Journal
|
2024 |
A Novel Approach for Application Classification with Encrypted Traffic using BERT and Packet Headers
Yu Jae Hak Computer Networks, v.254, pp.1-12 |
1 |
원문
|
Journal
|
2021 |
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
Song-Yi Hwang Sensors, v.21, no.21, pp.1-23 |
8 |
원문
|
Conference
|
2017 |
Self-certifying ID based Trustworthy Networking System for IoT Smart Service Domain
Kim Eung Ha International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1300-1302 |
7 |
원문
|
Conference
|
2017 |
Multi-robot Control Architecture for Hospital Delivery Service in Unstable Network Environment
Jeon Seohyun International Conference on Informatics in Control, Automation and Robotics (ICINCO) 2017, pp.270-277 |
4 |
원문
|
Conference
|
2016 |
The method of providing Dynamic IP management function in a Gateway for IoE
Kim Eun Joo International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.937-939 |
1 |
원문
|
Journal
|
2016 |
Qualitative Analysis of Mapping Systems in the Internet Architectures Based on Identifier/Locator Separation
Jungha Hong International Journal of Parallel, Emergent and Distributed Systems, v.31, no.1, pp.85-99 |
2 |
원문
|
Conference
|
2015 |
Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology
Lee Sokjoon International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337 |
|
|
Conference
|
2015 |
A Service Protection mechanism Using VPN GW Hiding Techniques
Park Pyung-Koo International Conference on Information Science and Applications (ICISA) 2015 (LNEE 339), pp.1053-1062 |
2 |
원문
|
Conference
|
2013 |
Threshold of ID to LOC Lookup Time in Mobile Environment
Jungha Hong International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.1-2 |
|
|
Conference
|
2012 |
A Normalized Average Cost Model for ID/LOC Separation Networks
Jungha Hong International Conference on Communications (ICC) 2012, pp.2811-2815 |
1 |
원문
|
Conference
|
2011 |
Timeslot Monitoring Model for Application Layer DDoS Attack Detection
Choi Yangseo International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679 |
|
|
Conference
|
2010 |
Unified Fast Authentication Procedure in Service and Access Networks for NGN
Kim Kwihoon International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2010, pp.570-573 |
0 |
원문
|
Conference
|
2010 |
A Framework for Interoperability of Heterogeneous Devices in Ubiquitous Home
Park Ho Jin International Conference on Advances in Future Internet (AFIN) 2010, pp.50-55 |
7 |
원문
|
Journal
|
2010 |
위치자 식별자 분리를 위한 표준기술 동향
배영인 주간기술동향, v.1437, pp.1-14 |
|
|
Conference
|
2009 |
Optimized IMS Registration Procedure in Heterogeneous Networks
Lee Ho Yeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.1266-1267 |
|
|
Conference
|
2008 |
The Traceback Method about DoS Attack in Open Grid Computing Environment
Lee Seoung Hyeon International Conference on Future Generation Communication and Networking (FGCN) 2008, pp.391-394 |
1 |
원문
|
Conference
|
2008 |
Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN
An Gaeil International Conference on Autonomic and Trusted Computing (ATC) 2008 (LNCS 5060), v.5060, pp.36-46 |
4 |
원문
|
Conference
|
2008 |
Management Agent for OSGi-based Healthcare Application Using Portable Information Terminal
Kang Kyu Chang International Conference on Advanced Communication Technology (ICACT) 2008, pp.1652-1657 |
3 |
원문
|
Conference
|
2007 |
A Study of Defense DDoS Attacks using IP Traceback
채철주 International Conference on Intelligent Pervasive Computing (IPC) 2007, pp.402-405 |
8 |
원문
|
Conference
|
2007 |
DAP: Dynamic Address Assignment Protocol in Mobile Ad-hoc Networks
Kim Hae Yong International Symposium on Consumer Electronics (ISCE) 2007, pp.1-6 |
12 |
원문
|
Conference
|
2006 |
Evaluation of Internet Worms Propagation in IPv6 Network
Kim Hwan Kuk International Conference on Hybrid Information Technology (ICHIT) 2006 (LNCS 4413), v.4413, pp.1-9 |
|
|
Conference
|
2006 |
Effective Control of Abnormal Neighbor Discovery Congestion on IPv6 Local Area Network
An Gaeil International Conference on Ubiquitous Intelligence and Computing (UIC) 2006 (LNCS 4159), v.4159, pp.966-976 |
1 |
원문
|
Conference
|
2006 |
Secure Discovery Method of Devices for a Home Network Middleware
Do-Woo Kim International Conference on Advanced Communication Technology (ICACT) 2006, pp.1733-1735 |
0 |
|
Conference
|
2004 |
Implementing NAT-PT/SIIT, ALGs and Consideration to the Mobility Support in NAT-PT environment
Lee Joo Chul International Conference on Advanced Communication Technology (ICACT) 2004, pp.433-439 |
|
원문
|
Conference
|
2003 |
Mobile IPv6 security while traversing a NAT
Kim Geonwoo International Conference on Networks (ICON) 2003, pp.331-335 |
0 |
원문
|