dblp.uni-trier.dewww.uni-trier.de

Jintae Oh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
7EEDaewon Kim, Yangseo Choi, Ikkyun Kim, Jintae Oh, Jongsoo Jang: Function Call Mechanism Based Executable Code Detection for the Network Security. SAINT 2008: 62-67
6EEIkkyun Kim, Koohong Kang, Yangseo Choi, Daewon Kim, Jintae Oh, Jongsoo Jang, Kijun Han: Executable Code Recognition in Network Flows Using Instruction Transition Probabilities. IEICE Transactions 91-D(7): 2076-2078 (2008)
5EEDaewon Kim, Ikkyun Kim, Jintae Oh, Jongsoo Jang: Tracing Stored Program Counter to Detect Polymorphic Shellcode. IEICE Transactions 91-D(8): 2192-2195 (2008)
2007
4EEByoung-koo Kim, Seungyong Yoon, Jintae Oh: ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response. APNOMS 2007: 344-353
3EEIk-Kyun Kim, Koohong Kang, Yangseo Choi, Daewon Kim, Jintae Oh, Kijun Han: A Practical Approach for Detecting Executable Codes in Network Traffic. APNOMS 2007: 354-363
2EESeungyong Yoon, Byoung-koo Kim, Jintae Oh, Jongsoo Jang: High Performance Session State Management Scheme for Stateful Packet Inspection. APNOMS 2007: 591-594
1EESungwon Yi, Byoung-koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das: Memory-efficient content filtering hardware for high-speed intrusion detection systems. SAC 2007: 264-269

Coauthor Index

1Yangseo Choi [3] [6] [7]
2Chita R. Das [1]
3Ki Jun Han (Kijun Han) [3] [6]
4Jongsoo Jang [1] [2] [5] [6] [7]
5Koohong Kang [3] [6]
6George Kesidis [1]
7Byoung-koo Kim [1] [2] [4]
8Daewon Kim [3] [5] [6] [7]
9Ik-Kyun Kim [3]
10Ikkyun Kim [5] [6] [7]
11Sungwon Yi [1]
12Seungyong Yoon [2] [4]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)