|
Journal
|
2025 |
A multilevel network-assisted congestion feedback mechanism for network congestion control
Ali Inayat Computers and Electrical Engineering, v.123, no.Part A, pp.1-16 |
0 |
원문
|
|
Conference
|
2024 |
Modeling of Optimized Link State Routing for Inter-Satellite Link Protocol of Satellite Constellation
Jung Seunghwa International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1816-1817 |
0 |
원문
|
|
Conference
|
2024 |
Rethinking Explicit Congestion Notification: A Multilevel Congestion Feedback Perspective
Ali Inayat ACM Network and Operating System Support for Digital Audio and Video (NOSSDAV) 2024, pp.64-70 |
2 |
원문
|
|
Conference
|
2022 |
AI-based Network Security Enhancement for 5G Industrial Internet of Things Environments
Jong-Hoon Lee International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.971-975 |
11 |
원문
|
|
Conference
|
2021 |
Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset
Lee Gyeoul International Conference on Advanced Communications Technology (ICACT) 2021, pp.254-258 |
5 |
원문
|
|
Conference
|
2020 |
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks
이승수 Conference on Computer Communications (INFOCOM) 2020, pp.1788-1797 |
12 |
원문
|
|
Conference
|
2020 |
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks
Seungwon Woo Conference on Computer Communications (INFOCOM) 2020, pp.1788-1797 |
12 |
원문
|
|
Journal
|
2018 |
A Two-Stage Failover Mechanism for High Availability in Service Function Chaining
백호성 Journal of Internet Technology, v.19, no.1, pp.229-236 |
2 |
원문
|
|
Conference
|
2015 |
An Abnormal Connection Detection System based on Network Flow Analysis
Jong-Hoon Lee International Conference on Consumer Electronics (ICCE) 2015 : Berlin, pp.71-75 |
1 |
원문
|
|
Journal
|
2009 |
Validation Methods of Suspicious Network Flows for Unknown Attack Detection
Kim Ik Kyun International Journal of Computers, v.1, no.3, pp.104-114 |
|
|
|
Journal
|
2008 |
An Efficient Flow Analysis Scheme for Identifying Various Applications in IP-based Networks
Moon Yong Hyuk International Journal of Computer Science and Network Security, v.8, no.12, pp.168-175 |
|
|
|
Journal
|
2008 |
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities
Kim Ik Kyun IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 |
2 |
원문
|
|
Conference
|
2006 |
Considerations for VoIP Services in IEEE 802.16 Broadband Wireless Access Systems
Hong Seung Eun Vehicular Technology Conference (VTC) 2006 (Spring), pp.1226-1230 |
5 |
|
|
Conference
|
2004 |
Security Flow Control by Dynamic Stack Allocation
Kim Geonwoo International Conference on Advanced Communication Technology (ICACT) 2004, pp.309-311 |
|
원문
|