Journal
|
2023 |
Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection
Choi Yangseo 전자통신동향분석, v.38, no.5, pp.71-80 |
|
원문
|
Conference
|
2021 |
Network Anomaly Detection based on GAN with Scaling Properties
Kimhyunjin International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-5 |
5 |
원문
|
Conference
|
2018 |
Who is knocking on the Telnet Port
Heo Hwanjo Asia Conference on Computer and Communications Security (ASIA CCS) 2018, pp.625-636 |
17 |
원문
|
Journal
|
2010 |
An Efficient Network Attack Visualization Using Security Quad and Cube
Beom Hwan Chang ETRI Journal, v.33, no.5, pp.770-779 |
7 |
원문
|
Conference
|
2010 |
A Hierachical Approach to Traffic Anomaly Detection using Image Processing Technique
Jeong Chi Yoon International Conference on Networked Computing and Advanced Information Management (NCM) 2010, pp.592-594 |
|
|
Conference
|
2009 |
Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme
Yoon Seung Yong International Conference on Security and Management (SAM) 2009, pp.1-5 |
|
|
Journal
|
2009 |
Validation Methods of Suspicious Network Flows for Unknown Attack Detection
Kim Ik Kyun International Journal of Computers, v.1, no.3, pp.104-114 |
|
|
Conference
|
2009 |
A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment
Kim Ik Kyun International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 |
|
|
Journal
|
2009 |
Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection
Byoung Koo Kim International Journal of Computers, v.3, no.1, pp.115-124 |
|
|
Conference
|
2008 |
An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware
Byoung Koo Kim International Conference on Applied Computer Science (ACS) 2008, pp.199-204 |
|
|
Conference
|
2008 |
An Architecture of Unknown Attack Detection System against Zero-day Worm
Kim Ik Kyun International Conference on Applied Computer Science (ACS) 2008, pp.205-211 |
|
|
Conference
|
2007 |
ATPS – Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response
Byoung Koo Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 |
0 |
원문
|
Conference
|
2007 |
A Practical Approach for Detecting Executable Codes in Network Traffic
Kim Ik Kyun Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 |
1 |
원문
|
Conference
|
2007 |
An Efficient Clustering Algorithm for Classification of Computer Network Attacks
Jeong Chi Yoon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.1356-1357 |
|
|
Conference
|
2006 |
Hardware Supports for Network Traffic Anomaly Detection
Kim Dae Won International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5 |
|
|
Conference
|
2005 |
Design of Attack Generation Test-suite based Scenario for Security Solutions Testing
김환국 International Conference on Advanced Communication Technology (ICACT) 2005, pp.676-679 |
|
원문
|
Conference
|
2004 |
Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System
김형주 International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 |
0 |
원문
|
Conference
|
2004 |
Kernel-level Intrusion Detection System for Minimum Packet Loss
Chung Bo-Heung International Conference on Advanced Communication Technology (ICACT) 2004, pp.207-212 |
|
원문
|
Conference
|
2003 |
CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection
Kim Jin Suk International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.84-96 |
5 |
원문
|