Results 1-5 of 5 (Search time: 0.005 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
A Counterattack- Detection Scheme in Transmission Time-Based Wormhole Detection Methods Kim, Dong-uk; Kim, Hyo-won; Kim, Gisung; Kim, Sehun, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013 | |
Feature Construction Scheme for Efficient Intrusion Detection System Kim, E; Lee, S; Kwon, K; Kim, Sehun, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, v.26, pp.527 - 547, 2010-03 | |
Advanced probabilistic approach for network intrusion forecasting and detection Shin, Seongjun; Lee, Seungmin; Kim, Hyunwoo; Kim, Sehun, EXPERT SYSTEMS WITH APPLICATIONS, v.40, no.1, pp.315 - 322, 2013-01 | |
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection Kim, Gisung; Lee, Seungmin; Kim, Sehun, EXPERT SYSTEMS WITH APPLICATIONS, v.41, no.4, pp.1690 - 1700, 2014-03 | |
An Efficient Filtering Method for Detecting Malicous Web Pages Choi, Jaeun; KIm, Gisung; KIm, Tae Ghyoon; Kim, Sehun, Information Security Applications, v.7690, pp.241 - 253, 2012 |
Discover