Jinoh Kim

According to our database1, Jinoh Kim authored at least 43 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A New Approach to Multivariate Network Traffic Analysis.
J. Comput. Sci. Technol., 2019

A Hybrid Cache Architecture for Meeting Per-Tenant Performance Goals in a Private Cloud.
CoRR, 2019

Learning-based Dynamic Cache Management in a Cloud.
CoRR, 2019

Multivariate network traffic analysis using clustered patterns.
Computing, 2019

A survey of deep learning-based network anomaly detection.
Cluster Computing, 2019

Automatic Detection of Network Traffic Anomalies and Changes.
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, 2019

Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection.
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, 2019

Session details: Keynote Speech.
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, 2019

2018
Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection.
CoRR, 2018

An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Website Fingerprinting Attack Mitigation Using Traffic Morphing.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

An Empirical Evaluation of Deep Learning for Network Anomaly Detection.
Proceedings of the 2018 International Conference on Computing, 2018

An Encoding Technique for CNN-based Network Anomaly Detection.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
A lightweight network anomaly detection technique.
Proceedings of the 2017 International Conference on Computing, 2017

An approach to online network monitoring using clustered patterns.
Proceedings of the 2017 International Conference on Computing, 2017

A New Approach to Online, Multivariate Network Traffic Analysis.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2015
Exploiting Replication for Energy-Aware Scheduling in Disk Storage Systems.
IEEE Trans. Parallel Distrib. Syst., 2015

Incorporating multiple cluster models for network traffic classification.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Scalable Security Event Aggregation for Situation Analysis.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

Security for the scientific data services framework.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

2014
iPACS: Power-aware covering sets for energy proportionality and performance in data parallel computing clusters.
J. Parallel Distrib. Comput., 2014

A Hybrid Classifier with a Binning Method for Network Application Identification.
J. Integrated Design & Process Science, 2014

A Security-enabled Grid System for MINDS Distributed Data Mining.
J. Grid Comput., 2014

2013
Reconciling Multiple Matches for the Signature-Based Application Identification.
JCM, 2013

2012
Energy-Saving Techniques for Disk Storage Systems.
Proceedings of the Handbook of Energy-Aware and Green Computing - Two Volume Set., 2012

FREP: Energy proportionality for disk storage using replication.
J. Parallel Distrib. Comput., 2012

2011
Passive Network Performance Estimation for Large-Scale, Data-Intensive Computing.
IEEE Trans. Parallel Distrib. Syst., 2011

Energy Proportionality and Performance in Data Parallel Computing Clusters.
Proceedings of the Scientific and Statistical Database Management, 2011

Parallel in situ indexing for data-intensive computing.
Proceedings of the IEEE Symposium on Large Data Analysis and Visualization, 2011

Energy-Aware Scheduling in Disk Storage Systems.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Energy proportionality for disk storage using replication.
Proceedings of the EDBT 2011, 2011

2010
Using Replication for Energy Conservation in RAID Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

2009
Using Data Accessibility for Resource Selection in Large-Scale Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2009

2008
Accessibility-Based Resource Selection in Loosely-Coupled Distributed Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
NGS: Service Adaptation in Open Grid Platforms.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing.
Proceedings of the Computational Science, 2007

Exploiting Heterogeneity for Collective Data Downloading in Volunteer-based Networks.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2005
Design and Implementation of Policy Decision Point in Policy-Based Network.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
Role-based policy distribution techniques in policy-based networks.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

2003
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
Proceedings of the International Conference on Security and Management, 2003

Applying Data Mining Techniques to Analyze Alert Data.
Proceedings of the Web Technologies and Applications, 5th Asian-Pacific Web Conference, 2003

2002
Policy-Based Intrusion Detection and Automated Response Mechanism.
Proceedings of the Information Networking, 2002


  Loading...