In-line mode network intrusion detect and prevent system and method thereof KH Kang, IK Kim, BK Kim, JK Lee, KY Kim, JS Jang US Patent 7,401,145, 2008 | 76 | 2008 |
Performance analysis of statistical multiplexing of heterogeneous discrete-time Markovian arrival processes in an ATM network K Kang, C Kim Computer Communications 20 (11), 970-978, 1997 | 29 | 1997 |
Bound analysis for WRR scheduling in a statistical multiplexer with bursty sources K Kang, B Steyaert Telecommunication Systems 12, 123-147, 1999 | 10 | 1999 |
Performance anomaly of the IEEE 802.11 DCF in different frame error rate conditions K Kang Journal of Information Processing Systems 8 (4), 739-748, 2012 | 8 | 2012 |
A simple relation between loss performance and buffer contents in a statistical multiplexer with periodic vacations K Kang, B Steyaert, C Kim IEICE transactions on communications 80 (11), 1749-1752, 1997 | 8 | 1997 |
A CAC scheme for heterogeneous traffic in ATM networks to support multiple QoS requirements K Kang, Y Yoon, C Kim Proceedings of GLOBECOM'95 1, 422-426, 1995 | 8 | 1995 |
A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks T Park, K Kang, D Moon IEICE TRANSACTIONS on Information and Systems 101 (11), 2706-2709, 2018 | 6 | 2018 |
A practical approach for detecting executable codes in network traffic I Kim, K Kang, YS Choi, D Kim, J Oh, K Han Managing Next Generation Networks and Services: 10th Asia-Pacific Network …, 2007 | 6 | 2007 |
A case study on converged security with event correlation of physical and information security K Kang, J Kim International Journal of Security and Its Applications 9 (9), 77-94, 2015 | 5 | 2015 |
Validation methods of suspicious network flows for unknown attack detection I Kim, D Kim, Y Choi, K Kang, J Oh, J Jang Int J Comput 3 (1), 104-114, 2009 | 4 | 2009 |
Executable code recognition in network flows using instruction transition probabilities I Kim, K Kang, Y Choi, D Kim, J Oh, J Jang, K Han IEICE transactions on information and systems 91 (7), 2076-2078, 2008 | 4 | 2008 |
Performance of a round-robin bandwidth allocation scheme B Steyaert, K Kang, H Bruneel Proceedings COST 257 Fifth MC Meeting., 1-25, 1998 | 4 | 1998 |
Service separation in ATM networks using a hardware efficient rate-controlled cell multiplexer K Kang, B Steyaert, C Kim TELETRAFFIC ENGINEERING IN A COMPETITIVE WORLD 3, 395-404, 1999 | 3 | 1999 |
An approximation for the buffer behavior of a statistical multiplexer with contiguous-slot assignments and deterministic vacations K ANG Proc. Thirteenth Intern. Conference on computer communication-ICCC 97 …, 1997 | 3 | 1997 |
Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process: focus on Information Security KH Kang, DH Kang, JC Nah, IK Kim Journal of the Korea Institute of Information Security & Cryptology 22 (3 …, 2012 | 2 | 2012 |
Baseline traffic modeling for anomalous traffic detection on network transit points Y Cho, K Kang, I Kim, K Jeong Management Enabling the Future Internet for Changing Business and New …, 2009 | 2 | 2009 |
A Real-Time Network Traffic Anomaly Detection Scheme Using NetFlow Data K Koo-Hong The KIPS Transactions: PartC 12 (1), 19-28, 2005 | 2 | 2005 |
Practical network attack situation analysis using sliding window cache scheme J Kim, K Kang, JC Na, I Kim, K Kim, J Jang, S Sohn 9th Asia-Pacific Conference on Communications (IEEE Cat. No. 03EX732) 3 …, 2003 | 2 | 2003 |
HTTP Get Flooding Detection Technique based on Netflow Information Y Kim, J Kim, I Kim, K Kang Proc. Of Internet, 26, 2016 | 1 | 2016 |
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions K Kang Information Networking. Towards Ubiquitous Networking and Services …, 2008 | 1 | 2008 |