HyungHyo Lee, BongNam Noh: Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management. ICOIN (2) 2002: 430-441 |
1999 | ||
1 | EE | HyungHyo Lee, BongNam Noh: An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. ICPP Workshops 1999: 179-184 |
1 | Il-Ahn Cheong | [10] [16] |
2 | Hyug-Hyun Cho | [30] |
3 | Hyang-Chang Choi | [14] |
4 | Hyun-Uk Hwang | [25] |
5 | Jongsoo Jang | [3] |
6 | Hyun-Cheol Jeong | [32] |
7 | James B. D. Joshi | [24] |
8 | DongKook Kim | [19] [23] [27] [28] [29] |
9 | InSu Kim | [17] [21] [22] |
10 | Jeong-Wook Kim | [30] |
11 | Jung-Sun Kim | [13] [26] |
12 | Min-Soo Kim | [25] |
13 | Minsoo Kim | [10] [12] [13] [15] [16] [24] [26] [31] |
14 | MyongJae Kim | [6] |
15 | Yong-Min Kim | [8] [10] [19] [23] [27] [28] [29] [30] |
16 | HyungHyo Lee | [1] [2] [4] [5] [6] [7] [8] [9] [11] [14] [17] [18] [21] [22] |
17 | Jae-Seo Lee | [32] |
18 | Seong Ho Lee | [9] |
19 | Seungyong Lee | [8] [11] [15] [17] [18] [21] [22] [26] |
20 | YoungLok Lee | [4] [5] [6] [7] [17] [18] [21] [22] |
21 | Gil-Jong Mun | [19] [28] [30] |
22 | Sang-Kyun Noh | [23] [27] [29] [32] |
23 | Joo-Hyung Oh | [32] |
24 | Choonsik Park | [15] |
25 | Eung Ki Park | [15] |
26 | HeeMan Park | [18] [21] [22] |
27 | Jae-Chul Park | [20] |
28 | JongSoon Park | [4] |
29 | Jun-Hyung Park | [12] [24] [31] |
30 | Sang-Kil Park | [3] |
31 | Jae-Hyun Seo | [14] [15] [16] [26] [30] |
32 | Jung-Taek Seo | [15] |
33 | YongHoon Yi | [6] [14] |