Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-5 of 5 (Search time: 0.003 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
An effective DDoS attack detection and packet-filtering scheme

Jeong, S; Kim, H; Kim, Sehunresearcher, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E89B, pp.2033 - 2042, 2006-07

2
Curriculum design and evaluation for e-commerce security education using AHP

Kim, H; Han, Y; Choi, M; Kim, Sehunresearcher, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E90D, pp.668 - 675, 2007-03

3
Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks

Kim, H; Kim, D; Kim, Sehunresearcher, AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, v.60, no.3, pp.248 - 250, 2006

4
Decision on replacing components of security functions in COTS-based information systems

Choi, M; Kim, H; Kim, E; Kim, Sehunresearcher, COTS-BASED SOFTWARE SYSTEMS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3412, pp.11 - 11, 2005

5
Analysis on the effects of signal strength averaging and drop timer on soft handoff performance

Kim, J; Kim, Sehunresearcher; Kim, H, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E87B, pp.3809 - 3812, 2004-12

rss_1.0 rss_2.0 atom_1.0