2008 |
43 | EE | Dong Seong Kim,
Sazia Parvin,
Jong Sou Park:
Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks.
AINA Workshops 2008: 732-737 |
42 | EE | Dong Seong Kim,
Muhammad Anwarul Azim,
Jong Sou Park:
Privacy Preserving Support Vector Machines in Wireless Sensor Networks.
ARES 2008: 1260-1265 |
41 | EE | Thandar Thein,
Sung-Do Chi,
Jong Sou Park:
Improving Fault Tolerance by Virtualization and Software Rejuvenation.
Asia International Conference on Modelling and Simulation 2008: 855-860 |
40 | EE | Khin Haymar Saw Hla,
YoungSik Choi,
Jong Sou Park:
The Multi Agent System Solutions for Wireless Sensor Network Applications.
KES-AMSTA 2008: 454-463 |
39 | EE | Thandar Thein,
Sung-Do Chi,
Jong Sou Park:
Proactive Fault Management with Virtualization for Software Aging.
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 189-200 |
38 | EE | Dong Seong Kim,
Jong Sou Park:
Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization.
IEICE Transactions 91-D(4): 1050-1057 (2008) |
2007 |
37 | EE | Dong Seong Kim,
Taek-Hyun Shin,
Jong Sou Park:
A Security Framework in RFID Multi-domain System.
ARES 2007: 1227-1234 |
36 | EE | Dong Seong Kim,
Chung Su Yang,
Jong Sou Park:
Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack.
ARES 2007: 575-579 |
35 | EE | Sazia Parvin,
Jong Sou Park:
An Efficient Music Retrieval Using Noise Cancellation.
FGCN (1) 2007: 541-546 |
34 | EE | Su Thawda Win,
Thandar Thein,
Jong Sou Park:
To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment.
ISPA Workshops 2007: 1-10 |
33 | EE | Shu Qin Ren,
Dong Seong Kim,
Jong Sou Park:
A Secure Data Aggregation Scheme for Wireless Sensor Networks.
ISPA Workshops 2007: 32-40 |
32 | EE | Dong Seong Kim,
Mohammed Golam Sadi,
Jong Sou Park:
A Key Revocation Scheme for Mobile Sensor Networks.
ISPA Workshops 2007: 41-49 |
2006 |
31 | EE | Dong Seong Kim,
Khaja Mohammad Shazzad,
Jong Sou Park:
A Framework of Survivability Model for Wireless Sensor Network.
ARES 2006: 515-522 |
30 | EE | Khin Mi Mi Aung,
Kiejin Park,
Jong Sou Park:
Survival of the Internet Applications: A Cluster Recovery Model.
CCGRID 2006: 33 |
29 | EE | Misun Moon,
Dong Seong Kim,
Jong Sou Park:
Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec.
CIS 2006: 743-749 |
28 | EE | Dong Seong Kim,
Taek-Hyun Shin,
Byungil Lee,
Jong Sou Park:
Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML.
CIS 2006: 887-893 |
27 | EE | Dong Seong Kim,
Sang Min Lee,
Jong Sou Park:
Building Lightweight Intrusion Detection System Based on Random Forest.
ISNN (2) 2006: 224-230 |
26 | EE | Dong Seong Kim,
Jong Sou Park:
A Survivable Distributed Sensor Networks Through Stochastic Models.
ISPA Workshops 2006: 185-194 |
25 | EE | Dong Seong Kim,
Sang Min Lee,
Jong Sou Park:
Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification.
ISPA Workshops 2006: 981-989 |
24 | EE | Jong Sou Park,
Sung-Hwan Kim,
Dong Seong Kim:
A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security.
KES (1) 2006: 935-942 |
23 | EE | Dong Seong Kim,
Sang Min Lee,
Jong Sou Park:
Toward Lightweight Detection and Visualization for Denial of Service Attacks.
MICAI 2006: 632-640 |
2005 |
22 | EE | Dong Seong Kim,
Ha-Nam Nguyen,
Jong Sou Park:
Genetic Algorithm to Improve SVM Based Network Intrusion Detection System.
AINA 2005: 155-158 |
21 | EE | Jang-Se Lee,
Dong Seong Kim,
Jong Sou Park,
Sung-Do Chi:
Design of Intelligent Security Management System Using Simulation-Based Analysis.
Australian Conference on Artificial Intelligence 2005: 766-775 |
20 | EE | Khin Mi Mi Aung,
Kiejin Park,
Jong Sou Park:
A rejuvenation methodology of cluster recovery.
CCGRID 2005: 90-95 |
19 | EE | Jong Sou Park,
Khaja Mohammad Shazzad,
Dong Seong Kim:
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection.
CISC 2005: 279-289 |
18 | EE | Khin Mi Mi Aung,
Kiejin Park,
Jong Sou Park,
Howon Kim,
Byungil Lee:
A Survivability Model for Cluster System Under DoS Attacks.
HPCC 2005: 567-572 |
17 | EE | Khin Mi Mi Aung,
Kiejin Park,
Jong Sou Park:
A Survivability Model for Cluster System.
ICA3PP 2005: 73-82 |
16 | EE | Khin Mi Mi Aung,
Kiejin Park,
Jong Sou Park:
A Model of ITS Using Cold Standby Cluster.
ICADL 2005: 1-10 |
15 | EE | Mohammed Golam Sadi,
Dong Seong Kim,
Jong Sou Park:
GBR: Grid Based Random Key Predistribution for Wireless Sensor Network.
ICPADS (2) 2005: 310-315 |
14 | EE | Dong Seong Kim,
Ha-Nam Nguyen,
Syng-Yup Ohn,
Jong Sou Park:
Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System.
ISNN (3) 2005: 415-420 |
13 | EE | Jong Sou Park,
Mohammed Golam Sadi,
Dong Seong Kim,
Young Deog Song:
A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.
MADNES 2005: 2-13 |
12 | EE | Khaja Mohammad Shazzad,
Jong Sou Park:
Optimization of Intrusion Detection through Fast Hybrid Feature Selection.
PDCAT 2005: 264-267 |
2004 |
11 | EE | Khin Mi Mi Aung,
Jong Sou Park:
A Framework of Software Rejuvenation for Survivability.
AINA (2) 2004: 507-510 |
10 | EE | Jang-Se Lee,
Jung-Rae Jung,
Jong Sou Park,
Sung-Do Chi:
Linux-Based System Modelling for Cyber-attack Simulation.
AIS 2004: 585-596 |
9 | EE | Jong Sou Park,
Khin Mi Mi Aung:
Transient Time Analysis of Network Security Survivability Using DEVS.
AIS 2004: 607-616 |
8 | EE | Syng-Yup Ohn,
Ha-Nam Nguyen,
Dong Seong Kim,
Jong Sou Park:
Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm.
CIS 2004: 895-902 |
7 | EE | Khin Mi Mi Aung,
Jong Sou Park:
Software Rejuvenation Approach to Security Engineering.
ICCSA (4) 2004: 574-583 |
6 | EE | Jong Sou Park,
Hong Tae Jin,
Dong Seong Kim:
Intrusion Detection System for Securing Geographical Information System Web Servers.
W2GIS 2004: 110-119 |
2003 |
5 | EE | Dong Seong Kim,
Jong Sou Park:
Network-Based Intrusion Detection with Support Vector Machines.
ICOIN 2003: 747-756 |
4 | EE | Sung-Do Chi,
Jong Sou Park,
Jang-Se Lee:
A Role of DEVS Simulation for Information Assurance.
WISA 2003: 27-41 |
2001 |
3 | EE | Sung-Do Chi,
Jong Sou Park,
Ki-Chan Jung,
Jang-Se Lee:
Network Security Modeling and Cyber Attack Simulation Methodology.
ACISP 2001: 320-333 |
2 | EE | Jong Ha Hwang,
Jae Ho Ro,
Keung Hae Lee,
Jong Sou Park,
Soochan Hwang:
An XML-Based 3-Dimensional Graphic Database System.
Human.Society@Internet 2001: 454-467 |
1 | EE | Jong Sou Park,
Jang-Se Lee,
Hwan Kuk Kim,
Jeong-Rye Jeong,
Dong-Bok Yeom,
Sung-Do Chi:
SECUSIM: A Tool for the Cyber-Attack Simulation.
ICICS 2001: 471-475 |