BongNam Noh

According to our database1, BongNam Noh authored at least 43 papers between 1995 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Generation of Network Traffic Using WGAN-GP and a DFT Filter for Resolving Data Imbalance.
Proceedings of the Internet and Distributed Computing Systems, 2019

2018
A Study on the Vulnerability Assessment for Digital I&C System in Nuclear Power Plant.
Proceedings of the Information Security Applications - 19th International Conference, 2018

2016
Robust bootstrapping memory analysis against anti-forensics.
Digit. Investig., 2016

Hooking Graceful Moments: A Security Analysis of Sudo Session Handling.
Proceedings of the Advances in Information and Computer Security, 2016

2011
Android platform based linux kernel rootkit.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

2010
Design and Implementation of SIP-aware DDoS Attack Detection System.
Adv. Inf. Sci. Serv. Sci., 2010

2009
Detecting P2P Botnets Using a Multi-phased Flow Model.
Proceedings of the Third International Conference on the Digital Society (ICDS 2009), 2009

2008
Design of an event system adopting ontology-based event model for ubiquitous environment.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network.
Proceedings of the Future Generation Communication and Networking, 2007

2006
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing.
Proceedings of the WEBIST 2006, 2006

Design and Implementation of Context-Awareness Simulation Toolkit for Context learning.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Modeling of Network Intrusions Based on the Multiple Transition Probability.
Proceedings of the Advances in Information and Computer Security, 2006

A similarity based technique for detecting malicious executable files for computer forensics.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Expert System Using Fuzzy Petri Nets in Computer Forensics.
Proceedings of the Advances in Hybrid Information Technology, 2006

Network Anomaly Detection Based on Clustering of Sequence Patterns.
Proceedings of the Computational Science and Its Applications, 2006

Network Intrusion Detection Using Statistical Probability Distribution.
Proceedings of the Computational Science and Its Applications, 2006

A Security Architecture for Adapting Multiple Access Control Models to Operating Systems.
Proceedings of the Computational Science and Its Applications, 2006

An Efficient Similarity Measure for Clustering of Categorical Sequences.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

2005
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
Proceedings of the Computational Science and Its Applications, 2005

A Privacy Protection Model in ID Management Using Access Control.
Proceedings of the Computational Science and Its Applications, 2005

Auto-generation of Detection Rules with Tree Induction Algorithm.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Development of Event Manager and Its Application in Jini Environment.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
A Framework for Modeling Organization Structure in Role Engineering.
Proceedings of the Applied Parallel Computing, 2004

The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network.
Proceedings of the Information Networking, 2004

Detection Techniques for ELF Executable File Using Assembly Instruction Searching.
Proceedings of the Computational Science and Its Applications, 2004

A New Role-Based Authorization Model in a Corporate Workflow Systems.
Proceedings of the Computational Science and Its Applications, 2004

A Fuzzy Expert System for Network Forensics.
Proceedings of the Computational Science and Its Applications, 2004

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management.
Proceedings of the Computational Science, 2004

A New Authorization Model for Workflow Management System Using the RPI-RBAC Model.
Proceedings of the Computational Science, 2004

A fuzzy logic based expert system as a network forensics.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2004

2003
A New Role-Based Delegation Model Using Sub-role Hierarchies.
Proceedings of the Computer and Information Sciences, 2003

A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance.
Proceedings of the International Conference on Security and Management, 2003

Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework.
Proceedings of the International Conference on Security and Management, 2003

Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment.
Proceedings of the Web Technologies and Applications, 5th Asian-Pacific Web Conference, 2003

2002
Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management.
Proceedings of the Information Networking, 2002

1999
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1995
Internetworking between OSI and TCP/IP network managements with security features.
Proceedings of the 1995 International Conference on Network Protocols, 1995


  Loading...