ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Ik Kyun
Department
Information Strategy Department
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 Analyzing the container security threat on the 5G Core Network   Jihyeon Song   Silicon Valley Cybersecurity Conference (SVCC) 2024, pp.1-3 0
Journal
2024 A Study of the Relationship of Malware Detection Mechanisms using Artificial Intelligence   Jihyeon Song   ICT EXPRESS, v.10, no.3, pp.632-649 1
Conference
2023 Performance Analysis of Cryptojacking Container Detection with Machine Learning   송지현   한국컴퓨터 종합 학술대회 2023, pp.1294-1296
Journal
2023 Practical covert wireless unidirectional communication in IEEE 802.11 environment   Hayoung Seong   IEEE Internet of Things Journal, v.10, no.2, pp.1499-1516 9
Journal
2022 Technological Trends in Intelligent Cyber Range   유재학   전자통신동향분석, v.37, no.4, pp.36-45
Conference
2022 정보보호 분야에서의 사이버 레인지 기술 동향   유재학   한국정보처리학회 학술 발표 대회 (춘계) 2022, pp.208-211
Journal
2021 AI based Visualization Platform for the Unknown Malware Analysis   송지현   국방과 보안, v.3, no.2, pp.97-115
Journal
2021 Security Technology Trends to Prevent Medical Device Hacking and Ransomware   권혁찬   전자통신동향분석, v.36, no.5, pp.21-31
Conference
2021 Consideration for the Construction of Practical Wireless Covert Timing Channels   Hayoung Seong   World Conference on Information Security Applications (WISA) 2021, pp.66-70
Journal
2021 Evaluations of AI‐based malicious PowerShell detection with feature optimizations   Jihyeon Song   ETRI Journal, v.43, no.3, pp.549-560 14
Journal
2020 5G Edge Security Technology Trend   박종근   정보보호학회지, v.30, no.6, pp.7-16
Journal
2020 Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments   김영수   정보과학회지, v.38, no.9, pp.16-24
Journal
2020 Technological Trends in Cyber Attack Simulations   이주영   전자통신동향분석, v.35, no.1, pp.34-48
Journal
2019 Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles   Jonghoon Lee   IEEE Access, v.7, pp.165607-165626 104
Journal
2019 5G Security Architectural Features and Key Improvements in 3GPP Standard   박종근   정보보호학회지, v.29, no.5, pp.21-30
Conference
2019 Deep Learning based PowerShell Analysis with the Abstract Syntax Tree   Jihyeon Song   USENIX Security Symposium 2019, pp.1-1
Conference
2019 Implementation of a Static PowerShell Analysis based on the CNN-LSTM Model with Token Type Optimizations   Jihyeon Song   World Conference on Information Security Applications (WISA) 2019: Workshop, pp.99-107
Journal
2019 A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph   Jooyoung Lee   Journal of Supercomputing, v.75, no.6, pp.3028-3045 16
Conference
2019 Real-time Multi-process Tracing Decoder Architecture   Youngsoo Kim   Workshop on Systems and Network Telemetry and Analytics (SNTA) 2019, pp.49-52 0
Conference
2019 Deep Learning based Malicious Powershell Script Detection Method   송지현   한국정보보호학회 영남/충청 지부 학술 대회 2019, pp.122-125
Journal
2019 Mobile Network Security Issues regarding 5G Security   박종근   전자통신동향분석, v.34, no.1, pp.36-48
Journal
2019 Improvement of Malware Detection and Classification using API Call Sequence Alignment and Visualization   Hyunjoo Kim   Cluster Computing, v.22, no.Supp.1, pp.921-929 47
Journal
2019 Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing   Hyunjoo Kim   Cluster Computing, v.22, no.Supp.1, pp.2341-2350 36
Journal
2019 A Survey of Deep Learning-based Network Anomaly Detection   Donghwoon Kwon  Cluster Computing, v.22, no.Supp.1, pp.949-961 459
Conference
2018 Analysis on the VNF-DPI for the Cloud Security   김정태   한국통신학회 종합 학술 발표회 (하계) 2018, pp.811-812
Journal
2018 Deduplication Technologies over Encrypted Data   김건우   전자통신동향분석, v.33, no.1, pp.68-77
Journal
2017 네트워크 주소 이동 기술 동향   박경민   전자통신동향분석, v.32, no.6, pp.73-82
Conference
2017 Toward the SIEM Architecture for Cloud-based Security Services   Jong-Hoon Lee   Conference on Communications and Network Security (CNS) 2017, pp.1-2 22
Conference
2017 Building a Big Data Platform for Large-scale Security Data Analysis   Jong-Hoon Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 5
Conference
2017 Netflow Based HTTP Get Flooding Attack Analysis   Jungtae Kim   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017
Journal
2017 DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks   Daesung Moon   Journal of Supercomputing, v.73, no.7, pp.2881-2895 113
Conference
2017 Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security   Hyunjoo Kim   iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 3
Journal
2017 Malware Detection using Deep Learning   최선오   정보보호학회지, v.27, no.3, pp.5-11
Journal
2016 Advanced DDoS Attack & Corresponding Technical Trends   김정태   전자통신동향분석, v.31, no.6, pp.77-87
Conference
2016 Visualization of Malware Detection Based on API Call Sequence Alignment   Jong-Hyun Kim   International Conference on Internet (ICONI) 2016, pp.175-178
Conference
2016 Network Signature Clustering   최선오   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1263-1264
Journal
2016 PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording   Seon-Ho Shin  IEEE Network, v.30, no.6, pp.42-48 5
Conference
2016 Implementation of Malware Detection System Based on Behavioral Sequences   Hyunjoo Kim   International Conference on Security Technology (SecTech) 2016, pp.348-353
Conference
2016 Real-time Abnormal Behavior Detection by Online Data Collection   이명철   한국정보처리학회 학술 발표 대회 (추계) 2016, pp.208-209
Conference
2016 Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis   Jungtae Kim   International Conference on Evolving Internet (INTERNET) 2016, pp.20-25
Conference
2016 HTTP Get Flooding Detection Technique based on Netflow Information   Youngsoo Kim   International Conference on Evolving Internet (INTERNET) 2016, pp.26-29
Conference
2016 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence   Jong-Hyun Kim   International Conference on Security Technology (SecTech) 2016, pp.354-359
Conference
2016 Network Abnormal Behavior Analysis System   최선오   한국정보처리학회 학술 발표 대회 (추계) 2016, pp.189-190
Conference
2016 A Forensically Robust Data Acquisition from a 10G Line-rate Network   Jooyoung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 0
Conference
2016 Hierarchical Network Signature Clustering and Generation   Sunoh Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 2
Conference
2016 Traffic Storing and Related Information Generation System for Cyber Attack Analysis   Yangseo Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 1
Journal
2016 Host-based Intrusion Detection System for Secure Human-centric Computing   Daesung Moon   Journal of Supercomputing, v.72, no.7, pp.2520-2536 34
Journal
2016 Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call   Hyun-Joo KIM   IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 5
Journal
2016 Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis   황호   정보보호학회논문지, v.26, no.2, pp.377-386
Journal
2016 Hash Table with Expanded-Key for High-Speed Networking   Seon-Ho SHIN  IEICE Transactions on Information and Systems, v.E99.D, no.3, pp.747-750 1
Conference
2016 A Platform of Processing and Visualizing Multi-Source Data for Analyzing Symptoms of Cyber Attacks   Youngsoo Kim   International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.318-322
Conference
2016 Introduction to a Network Forensics System for Cyber Incidents Analysis   Yangseo Choi   International Conference on Advanced Communication Technology (ICACT) 2016, pp.50-55 4
Conference
2016 Load Adaptive and Fault Tolerant Distributed Stream Processing System for Explosive Stream Data   Myungcheol Lee   International Conference on Advanced Communication Technology (ICACT) 2016, pp.745-751 7
Conference
2015 Cyber Black Box: Network Intrusion Forensics System for Collecting and Preserving Evidence of Attack   Jong-Hyun Kim   SRI Security Congress 2015, pp.104-110
Conference
2015 Implementation of Netflow based Interactive Connection Traceback System   Jung-Tae Kim   International Conference on Systems and Networks Communications (ICSNC) 2015, pp.21-26
Conference
2015 Behavior-Based Anomaly Detection on Big Data   Hyunjoo Kim   SRI Security Congress 2015, pp.73-80
Conference
2015 A Cyber Blackbox for Collecting Network Evidence   Jooyoung Lee   SRI Security Congress 2015, pp.141-147
Conference
2015 Anomaly Detection Method using Network Pattern Analysis of Process   Minho Han   World Congress on Internet Security (WorldCIS) 2015, pp.159-163 2
Journal
2015 Cyber Genome Technology for Countering Malware   김종현   전자통신동향분석, v.30, no.5, pp.118-128
Conference
2015 Transmitted File Extraction and Reconstruction from Network Packets   Yangseo Choi   World Congress on Internet Security (WorldCIS) 2015, pp.164-165 2
Journal
2015 Real-Time Abnormal Behavior Detection System Based on Fast Data   이명철   정보보호학회논문지, v.25, no.5, pp.1027-1041
Conference
2015 An Abnormal Connection Detection System based on Network Flow Analysis   Jong-Hoon Lee   International Conference on Consumer Electronics (ICCE) 2015 : Berlin, pp.71-75 0
Journal
2015 Technical Trends of the Cyber Targeted Attack Traceback - Connection Chain & Traceback   김정태   전자통신동향분석, v.30, no.4, pp.120-128
Journal
2015 10Gbps Network Traffic Capture and Runtime Indexing   최선오   전자통신동향분석, v.30, no.4, pp.181-190
Conference
2015 Load Adaptive Distributed Stream Processing System for Explosive Stream Data   Myungcheol Lee   International Conference on Advanced Communication Technology (ICACT) 2015, pp.753-757 3
Conference
2015 Testing Data Set for Analyzing Behaviors of Malicious Codes   Youngsoo Kim   International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2015, pp.4-9
Conference
2015 Traceback of the Cyber Targeted Attacks   김정태   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1495-1496
Conference
2015 Performance Comparison of Relational Databases and Columnar Databases for Fast Search of 10Gbps Network Flows   최선오   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1538-1539
Conference
2015 Design and Implementation of Network Forensic System for 2Gbps Network Traffic   최양서   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1597-1598
Conference
2015 A Study on the Network Data with a Cyber Black System   이주영   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1595-1596
Conference
2015 Trend and Issue Dynamic Analysis for Malware   황호   한국정보처리학회 학술 발표 대회 (춘계) 2015, pp.418-420
Journal
2015 Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space   Hansung Lee   KSII Transactions on Internet and Information Systems, v.9, no.3, pp.1173-1192 5
Conference
2015 Host Behavior Characteristic Description Method Against APT Attack Detection   Moon Daesung   World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7
Conference
2014 Secure Virtualised Environment   Pushpinder Kaur Chouhan  International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 0
Conference
2014 Involvers’ Behavior-based Modeling in Cyber Targeted Attack   Youngsoo Kim   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2014, pp.132-137
Conference
2014 Attack Cause Analysis Algorithm using Cyber BlackBox   최선오   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.392-394
Journal
2014 Host based Feature Description Method for Detecting APT Attack   문대성   정보보호학회논문지, v.24, no.5, pp.839-850
Conference
2014 Unsupervised Clustering of Malware based on Behaviour Analysis   이한성   한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3
Conference
2014 The Phased Classification of Attacking Methods used for Advanced Persistent Threat   Youngsoo Kim   International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014, pp.1-7
Conference
2014 Software Integrity Authentication with Trusted Third Party   최양서   대한전자공학회 종합 학술 대회 (하계) 2014, pp.606-608
Conference
2014 Feature Extraction for Host based Anomaly Detection   문대성   대한전자공학회 종합 학술 대회 (하계) 2014, pp.591-594
Journal
2014 Cyber attack response technology and standardization   김종현   OSIA Standards & Technology Review Journal, v.27, no.2, pp.76-88
Journal
2014 Technical Trends of the Cyber Attack Traceback   김정태   전자통신동향분석, v.29, no.1, pp.93-103
Conference
2014 Detection of Suspicious Behavior for Responding to Cyber Targeted Attack on Big Data   Hyunjoo Kim   International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2
Conference
2014 Abnormal Behavior Detection Technique based on Big Data   Hyunjoo Kim   International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.553-563 6
Conference
2013 Hue Modeling for Object Tracking in Multiple Non-Overlapping Cameras   Minho Han   International Workshop on Multi-disciplinary Trends in Artificial Intelligence (MIWAI) 2013, pp.69-78 1
Conference
2013 Design and Implementation of the Contents Visualization System for Social Networks   Jong-Hoon Lee   International Conference for Internet Technology and Secured Transactions (ICITST) 2013, pp.479-783 1
Conference
2013 Executable File Reconstruction on Virtualized Environment   Yangseo Choi   International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.264-267
Conference
2013 Cooperative Security Monitoring System   Jong-Hyun Kim   Workshop on Visualization for Cyber Security (VizSec) 2013, pp.1-2
Conference
2013 Social Contents Sharing Model and System based on User Location and Social Network   Jung-Tae Kim   International Conference on Consumer Electronics (ICCE) 2013 : Berlin, pp.314-318 5
Conference
2013 Detecting UDP Flooding Attacks Based on Attack Traffic Characteristics   Byoungkoo Kim   Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.337-340
Journal
2013 GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection   Hyunjoo Kim   Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 0
Journal
2013 Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection   Yangseo Choi   Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 0
Conference
2013 Recent Cyber Attacks and Security Intelligence   김영수   한국 컴퓨터 종합 학술 대회 2013, pp.718-719
Conference
2013 Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis   Sun-Hee Lim   International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507
Journal
2013 Cyber Attacks and Security Intelligence   Youngsoo Kim   Research Notes in Information Science, v.14, pp.106-108 0
Journal
2013 ITU-T SG17 Cybersecurity Standardization Trend   김종현   정보보호학회지, v.23, no.3, pp.19-27
Journal
2013 Technical Trends of Cyber Security with Big Data   김종현   전자통신동향분석, v.28, no.3, pp.19-29
Journal
2013 Software Authentication Method with Trusted Third Party   Yangseo Choi   Research Notes in Information Science, v.14, pp.102-105
Conference
2012 Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding   Daewon Kim   International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 1
Conference
2012 Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks   Hyunjoo Kim  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 6
Conference
2012 AIGG Threshold Based HTTP GET Flooding Attack Detection   Yang-seo Choi   International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 12
Conference
2012 Defense against TCP Flooding Attack   Seungyong Yoon   International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 1
Conference
2012 Network-based Executable File Extraction and Analysis for Malware Detection   Byoungkoo Kim   International Conference on Security and Cryptography (SECRYPT) 2012, pp.430-433
Journal
2012 Utilization of Physical Security Events for the Converged Security Using Analytic Hierarchy Process : Focus on Information Security   강구홍  정보보호학회논문지, v.22, no.3, pp.553-564
Journal
2012 Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process : focus on Information Security   강구홍  정보보호학회논문지, v.22, no.3, pp.553-564
Conference
2011 Timeslot Monitoring Model for Application Layer DDoS Attack Detection   Y.S. Choi   International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679
Conference
2011 Design and Implementation of Secure-NIC System for DDoS Attack Response   김병구   한국정보처리학회 학술 발표 (추계) 2011, pp.996-998
Conference
2011 Design and Implementation of ALADDIN System   윤승용   한국정보처리학회 학술 발표 (추계) 2011, pp.992-995
Conference
2011 Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource   Dae Won Kim   International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145
Conference
2011 Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File   김대원   한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944
Journal
2011 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card   김병구   정보보호학회논문지, v.21, no.2, pp.119-129
Conference
2010 Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File   Dae Won Kim   International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 1
Conference
2009 Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points   Yoo Hee Cho  Asia-Pacific Network Operations and Management Symposium (APNOMS) 2009 (LNCS 5787), v.5787, pp.385-394 0
Journal
2009 Polymorphic Worm Detection Using A Fast Static Analysis Approach   오진태   정보보호학회논문지, v.19, no.4, pp.29-39
Conference
2009 Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection   Byoung Koo Kim   International Conference on Security and Management (SAM) 2009, pp.1-6
Conference
2009 Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme   Seung Yong Yoon   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2009 Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique   Dae Won Kim   International Conference on Communications (ICC) 2009, pp.1-6 0
Journal
2009 Encoded Executable File Detection Technique Via Executable File Header Analysis   Yang Seo Choi   International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36
Journal
2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Ik Kyun Kim   International Journal of Computers, v.1, no.3, pp.104-114
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference
2008 PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)   Yang-Seo Choi   International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 40
Journal
2008 Tracing Stored Program Counter to Detect Polymorphic Shellcode   Dae Won Kim   IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 3
Conference
2008 Function Call Mechanism Based Executable Code Detection for the Network Security   Dae Won Kim   International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 3
Conference
2008 Fast Static Analysis Method to Detect Polymorphic Worm   김대원   한국통신학회 종합 학술 발표회 (하계) 2008, pp.229-232
Journal
2008 Executable Code Recognition in Network Flows Using Instruction Transition Probabilities   Ik Kyun Kim   IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 2
Journal
2008 PE Header Characteristics Analysis Technique for Malware Detection   최양서   정보보안논문지, v.8, no.2, pp.63-70
Journal
2008 The Recent Trends of Polymorphic Shellcodes Detection Technologies   김대원   전자통신동향분석, v.23, no.1, pp.145-152
Journal
2008 신종 사이버 공격 탐지 및 차단을 위한 인프라 구축 프로젝트   김대원   주간기술동향, v.1329, pp.1-12
Journal
2007 Zero-day 공격 대응을 위한 네트워크 보안의 지능화 기술   정일안   정보와 통신 : 한국통신학회지, v.24, no.11, pp.14-24
Conference
2007 A Practical Approach for Detecting Executable Codes in Network Traffic   Ik Kyun Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 1
Journal
2006 A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm   김익균   전자공학회논문지 TC, v.43, no.7, pp.93-103
Journal
2006 네트워크 보안을 위한 공격 분류법   김대원   주간기술동향, v.1249, pp.1-13
Conference
2004 Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System   Hyeong Ju Kim  International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 0
Conference
2004 Design and Implementation of High-Performance Intrusion Detection System   Byoung Koo Kim   International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 2
Conference
2003 Design of Security Node System for High-Speed Intrusion Detection and Response   김병구   통신 정보 합동 학술 대회 (JCCI) 2003, pp.350-350
Conference
2002 Design of Security Gateway System for High-Speed Intrusion Detection Performance   김병구   한국통신학회 종합 학술 발표회 (추계) 2002, pp.1076-1079
Conference
2002 A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks   Ik Kyun Kim   International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.17-27 0