Results 1-6 of 6 (Search time: 0.004 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
An effective placement of detection systems for distributed attack detection in large scale networks Jeong, SB; Choi, YW; Kim, Sehun, INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.204 - 210, 2005 | |
Decision on replacing components of security functions in COTS-based information systems Choi, M; Kim, H; Kim, E; Kim, Sehun, COTS-BASED SOFTWARE SYSTEMS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3412, pp.11 - 11, 2005 | |
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Jeong, SB; Choi, YW; Kim, Sehun, LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.204 - 211, 2005 | |
Data traffic scheduling algorithm for multiuser OFDM system with adaptive modulation considering fairness among users Jeong, SB; Kim, Sehun; Lee, H, COMPUTERS & OPERATIONS RESEARCH, v.32, no.7, pp.1723 - 1737, 2005-07 | |
Transmission rate scheduling with fairness constraints in downlink of CDMA data networks Lim, E; Kim, Sehun, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.54, pp.328 - 337, 2005-01 | |
A Curriculum Design for E-commerce Security Kim, Hyunwoo; Han, Younggoo; Kim, Sehun; Choi, Myeonggil, JOURNAL OF INFORMATION SYSTEMS EDUCATION, v.16, no.1, pp.55 - 64, 2005 |
Discover