BibTeX records: Hyun-Cheol Jeong

download as .bib file

@inproceedings{DBLP:conf/icitcs/KangKKJ12,
  author       = {Hong{-}Koo Kang and
                  Ji{-}Sang Kim and
                  Byung{-}Ik Kim and
                  Hyun{-}Cheol Jeong},
  editor       = {Kuinam J. Kim and
                  Kyung{-}Yong Chung},
  title        = {Development of an Automatic Document Malware Analysis System},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {215},
  pages        = {3--11},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-94-007-5860-5\_1},
  doi          = {10.1007/978-94-007-5860-5\_1},
  timestamp    = {Wed, 24 May 2017 08:27:16 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KangKKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimKJ12,
  author       = {Ji{-}Sang Kim and
                  Hong{-}Koo Kang and
                  Hyun{-}Cheol Jeong},
  editor       = {Kuinam J. Kim and
                  Kyung{-}Yong Chung},
  title        = {Study of Behavior-Based High Speed Visit/Inspection Technology to
                  Detect Malicious Websites},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {215},
  pages        = {13--20},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-94-007-5860-5\_2},
  doi          = {10.1007/978-94-007-5860-5\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aiss/HaLJN10,
  author       = {Do{-}Yoon Ha and
                  Chang{-}Yong Lee and
                  Hyun{-}Cheol Jeong and
                  Bong{-}Nam Noh},
  title        = {Design and Implementation of SIP-aware DDoS Attack Detection System},
  journal      = {Adv. Inf. Sci. Serv. Sci.},
  volume       = {2},
  number       = {4},
  pages        = {25--32},
  year         = {2010},
  url          = {http://www.aicit.org/aiss/ppl/03\_AISS5-130008IP.pdf},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aiss/HaLJN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/KimIJ10,
  author       = {Do{-}Hoon Kim and
                  Hoh Peter In and
                  Hyun{-}Cheol Jeong},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {Learning-based Threshold Estimation Model for Detection of Botnet
                  Malicious Activities},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {454--458},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 11:46:08 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/KimIJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/YunKHJP10,
  author       = {Sung{-}Yeol Yun and
                  Cheol{-}Joong Kim and
                  Do{-}Yoon Ha and
                  Hyun{-}Cheol Jeong and
                  Seok{-}Cheon Park},
  editor       = {Kwan{-}Ho You and
                  Sang{-}Won Lee and
                  Won Kim and
                  Dongho Won},
  title        = {A {SIP-TRW} algorithm for DDoS attack detection in {SIP} environments},
  booktitle    = {Proceedings of the 4th International Conference on Ubiquitous Information
                  Management and Communication, {ICUIMC} 2010, Suwon, Republic of Korea,
                  January 14-15, 2010},
  pages        = {75},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/2108616.2108707},
  doi          = {10.1145/2108616.2108707},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuimc/YunKHJP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/KimKKJ09,
  author       = {Hyung{-}Jong Kim and
                  Myuhng Joo Kim and
                  Yoonjeong Kim and
                  Hyun{-}Cheol Jeong},
  title        = {DEVS-Based modeling of VoIP spam callers' behavior for {SPIT} level
                  calculation},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {17},
  number       = {4},
  pages        = {569--584},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.simpat.2008.09.008},
  doi          = {10.1016/J.SIMPAT.2008.09.008},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/simpra/KimKKJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icds/NohOLNJ09,
  author       = {Sang{-}Kyun Noh and
                  Joo{-}Hyung Oh and
                  Jae{-}Seo Lee and
                  Bong{-}Nam Noh and
                  Hyun{-}Cheol Jeong},
  title        = {Detecting {P2P} Botnets Using a Multi-phased Flow Model},
  booktitle    = {Third International Conference on the Digital Society {(ICDS} 2009),
                  February 1-7, 2009, Cancun, Mexico},
  pages        = {247--253},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDS.2009.37},
  doi          = {10.1109/ICDS.2009.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icds/NohOLNJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interaction/HaKKLKJ09,
  author       = {Do{-}Yoon Ha and
                  Hwan{-}Kuk Kim and
                  KyoungHee Ko and
                  Chang{-}Yong Lee and
                  JeongWook Kim and
                  Hyun{-}Cheol Jeong},
  editor       = {Sungwon Sohn and
                  Ling Chen and
                  Soonwook Hwang and
                  Kyungeun Cho and
                  Shigeo Kawata and
                  Kyhyun Um and
                  Franz I. S. Ko and
                  Kae{-}Dal Kwack and
                  Jong Hyung Lee and
                  Gang Kou and
                  Kiyoshi Nakamura and
                  Alvis Cheuk M. Fong and
                  Patrick C. M. Ma},
  title        = {Design and implementation of SIP-aware DDoS attack detection system},
  booktitle    = {Proceedings of the 2nd International Conference on Interaction Sciences:
                  Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea,
                  24-26 November 2009},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {403},
  pages        = {1167--1171},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655925.1656137},
  doi          = {10.1145/1655925.1656137},
  timestamp    = {Sun, 28 Feb 2021 18:18:34 +0100},
  biburl       = {https://dblp.org/rec/conf/interaction/HaKKLKJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KoKKLCJ09,
  author       = {KyoungHee Ko and
                  Hwan{-}Kuk Kim and
                  JeongWook Kim and
                  Chang{-}Yong Lee and
                  Soo{-}Gil Cha and
                  Hyun{-}Cheol Jeong},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Design and Implementation of SIP-aware Security Management System},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {10--19},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_2},
  doi          = {10.1007/978-3-642-10838-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KoKKLCJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgcn/LeeKKKJ08,
  author       = {Chang{-}Yong Lee and
                  Hwan{-}Kuk Kim and
                  KyoungHee Ko and
                  JeongWook Kim and
                  Hyun{-}Cheol Jeong},
  title        = {A Study on Structure for Monitoring and Detecting VoIP Abnormal Traffic},
  booktitle    = {The Second International Conference on Future Generation Communication
                  and Networking, {FGCN} 2008, Volume 2, Workshops, Hainan Island, China,
                  December 13-15, 2008},
  pages        = {178--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FGCN.2008.95},
  doi          = {10.1109/FGCN.2008.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgcn/LeeKKKJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/ChaRRKJ08,
  author       = {Hyun{-}Soo Cha and
                  Jea{-}Tek Ryu and
                  Byeong{-}Hee Roh and
                  JeongWook Kim and
                  Hyun{-}Cheol Jeong},
  editor       = {Richard Chbeir and
                  Albert Dipanda and
                  Kokou Y{\'{e}}tongnon},
  title        = {Detection of {SIP} De-Registration and Call-Disruption Attacks Using
                  a Retransmission Mechanism and a Countermeasure Scheme},
  booktitle    = {4th {IEEE} International Conference on Signal Image Technology and
                  Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30
                  - December 3, 2008},
  pages        = {650--656},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SITIS.2008.56},
  doi          = {10.1109/SITIS.2008.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/ChaRRKJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/LeeJ06,
  author       = {Dae{-}Young Lee and
                  Hyun{-}Cheol Jeong},
  editor       = {Thomas Kunz and
                  S. S. Ravi},
  title        = {An Efficient Certificate Management for Mobile Ad-Hoc Network},
  booktitle    = {Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference,
                  {ADHOC-NOW} 2006, Ottawa, Canada, August 17-19, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4104},
  pages        = {355--364},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11814764\_29},
  doi          = {10.1007/11814764\_29},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/LeeJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/Jeong06,
  author       = {Hyun{-}Cheol Jeong},
  editor       = {Lipo Wang and
                  Licheng Jiao and
                  Guangming Shi and
                  Xue Li and
                  Jing Liu},
  title        = {Global Transaction Control with Multilevel Security Environments},
  booktitle    = {Fuzzy Systems and Knowledge Discovery, Third International Conference,
                  {FSKD} 2006, Xi'an, China, September 24-28, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4223},
  pages        = {660--663},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11881599\_79},
  doi          = {10.1007/11881599\_79},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/Jeong06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/Hyun-CheolLC03,
  author       = {Hyun{-}Cheol Jeong and
                  Malrey Lee and
                  Bumjun Cho},
  editor       = {Vasile Palade and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Secure Transaction Processing in Multi-expert Systems with Replicated
                  Data},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 7th
                  International Conference, {KES} 2003, Oxford, UK, September 3-5, 2003,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2774},
  pages        = {834--840},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45226-3\_114},
  doi          = {10.1007/978-3-540-45226-3\_114},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/Hyun-CheolLC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}