BibTeX records: Heejin Jang

download as .bib file

@article{DBLP:journals/jips/KimYJJ15,
  author    = {Jinsuk Kim and
               Dong{-}Hoon Yoo and
               Heejin Jang and
               Kimoon Jeong},
  title     = {WebSHArk 1.0: {A} Benchmark Collection for Malicious Web Shell Detection},
  journal   = {J. Inf. Process. Syst.},
  volume    = {11},
  number    = {2},
  pages     = {229--238},
  year      = {2015},
  url       = {https://doi.org/10.3745/JIPS.03.0026},
  doi       = {10.3745/JIPS.03.0026},
  timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jips/KimYJJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6610,
  author    = {Heejin Jang and
               Alper E. Yegin and
               Kuntal Chowdhury and
               JinHyeock Choi and
               Ted Lemon},
  title     = {{DHCP} Options for Home Information Discovery in Mobile IPv6 (MIPv6)},
  journal   = {{RFC}},
  volume    = {6610},
  pages     = {1--16},
  year      = {2012},
  url       = {https://doi.org/10.17487/RFC6610},
  doi       = {10.17487/RFC6610},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/rfc/rfc6610.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5270,
  author    = {Heejin Jang and
               Junghoon Jee and
               Youn{-}Hee Han and
               Soohong Daniel Park and
               Jaesun Cha},
  title     = {Mobile IPv6 Fast Handovers over {IEEE} 802.16e Networks},
  journal   = {{RFC}},
  volume    = {5270},
  pages     = {1--18},
  year      = {2008},
  url       = {https://doi.org/10.17487/RFC5270},
  doi       = {10.17487/RFC5270},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/rfc/rfc5270.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HanJCPM07,
  author    = {Youn{-}Hee Han and
               Heejin Jang and
               JinHyeock Choi and
               Byungjoo Park and
               Janise McNair},
  title     = {A Cross-Layering Design for IPv6 Fast Handover Support in an {IEEE}
               802.16e Wireless {MAN}},
  journal   = {{IEEE} Netw.},
  volume    = {21},
  number    = {6},
  pages     = {54--62},
  year      = {2007},
  url       = {https://doi.org/10.1109/MNET.2007.4395111},
  doi       = {10.1109/MNET.2007.4395111},
  timestamp = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/network/HanJCPM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ChoiMHJ06,
  author    = {Hyon{-}Young Choi and
               Sung{-}Gi Min and
               Youn{-}Hee Han and
               Heejin Jang},
  editor    = {Edwin Hsing{-}Mean Sha and
               Sung{-}Kook Han and
               Cheng{-}Zhong Xu and
               Moon{-}hae Kim and
               Laurence Tianruo Yang and
               Bin Xiao},
  title     = {Semi-soft FMIPv6 for 802.11 Network},
  booktitle = {Embedded and Ubiquitous Computing, International Conference, {EUC}
               2006, Seoul, Korea, August 1-4, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4096},
  pages     = {1139--1147},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11802167\_114},
  doi       = {10.1007/11802167\_114},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/euc/ChoiMHJ06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/HanHJ04,
  author    = {Youn{-}Hee Han and
               Seung{-}Hee Hwang and
               Heejin Jang},
  title     = {Design and evaluation of an address configuration and confirmation
               scheme for IPv6 mobility support},
  booktitle = {2004 {IEEE} Wireless Communications and Networking Conference , {WCNC}
               2004, Atlanta, Georgia, USA, 21-25 March 2004},
  pages     = {1270--1275},
  publisher = {{IEEE}},
  year      = {2004},
  url       = {https://doi.org/10.1109/WCNC.2004.1311371},
  doi       = {10.1109/WCNC.2004.1311371},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnc/HanHJ04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JangK02,
  author    = {Heejin Jang and
               Sangwook Kim},
  title     = {Intruder tracing through dynamic extension of a security domain},
  journal   = {J. Netw. Comput. Appl.},
  volume    = {25},
  number    = {2},
  pages     = {69--91},
  year      = {2002},
  url       = {https://doi.org/10.1006/jnca.2002.0133},
  doi       = {10.1006/jnca.2002.0133},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnca/JangK02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/JangK02,
  author    = {Heejin Jang and
               Sangwook Kim},
  title     = {An intruder tracing system based on a shadowing mechanism},
  booktitle = {Proceedings of the Seventh {IEEE} Symposium on Computers and Communications
               {(ISCC} 2002), 1-4 July 2002, Taormina, Italy},
  pages     = {904--909},
  publisher = {{IEEE} Computer Society},
  year      = {2002},
  url       = {https://doi.org/10.1109/ISCC.2002.1021780},
  doi       = {10.1109/ISCC.2002.1021780},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/iscc/JangK02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JangK02,
  author    = {Heejin Jang and
               Sangwook Kim},
  editor    = {Agnes Hui Chan and
               Virgil D. Gligor},
  title     = {Real-Time Intruder Tracing through Self-Replication},
  booktitle = {Information Security, 5th International Conference, {ISC} 2002 Sao
               Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2433},
  pages     = {1--16},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45811-5\_1},
  doi       = {10.1007/3-540-45811-5\_1},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/isw/JangK02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JangK00,
  author    = {Heejin Jang and
               Sangwook Kim},
  title     = {A Self-Extension Monitoring for Security Management},
  booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
               11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages     = {196},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {https://doi.org/10.1109/ACSAC.2000.898873},
  doi       = {10.1109/ACSAC.2000.898873},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/conf/acsac/JangK00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics