Follow
Koohong Kang
Koohong Kang
Seowon University
Verified email at seowon.ac.kr - Homepage
Title
Cited by
Cited by
Year
In-line mode network intrusion detect and prevent system and method thereof
KH Kang, IK Kim, BK Kim, JK Lee, KY Kim, JS Jang
US Patent 7,401,145, 2008
732008
Performance analysis of statistical multiplexing of heterogeneous discrete-time Markovian arrival processes in an ATM network
K Kang, C Kim
Computer Communications 20 (11), 970-978, 1997
291997
Bound analysis for WRR scheduling in a statistical multiplexer with bursty sources
K Kang, B Steyaert
Telecommunication Systems 12, 123-147, 1999
101999
Performance anomaly of the IEEE 802.11 DCF in different frame error rate conditions
K Kang
Journal of Information Processing Systems 8 (4), 739-748, 2012
82012
A simple relation between loss performance and buffer contents in a statistical multiplexer with periodic vacations
K Kang, B Steyaert, C Kim
IEICE transactions on communications 80 (11), 1749-1752, 1997
81997
A CAC scheme for heterogeneous traffic in ATM networks to support multiple QoS requirements
K Kang, Y Yoon, C Kim
Proceedings of GLOBECOM'95 1, 422-426, 1995
81995
A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks
T Park, K Kang, D Moon
IEICE TRANSACTIONS on Information and Systems 101 (11), 2706-2709, 2018
62018
A practical approach for detecting executable codes in network traffic
I Kim, K Kang, YS Choi, D Kim, J Oh, K Han
Managing Next Generation Networks and Services: 10th Asia-Pacific Network …, 2007
62007
A case study on converged security with event correlation of physical and information security
K Kang, J Kim
International Journal of Security and Its Applications 9 (9), 77-94, 2015
52015
Validation methods of suspicious network flows for unknown attack detection
I Kim, D Kim, Y Choi, K Kang, J Oh, J Jang
Int. J. of Computers 3 (1), 104-114, 2009
42009
Executable code recognition in network flows using instruction transition probabilities
I Kim, K Kang, Y Choi, D Kim, J Oh, J Jang, K Han
IEICE transactions on information and systems 91 (7), 2076-2078, 2008
42008
Service separation in ATM networks using a hardware efficient rate-controlled cell multiplexer
K Kang, B Steyaert, C Kim
TELETRAFFIC ENGINEERING IN A COMPETITIVE WORLD 3, 395-404, 1999
41999
Performance of a round-robin bandwidth allocation scheme
B Steyaert, K Kang, H Bruneel
Proceedings COST 257 Fifth MC Meeting., 1-25, 1998
41998
An approximation for the buffer behavior of a statistical multiplexer with contiguous-slot assignments and deterministic vacations
K ANG
Proc. Thirteenth Intern. Conference on computer communication-ICCC 97 …, 1997
31997
Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process: focus on Information Security
KH Kang, DH Kang, JC Nah, IK Kim
Journal of the Korea Institute of Information Security & Cryptology 22 (3 …, 2012
22012
Baseline traffic modeling for anomalous traffic detection on network transit points
Y Cho, K Kang, I Kim, K Jeong
Management Enabling the Future Internet for Changing Business and New …, 2009
22009
A Real-Time Network Traffic Anomaly Detection Scheme Using NetFlow Data
K Koo-Hong
The KIPS Transactions: PartC 12 (1), 19-28, 2005
22005
Practical network attack situation analysis using sliding window cache scheme
J Kim, K Kang, JC Na, I Kim, K Kim, J Jang, S Sohn
9th Asia-Pacific Conference on Communications (IEEE Cat. No. 03EX732) 3 …, 2003
22003
HTTP Get Flooding Detection Technique based on Netflow Information
Y Kim, J Kim, I Kim, K Kang
Proc. Of Internet, 26, 2016
12016
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions
K Kang
Information Networking. Towards Ubiquitous Networking and Services …, 2008
12008
The system can't perform the operation now. Try again later.
Articles 1–20