2008 |
7 | EE | Jae-Hyun Seo,
Yong-Hyuk Kim,
Hwang-Bin Ryou,
Seok-Joong Kang:
A genetic algorithm for sensor deployment based on two-dimensional operators.
SAC 2008: 1812-1813 |
2007 |
6 | EE | Jeong-Wook Kim,
Hyug-Hyun Cho,
Gil-Jong Mun,
Jae-Hyun Seo,
Bong-Nam Noh,
Yong-Min Kim:
Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network.
FGCN (2) 2007: 559-564 |
2006 |
5 | EE | Misun Kim,
Minsoo Kim,
Jae-Hyun Seo:
Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector.
ICCSA (3) 2006: 154-162 |
4 | EE | Jung-Sun Kim,
Seungyong Lee,
Minsoo Kim,
Jae-Hyun Seo,
BongNam Noh:
A Security Architecture for Adapting Multiple Access Control Models to Operating Systems.
ICCSA (5) 2006: 922-931 |
2005 |
3 | EE | Minsoo Kim,
Jae-Hyun Seo,
Il-Ahn Cheong,
BongNam Noh:
Auto-generation of Detection Rules with Tree Induction Algorithm.
FSKD (2) 2005: 160-169 |
2 | EE | Minsoo Kim,
Jae-Hyun Seo,
Seungyong Lee,
BongNam Noh,
Jung-Taek Seo,
Eung Ki Park,
Choonsik Park:
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
ICCSA (2) 2005: 225-234 |
1 | EE | Hyang-Chang Choi,
YongHoon Yi,
Jae-Hyun Seo,
BongNam Noh,
HyungHyo Lee:
A Privacy Protection Model in ID Management Using Access Control.
ICCSA (2) 2005: 82-91 |