Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-6 of 6 (Search time: 0.007 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
An effective placement of detection systems for distributed attack detection in large scale networks

Jeong, SB; Choi, YW; Kim, Sehun, INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.204 - 210, 2005

2
Decision on replacing components of security functions in COTS-based information systems

Choi, M; Kim, H; Kim, E; Kim, Sehun, COTS-BASED SOFTWARE SYSTEMS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3412, pp.11 - 11, 2005

3
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks

Jeong, SB; Choi, YW; Kim, Sehun, LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.204 - 211, 2005

4
Data traffic scheduling algorithm for multiuser OFDM system with adaptive modulation considering fairness among users

Jeong, SB; Kim, Sehun; Lee, H, COMPUTERS & OPERATIONS RESEARCH, v.32, no.7, pp.1723 - 1737, 2005-07

5
Transmission rate scheduling with fairness constraints in downlink of CDMA data networks

Lim, E; Kim, Sehun, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.54, pp.328 - 337, 2005-01

6
A Curriculum Design for E-commerce Security

Kim, Hyunwoo; Han, Younggoo; Kim, Sehun; Choi, Myeonggil, JOURNAL OF INFORMATION SYSTEMS EDUCATION, v.16, no.1, pp.55 - 64, 2005

rss_1.0 rss_2.0 atom_1.0