Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-5 of 5 (Search time: 0.005 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
A Counterattack- Detection Scheme in Transmission Time-Based Wormhole Detection Methods

Kim, Dong-uk; Kim, Hyo-won; Kim, Gisung; Kim, Sehun, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013

2
Feature Construction Scheme for Efficient Intrusion Detection System

Kim, E; Lee, S; Kwon, K; Kim, Sehun, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, v.26, pp.527 - 547, 2010-03

3
Advanced probabilistic approach for network intrusion forecasting and detection

Shin, Seongjun; Lee, Seungmin; Kim, Hyunwoo; Kim, Sehun, EXPERT SYSTEMS WITH APPLICATIONS, v.40, no.1, pp.315 - 322, 2013-01

4
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

Kim, Gisung; Lee, Seungmin; Kim, Sehun, EXPERT SYSTEMS WITH APPLICATIONS, v.41, no.4, pp.1690 - 1700, 2014-03

5
An Efficient Filtering Method for Detecting Malicous Web Pages

Choi, Jaeun; KIm, Gisung; KIm, Tae Ghyoon; Kim, Sehun, Information Security Applications, v.7690, pp.241 - 253, 2012

rss_1.0 rss_2.0 atom_1.0