ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Ik Kyun
Department
System Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2024 A Study of the Relationship of Malware Detection Mechanisms using Artificial Intelligence   Jihyeon Song   ICT EXPRESS, v.10, no.3, pp.632-649 0
Conference
2023 Performance Analysis of Cryptojacking Container Detection with Machine Learning   송지현   한국컴퓨터 종합 학술대회 2023, pp.1294-1296
Journal
2023 Practical covert wireless unidirectional communication in IEEE 802.11 environment   Hayoung Seong   IEEE Internet of Things Journal, v.10, no.2, pp.1499-1516 8
Journal
2022 Technological Trends in Intelligent Cyber Range   유재학   전자통신동향분석, v.37, no.4, pp.36-45
Conference
2022 정보보호 분야에서의 사이버 레인지 기술 동향   유재학   한국정보처리학회 학술 발표 대회 (춘계) 2022, pp.208-211
Journal
2021 AI based Visualization Platform for the Unknown Malware Analysis   송지현   국방과 보안, v.3, no.2, pp.97-115
Journal
2021 Security Technology Trends to Prevent Medical Device Hacking and Ransomware   권혁찬   전자통신동향분석, v.36, no.5, pp.21-31
Conference
2021 Consideration for the Construction of Practical Wireless Covert Timing Channels   Hayoung Seong   World Conference on Information Security Applications (WISA) 2021, pp.66-70
Journal
2021 Evaluations of AI-based Malicious PowerShell Detection with Feature Optimizations   Jihyeon Song   ETRI Journal, v.43, no.3, pp.549-560 12
Journal
2020 5G Edge Security Technology Trend   박종근   정보보호학회지, v.30, no.6, pp.7-16
Journal
2020 Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments   김영수   정보과학회지, v.38, no.9, pp.16-24
Journal
2020 Technological Trends in Cyber Attack Simulations   이주영   전자통신동향분석, v.35, no.1, pp.34-48
Journal
2019 Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles   Jonghoon Lee   IEEE Access, v.7, pp.165607-165626 95
Journal
2019 5G Security Architectural Features and Key Improvements in 3GPP Standard   박종근   정보보호학회지, v.29, no.5, pp.21-30
Conference
2019 Deep Learning based PowerShell Analysis with the Abstract Syntax Tree   Jihyeon Song   USENIX Security Symposium 2019, pp.1-1
Conference
2019 Implementation of a Static PowerShell Analysis based on the CNN-LSTM Model with Token Type Optimizations   Jihyeon Song   World Conference on Information Security Applications (WISA) 2019: Workshop, pp.99-107
Conference
2019 Real-time Multi-process Tracing Decoder Architecture   Youngsoo Kim   Workshop on Systems and Network Telemetry and Analytics (SNTA) 2019, pp.49-52 0
Journal
2019 A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph   Jooyoung Lee   Journal of Supercomputing, v.75, no.6, pp.3028-3045 15
Journal
2019 Mobile Network Security Issues regarding 5G Security   박종근   전자통신동향분석, v.34, no.1, pp.36-48
Conference
2019 Deep Learning based Malicious Powershell Script Detection Method   송지현   한국정보보호학회 영남/충청 지부 학술 대회 2019, pp.122-125
Journal
2019 A Survey of Deep Learning-based Network Anomaly Detection   Donghwoon Kwon  Cluster Computing, v.22, no.Supp.1, pp.949-961 442
Journal
2019 Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing   Hyunjoo Kim   Cluster Computing, v.22, no.Supp.1, pp.2341-2350 35
Journal
2019 Improvement of Malware Detection and Classification using API Call Sequence Alignment and Visualization   Hyunjoo Kim   Cluster Computing, v.22, no.Supp.1, pp.921-929 45
Conference
2018 Analysis on the VNF-DPI for the Cloud Security   김정태   한국통신학회 종합 학술 발표회 (하계) 2018, pp.811-812
Journal
2018 Deduplication Technologies over Encrypted Data   김건우   전자통신동향분석, v.33, no.1, pp.68-77
Journal
2017 네트워크 주소 이동 기술 동향   박경민   전자통신동향분석, v.32, no.6, pp.73-82
Conference
2017 Toward the SIEM Architecture for Cloud-based Security Services   Jong-Hoon Lee   Conference on Communications and Network Security (CNS) 2017, pp.1-2 21
Conference
2017 Building a Big Data Platform for Large-scale Security Data Analysis   Jong-Hoon Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 5
Conference
2017 Netflow Based HTTP Get Flooding Attack Analysis   Jungtae Kim   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017
Journal
2017 DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks   Daesung Moon   Journal of Supercomputing, v.73, no.7, pp.2881-2895 108
Journal
2017 Malware Detection using Deep Learning   최선오   정보보호학회지, v.27, no.3, pp.5-11
Conference
2017 Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security   Hyunjoo Kim   iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 3
Journal
2016 Advanced DDoS Attack & Corresponding Technical Trends   김정태   전자통신동향분석, v.31, no.6, pp.77-87
Journal
2016 PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording   Seon-Ho Shin  IEEE Network, v.30, no.6, pp.42-48 5
Conference
2016 Visualization of Malware Detection Based on API Call Sequence Alignment   Jong-Hyun Kim   International Conference on Internet (ICONI) 2016, pp.175-178
Conference
2016 Network Signature Clustering   최선오   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1263-1264
Conference
2016 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence   Jong-Hyun Kim   International Conference on Security Technology (SecTech) 2016, pp.354-359
Conference
2016 Network Abnormal Behavior Analysis System   최선오   한국정보처리학회 학술 발표 대회 (추계) 2016, pp.189-190
Conference
2016 HTTP Get Flooding Detection Technique based on Netflow Information   Youngsoo Kim   International Conference on Evolving Internet (INTERNET) 2016, pp.26-29
Conference
2016 Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis   Jungtae Kim   International Conference on Evolving Internet (INTERNET) 2016, pp.20-25
Conference
2016 Real-time Abnormal Behavior Detection by Online Data Collection   이명철   한국정보처리학회 학술 발표 대회 (추계) 2016, pp.208-209
Conference
2016 Implementation of Malware Detection System Based on Behavioral Sequences   Hyunjoo Kim   International Conference on Security Technology (SecTech) 2016, pp.348-353
Conference
2016 Traffic Storing and Related Information Generation System for Cyber Attack Analysis   Yangseo Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 1
Conference
2016 Hierarchical Network Signature Clustering and Generation   Sunoh Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 2
Conference
2016 A Forensically Robust Data Acquisition from a 10G Line-rate Network   Jooyoung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 0
Journal
2016 Host-based Intrusion Detection System for Secure Human-centric Computing   Daesung Moon   Journal of Supercomputing, v.72, no.7, pp.2520-2536 34
Journal
2016 Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis   황호   정보보호학회논문지, v.26, no.2, pp.377-386
Journal
2016 Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call   Hyun-Joo KIM   IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 5
Conference
2016 A Platform of Processing and Visualizing Multi-Source Data for Analyzing Symptoms of Cyber Attacks   Youngsoo Kim   International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.318-322
Journal
2016 Hash Table with Expanded-Key for High-Speed Networking   Seon-Ho SHIN  IEICE Transactions on Information and Systems, v.E99.D, no.3, pp.747-750 1
Conference
2016 Introduction to a Network Forensics System for Cyber Incidents Analysis   Yangseo Choi   International Conference on Advanced Communication Technology (ICACT) 2016, pp.50-55 4
Conference
2016 Load Adaptive and Fault Tolerant Distributed Stream Processing System for Explosive Stream Data   Myungcheol Lee   International Conference on Advanced Communication Technology (ICACT) 2016, pp.745-751 7
Conference
2015 Cyber Black Box: Network Intrusion Forensics System for Collecting and Preserving Evidence of Attack   Jong-Hyun Kim   SRI Security Congress 2015, pp.104-110
Conference
2015 A Cyber Blackbox for Collecting Network Evidence   Jooyoung Lee   SRI Security Congress 2015, pp.141-147
Conference
2015 Behavior-Based Anomaly Detection on Big Data   Hyunjoo Kim   SRI Security Congress 2015, pp.73-80
Conference
2015 Implementation of Netflow based Interactive Connection Traceback System   Jung-Tae Kim   International Conference on Systems and Networks Communications (ICSNC) 2015, pp.21-26
Journal
2015 Cyber Genome Technology for Countering Malware   김종현   전자통신동향분석, v.30, no.5, pp.118-128
Conference
2015 Anomaly Detection Method using Network Pattern Analysis of Process   Minho Han   World Congress on Internet Security (WorldCIS) 2015, pp.159-163 2
Conference
2015 Transmitted File Extraction and Reconstruction from Network Packets   Yangseo Choi   World Congress on Internet Security (WorldCIS) 2015, pp.164-165 1
Journal
2015 Real-Time Abnormal Behavior Detection System Based on Fast Data   이명철   정보보호학회논문지, v.25, no.5, pp.1027-1041
Conference
2015 An Abnormal Connection Detection System based on Network Flow Analysis   Jong-Hoon Lee   International Conference on Consumer Electronics (ICCE) 2015 : Berlin, pp.71-75 0
Journal
2015 Technical Trends of the Cyber Targeted Attack Traceback - Connection Chain & Traceback   김정태   전자통신동향분석, v.30, no.4, pp.120-128
Journal
2015 10Gbps Network Traffic Capture and Runtime Indexing   최선오   전자통신동향분석, v.30, no.4, pp.181-190
Conference
2015 Load Adaptive Distributed Stream Processing System for Explosive Stream Data   Myungcheol Lee   International Conference on Advanced Communication Technology (ICACT) 2015, pp.753-757 3
Conference
2015 Testing Data Set for Analyzing Behaviors of Malicious Codes   Youngsoo Kim   International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2015, pp.4-9
Conference
2015 Traceback of the Cyber Targeted Attacks   김정태   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1495-1496
Conference
2015 Design and Implementation of Network Forensic System for 2Gbps Network Traffic   최양서   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1597-1598
Conference
2015 Performance Comparison of Relational Databases and Columnar Databases for Fast Search of 10Gbps Network Flows   최선오   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1538-1539
Conference
2015 A Study on the Network Data with a Cyber Black System   이주영   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1595-1596
Conference
2015 Trend and Issue Dynamic Analysis for Malware   황호   한국정보처리학회 학술 발표 대회 (춘계) 2015, pp.418-420
Journal
2015 Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space   Hansung Lee   KSII Transactions on Internet and Information Systems, v.9, no.3, pp.1173-1192 5
Conference
2015 Host Behavior Characteristic Description Method Against APT Attack Detection   Moon Daesung   World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7
Conference
2014 Secure Virtualised Environment   Pushpinder Kaur Chouhan  International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 0
Conference
2014 Involvers’ Behavior-based Modeling in Cyber Targeted Attack   Youngsoo Kim   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2014, pp.132-137
Conference
2014 Attack Cause Analysis Algorithm using Cyber BlackBox   최선오   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.392-394
Journal
2014 Host based Feature Description Method for Detecting APT Attack   문대성   정보보호학회논문지, v.24, no.5, pp.839-850
Conference
2014 Unsupervised Clustering of Malware based on Behaviour Analysis   이한성   한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3
Conference
2014 The Phased Classification of Attacking Methods used for Advanced Persistent Threat   Youngsoo Kim   International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014, pp.1-7
Journal
2014 Cyber attack response technology and standardization   김종현   OSIA Standards & Technology Review Journal, v.27, no.2, pp.76-88
Conference
2014 Software Integrity Authentication with Trusted Third Party   최양서   대한전자공학회 종합 학술 대회 (하계) 2014, pp.606-608
Conference
2014 Feature Extraction for Host based Anomaly Detection   문대성   대한전자공학회 종합 학술 대회 (하계) 2014, pp.591-594
Journal
2014 Technical Trends of the Cyber Attack Traceback   김정태   전자통신동향분석, v.29, no.1, pp.93-103
Conference
2014 Detection of Suspicious Behavior for Responding to Cyber Targeted Attack on Big Data   Hyunjoo Kim   International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2
Conference
2014 Abnormal Behavior Detection Technique based on Big Data   Hyunjoo Kim   International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.553-563 6
Conference
2013 Hue Modeling for Object Tracking in Multiple Non-Overlapping Cameras   Minho Han   International Workshop on Multi-disciplinary Trends in Artificial Intelligence (MIWAI) 2013, pp.69-78 1
Conference
2013 Design and Implementation of the Contents Visualization System for Social Networks   Jong-Hoon Lee   International Conference for Internet Technology and Secured Transactions (ICITST) 2013, pp.479-783 1
Conference
2013 Executable File Reconstruction on Virtualized Environment   Yangseo Choi   International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.264-267
Conference
2013 Cooperative Security Monitoring System   Jong-Hyun Kim   Workshop on Visualization for Cyber Security (VizSec) 2013, pp.1-2
Conference
2013 Social Contents Sharing Model and System based on User Location and Social Network   Jung-Tae Kim   International Conference on Consumer Electronics (ICCE) 2013 : Berlin, pp.314-318 5
Journal
2013 GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection   Hyunjoo Kim   Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 0
Journal
2013 Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection   Yangseo Choi   Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 0
Conference
2013 Detecting UDP Flooding Attacks Based on Attack Traffic Characteristics   Byoungkoo Kim   Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.337-340
Journal
2013 Cyber Attacks and Security Intelligence   Youngsoo Kim   Research Notes in Information Science, v.14, pp.106-108 0
Conference
2013 Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis   Sun-Hee Lim   International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507
Journal
2013 Software Authentication Method with Trusted Third Party   Yangseo Choi   Research Notes in Information Science, v.14, pp.102-105
Journal
2013 ITU-T SG17 Cybersecurity Standardization Trend   김종현   정보보호학회지, v.23, no.3, pp.19-27
Conference
2013 Recent Cyber Attacks and Security Intelligence   김영수   한국 컴퓨터 종합 학술 대회 2013, pp.718-719
Journal
2013 Technical Trends of Cyber Security with Big Data   김종현   전자통신동향분석, v.28, no.3, pp.19-29
Conference
2012 Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding   Daewon Kim   International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 1
Conference
2012 Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks   Hyunjoo Kim  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 6
Conference
2012 AIGG Threshold Based HTTP GET Flooding Attack Detection   Yang-seo Choi   International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 12
Conference
2012 Defense against TCP Flooding Attack   Seungyong Yoon   International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 1
Conference
2012 Network-based Executable File Extraction and Analysis for Malware Detection   Byoungkoo Kim   International Conference on Security and Cryptography (SECRYPT) 2012, pp.430-433
Journal
2012 Utilization of Physical Security Events for the Converged Security Using Analytic Hierarchy Process : Focus on Information Security   강구홍  정보보호학회논문지, v.22, no.3, pp.553-564
Journal
2012 Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process : focus on Information Security   강구홍  정보보호학회논문지, v.22, no.3, pp.553-564
Conference
2011 Timeslot Monitoring Model for Application Layer DDoS Attack Detection   Y.S. Choi   International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679
Conference
2011 Design and Implementation of ALADDIN System   윤승용   한국정보처리학회 학술 발표 (추계) 2011, pp.992-995
Conference
2011 Design and Implementation of Secure-NIC System for DDoS Attack Response   김병구   한국정보처리학회 학술 발표 (추계) 2011, pp.996-998
Conference
2011 Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource   Dae Won Kim   International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145
Conference
2011 Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File   김대원   한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944
Journal
2011 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card   김병구   정보보호학회논문지, v.21, no.2, pp.119-129
Conference
2010 Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File   Dae Won Kim   International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 1
Conference
2009 Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points   Yoo Hee Cho  Asia-Pacific Network Operations and Management Symposium (APNOMS) 2009 (LNCS 5787), v.5787, pp.385-394 0
Journal
2009 Polymorphic Worm Detection Using A Fast Static Analysis Approach   오진태   정보보호학회논문지, v.19, no.4, pp.29-39
Conference
2009 Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme   Seung Yong Yoon   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2009 Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection   Byoung Koo Kim   International Conference on Security and Management (SAM) 2009, pp.1-6
Conference
2009 Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique   Dae Won Kim   International Conference on Communications (ICC) 2009, pp.1-6 0
Journal
2009 Encoded Executable File Detection Technique Via Executable File Header Analysis   Yang Seo Choi   International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36
Journal
2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Ik Kyun Kim   International Journal of Computers, v.1, no.3, pp.104-114
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference
2008 PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)   Yang-Seo Choi   International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 39
Journal
2008 Tracing Stored Program Counter to Detect Polymorphic Shellcode   Dae Won Kim   IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 3
Conference
2008 Fast Static Analysis Method to Detect Polymorphic Worm   김대원   한국통신학회 종합 학술 발표회 (하계) 2008, pp.229-232
Journal
2008 Executable Code Recognition in Network Flows Using Instruction Transition Probabilities   Ik Kyun Kim   IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 2
Conference
2008 Function Call Mechanism Based Executable Code Detection for the Network Security   Dae Won Kim   International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 3
Journal
2008 PE Header Characteristics Analysis Technique for Malware Detection   최양서   정보보안논문지, v.8, no.2, pp.63-70
Journal
2008 The Recent Trends of Polymorphic Shellcodes Detection Technologies   김대원   전자통신동향분석, v.23, no.1, pp.145-152
Journal
2008 신종 사이버 공격 탐지 및 차단을 위한 인프라 구축 프로젝트(NoAH 와 ZASMIN 프로젝트)   김대원   주간기술동향, v.알수없음, no.1329, pp.1-12
Journal
2007 Zero-day 공격 대응을 위한 네트워크 보안의 지능화 기술   정일안   정보와 통신 : 한국통신학회지, v.24, no.11, pp.14-24
Conference
2007 A Practical Approach for Detecting Executable Codes in Network Traffic   Ik Kyun Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 1
Journal
2006 A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm   김익균   전자공학회논문지 TC, v.43, no.7, pp.93-103
Journal
2006 네트워크 보안을 위한 공격 분류법   김대원   주간기술동향, pp.1-13
Conference
2004 Design and Implementation of High-Performance Intrusion Detection System   Byoung Koo Kim   International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 2
Conference
2004 Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System   Hyeong Ju Kim  International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 0
Conference
2003 Design of Security Node System for High-Speed Intrusion Detection and Response   김병구   통신 정보 합동 학술 대회 (JCCI) 2003, pp.350-350
Conference
2002 Design of Security Gateway System for High-Speed Intrusion Detection Performance   김병구   한국통신학회 종합 학술 발표회 (추계) 2002, pp.1076-1079
Conference
2002 A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks   Ik Kyun Kim   International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.17-27 0