Showing 30711-30720 of 42,167.
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Conference
|
2008 | Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System Seung Yong Yoon International Conference on Applied Computer Science (ACS) 2008, pp.1-6 | ||
|
Conference
|
2008 | Ranging Supporting MAC with GTS based on IEEE 802.15.4a Cheol Hyo Lee International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-4 | ||
|
Conference
|
2008 | An Architecture of Unknown Attack Detection System against Zero-day Worm Ik Kyun Kim International Conference on Applied Computer Science (ACS) 2008, pp.205-211 | ||
|
Conference
|
2008 | A Study on Target Market Selection for Mobile WiMAX Deployment Jeong Tae Kim International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-5 | ||
|
Conference
|
2008 | Forensic Index Search of Large Scale Digital Evidences Su Hyung Jo International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-4 | ||
|
Conference
|
2008 | The Service-Oriented SLA Management System Development in the VPN Service Hyun-Chul Kang International Conference on Computer Applications in Industry and Engineering (CAINE)2008, pp.1-5 | ||
|
Conference
|
2008 | An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware Byoung Koo Kim International Conference on Applied Computer Science (ACS) 2008, pp.199-204 | ||
|
Conference
|
2008 | Wireless Body Area Network in a Ubiquitous Healthcare System for Physiological Signal Monitoring and Health Consulting Joon Young Jung International Conference on Future Generation Communication and Networking (FGCN) 2008, pp.1-8 | ||
|
Conference
|
2008 | Recognition of Voice and Hand Activities Through Fusion of Acceleration and Speech Young-Giu Jung International Conference on Semantic and Digital Media Technologies (SAMT) 2008, pp.67-74 | ||
|
Journal
|
2009 | Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection Byoung Koo Kim International Journal of Computers, v.3, no.1, pp.115-124 |