발행물

전체 논문

32

1

An efficient privacy protection in mobility social network services with novel clustering-based anonymization
Chen, ZG (Chen, Zhi-Guo), Kang, HS (Kang, Ho-Seok), Yin, SN (Yin, Shang-Nan), Kim, SR (Kim, Sung-Ryul)
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 201611

2

Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
Yin, SN (Yin, Shang-Nan), Kang, HS (Kang, Ho-Seok), Kim, SR (Kim, Sung-Ryul)
JOURNAL OF INTERNET TECHNOLOGY, 201603

3

Design of a New Efficient Hybrid System for Intrusion Detection Based on HSM Fuzzy Decision Tree
Chen, ZG (Chen, Zhi-Guo), Kang, HS (Kang, Ho-Seok), Kim, SR (Kim, Sung-Ryul)
JOURNAL OF INTERNET TECHNOLOGY, 201509

4

A system for finding the compact set of intrusion detection rules on the MapReduce environment
Lee I., Do P., Do L., Kim S.-R.
Information (Japan), 201509

5

High-speed parallel implementations of the rainbow method based on perfect tables in a heterogeneous system
Kim, Jung Woo, Seo, Jungjoo, Hong, Jin, Park, Kunsoo, Kim, Sung-Ryul
SOFTWARE-PRACTICE & EXPERIENCE, 2015

6

Design and experiments of new IP traceback method based on offline analysis
Kang, HS (Kang, Ho-Seok), Tin, T (Tin, Tran), Kim, SR (Kim, Sung-Ryul)
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 201411

7

sShield: small DDoS defense system using RIP-based traffic deflection in autonomous system
Kang, HS, Kim, SR
JOURNAL OF SUPERCOMPUTING, 201403

8

Fingerprint-Based Near-Duplicate Document Detection with Applications to SNS Spam Detection
Ho, PT, Kim, SR
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014

9

Graph-based KNN Algorithm for Spam SMS Detection
Ho, TP, Kang, HS, Kim, SR
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013

10

An Efficient DRM Standard Protocol Implementation for Media Cards
Xu, C, Mun, JS, Kim, SR
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 201211