default search action
BibTeX records: Hyun-Cheol Jeong
@inproceedings{DBLP:conf/icitcs/KangKKJ12, author = {Hong{-}Koo Kang and Ji{-}Sang Kim and Byung{-}Ik Kim and Hyun{-}Cheol Jeong}, editor = {Kuinam J. Kim and Kyung{-}Yong Chung}, title = {Development of an Automatic Document Malware Analysis System}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012}, series = {Lecture Notes in Electrical Engineering}, volume = {215}, pages = {3--11}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-94-007-5860-5\_1}, doi = {10.1007/978-94-007-5860-5\_1}, timestamp = {Wed, 24 May 2017 08:27:16 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KangKKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimKJ12, author = {Ji{-}Sang Kim and Hong{-}Koo Kang and Hyun{-}Cheol Jeong}, editor = {Kuinam J. Kim and Kyung{-}Yong Chung}, title = {Study of Behavior-Based High Speed Visit/Inspection Technology to Detect Malicious Websites}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012}, series = {Lecture Notes in Electrical Engineering}, volume = {215}, pages = {13--20}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-94-007-5860-5\_2}, doi = {10.1007/978-94-007-5860-5\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KimKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aiss/HaLJN10, author = {Do{-}Yoon Ha and Chang{-}Yong Lee and Hyun{-}Cheol Jeong and Bong{-}Nam Noh}, title = {Design and Implementation of SIP-aware DDoS Attack Detection System}, journal = {Adv. Inf. Sci. Serv. Sci.}, volume = {2}, number = {4}, pages = {25--32}, year = {2010}, url = {http://www.aicit.org/aiss/ppl/03\_AISS5-130008IP.pdf}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aiss/HaLJN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/KimIJ10, author = {Do{-}Hoon Kim and Hoh Peter In and Hyun{-}Cheol Jeong}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {Learning-based Threshold Estimation Model for Detection of Botnet Malicious Activities}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {454--458}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 11:46:08 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/KimIJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/YunKHJP10, author = {Sung{-}Yeol Yun and Cheol{-}Joong Kim and Do{-}Yoon Ha and Hyun{-}Cheol Jeong and Seok{-}Cheon Park}, editor = {Kwan{-}Ho You and Sang{-}Won Lee and Won Kim and Dongho Won}, title = {A {SIP-TRW} algorithm for DDoS attack detection in {SIP} environments}, booktitle = {Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} 2010, Suwon, Republic of Korea, January 14-15, 2010}, pages = {75}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/2108616.2108707}, doi = {10.1145/2108616.2108707}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuimc/YunKHJP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/KimKKJ09, author = {Hyung{-}Jong Kim and Myuhng Joo Kim and Yoonjeong Kim and Hyun{-}Cheol Jeong}, title = {DEVS-Based modeling of VoIP spam callers' behavior for {SPIT} level calculation}, journal = {Simul. Model. Pract. Theory}, volume = {17}, number = {4}, pages = {569--584}, year = {2009}, url = {https://doi.org/10.1016/j.simpat.2008.09.008}, doi = {10.1016/J.SIMPAT.2008.09.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/simpra/KimKKJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icds/NohOLNJ09, author = {Sang{-}Kyun Noh and Joo{-}Hyung Oh and Jae{-}Seo Lee and Bong{-}Nam Noh and Hyun{-}Cheol Jeong}, title = {Detecting {P2P} Botnets Using a Multi-phased Flow Model}, booktitle = {Third International Conference on the Digital Society {(ICDS} 2009), February 1-7, 2009, Cancun, Mexico}, pages = {247--253}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDS.2009.37}, doi = {10.1109/ICDS.2009.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icds/NohOLNJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/HaKKLKJ09, author = {Do{-}Yoon Ha and Hwan{-}Kuk Kim and KyoungHee Ko and Chang{-}Yong Lee and JeongWook Kim and Hyun{-}Cheol Jeong}, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {Design and implementation of SIP-aware DDoS attack detection system}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {1167--1171}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655925.1656137}, doi = {10.1145/1655925.1656137}, timestamp = {Sun, 28 Feb 2021 18:18:34 +0100}, biburl = {https://dblp.org/rec/conf/interaction/HaKKLKJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KoKKLCJ09, author = {KyoungHee Ko and Hwan{-}Kuk Kim and JeongWook Kim and Chang{-}Yong Lee and Soo{-}Gil Cha and Hyun{-}Cheol Jeong}, editor = {Heung Youl Youm and Moti Yung}, title = {Design and Implementation of SIP-aware Security Management System}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {10--19}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_2}, doi = {10.1007/978-3-642-10838-9\_2}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KoKKLCJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/LeeKKKJ08, author = {Chang{-}Yong Lee and Hwan{-}Kuk Kim and KyoungHee Ko and JeongWook Kim and Hyun{-}Cheol Jeong}, title = {A Study on Structure for Monitoring and Detecting VoIP Abnormal Traffic}, booktitle = {The Second International Conference on Future Generation Communication and Networking, {FGCN} 2008, Volume 2, Workshops, Hainan Island, China, December 13-15, 2008}, pages = {178--182}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FGCN.2008.95}, doi = {10.1109/FGCN.2008.95}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/LeeKKKJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/ChaRRKJ08, author = {Hyun{-}Soo Cha and Jea{-}Tek Ryu and Byeong{-}Hee Roh and JeongWook Kim and Hyun{-}Cheol Jeong}, editor = {Richard Chbeir and Albert Dipanda and Kokou Y{\'{e}}tongnon}, title = {Detection of {SIP} De-Registration and Call-Disruption Attacks Using a Retransmission Mechanism and a Countermeasure Scheme}, booktitle = {4th {IEEE} International Conference on Signal Image Technology and Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30 - December 3, 2008}, pages = {650--656}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SITIS.2008.56}, doi = {10.1109/SITIS.2008.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/ChaRRKJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/LeeJ06, author = {Dae{-}Young Lee and Hyun{-}Cheol Jeong}, editor = {Thomas Kunz and S. S. Ravi}, title = {An Efficient Certificate Management for Mobile Ad-Hoc Network}, booktitle = {Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, {ADHOC-NOW} 2006, Ottawa, Canada, August 17-19, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4104}, pages = {355--364}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11814764\_29}, doi = {10.1007/11814764\_29}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/LeeJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/Jeong06, author = {Hyun{-}Cheol Jeong}, editor = {Lipo Wang and Licheng Jiao and Guangming Shi and Xue Li and Jing Liu}, title = {Global Transaction Control with Multilevel Security Environments}, booktitle = {Fuzzy Systems and Knowledge Discovery, Third International Conference, {FSKD} 2006, Xi'an, China, September 24-28, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4223}, pages = {660--663}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11881599\_79}, doi = {10.1007/11881599\_79}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fskd/Jeong06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/Hyun-CheolLC03, author = {Hyun{-}Cheol Jeong and Malrey Lee and Bumjun Cho}, editor = {Vasile Palade and Robert J. Howlett and Lakhmi C. Jain}, title = {Secure Transaction Processing in Multi-expert Systems with Replicated Data}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 7th International Conference, {KES} 2003, Oxford, UK, September 3-5, 2003, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {2774}, pages = {834--840}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45226-3\_114}, doi = {10.1007/978-3-540-45226-3\_114}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/Hyun-CheolLC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.