Jong Sou Park

According to our database1, Jong Sou Park authored at least 87 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security.
IEEE Access, 2022

2020
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models.
Secur. Commun. Networks, 2020

2019
A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking.
IEEE Access, 2019

Security and Performance Modeling and Optimization for Software Defined Networking.
Proceedings of the 18th IEEE International Conference On Trust, 2019

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Android Malware Detection Using Feature Selections and Random Forest.
Proceedings of the International Conference on Software Security and Assurance, 2018

How to Define Value on Data under Blockchain Driven Open Data System for E-Government.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018

2016
Availability modeling and analysis of a data center for disaster tolerance.
Future Gener. Comput. Syst., 2016

Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Availability Modeling and Analysis for Software Defined Networks.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Security Modeling and Analysis of a SDN Based Web Service.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

2013
A DTN System for Nanosatellite-based Sensor Networks using a New ALOHA Multiple Access with Gateway Priority.
Smart Comput. Rev., 2013

Multi-cyber framework for availability enhancement of cyber physical systems.
Computing, 2013

2012
Quantitative intrusion intensity assessment for intrusion detection systems.
Secur. Commun. Networks, 2012

A Survey and Taxonomy of Lightweight Intrusion Detection Systems.
J. Internet Serv. Inf. Secur., 2012

A survivability model in wireless sensor networks.
Comput. Math. Appl., 2012

Detection of DDoS attacks using optimized traffic matrix.
Comput. Math. Appl., 2012

Design and Implementation of Embedded Hardware and Software Architecture in an Unmanned Airship.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

2011
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection.
J. Univers. Comput. Sci., 2011

DDoS Attacks Detection Using GA Based Optimized Traffic Matrix.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Performability Analysis of IaaS Cloud.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus Platform for E-Government Data Center.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Multi agent Community to support information processing in Wireless Sensor Network applications.
Int. J. Intell. Inf. Database Syst., 2010

Disaster Recovery for System Architecture Using Cloud Computing.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A 'digital gap' between developed country and least developed country: a comparative case study between Nepal and Korea.
Proceedings of the ICEGOV 2010, Proceedings of the 4th International Conference on Theory and Practice of Electronic Governance, Beijing, China, October 25, 2010

Spam Detection Using Feature Selection and Parameters Optimization.
Proceedings of the CISIS 2010, 2010

A Privacy Enhanced Data Aggregation Model.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Fault-Tolerance Data Aggregation for Clustering Wireless Sensor Network.
Wirel. Pers. Commun., 2009

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization.
J. Comput. Sci. Technol., 2009

Improved Method for Secure and Survivable Wireless Sensor Networks.
Proceedings of the UKSim'11, 2009

Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average.
Proceedings of the Advances in Information Security and Assurance, 2009

Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Cloud computing: future solution for e-governance.
Proceedings of the ICEGOV 2009, 2009

2008
Proactive Fault Management with Virtualization for Software Aging.
Proceedings of the Software Engineering, 2008

Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization.
IEICE Trans. Inf. Syst., 2008

A Recovery Model for Survivable Distributed Systems through the Use of Virtualization.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Density Mining Based Resilient Data Aggregation for Wireless Sensor Network.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Self Organized Mobility in Nanosensor Network Based on Particle Swarm Optimization and Coverage Criteria.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

The Multi Agent System Solutions for Wireless Sensor Network Applications.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center.
Proceedings of the IEEE International Conference on Software Reliability Engineering Workshops, 2008

Increasing Availability and Survivability of Cluster Head in WSN.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization Algorithm.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Improving Fault Tolerance by Virtualization and Software Rejuvenation.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Privacy Preserving Support Vector Machines in Wireless Sensor Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

A Secure Data Aggregation Scheme for Wireless Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

A Key Revocation Scheme for Mobile Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

An Efficient Music Retrieval Using Noise Cancellation.
Proceedings of the Future Generation Communication and Networking, 2007

A Hybrid Approach for Real-Time Network Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

A New Centralized Group Key Distribution and Revocation in Sensor Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack.
Proceedings of the The Second International Conference on Availability, 2007

A Security Framework in RFID Multi-domain System.
Proceedings of the The Second International Conference on Availability, 2007

2006
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration.
Int. J. Netw. Secur., 2006

Toward Lightweight Detection and Visualization for Denial of Service Attacks.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Survivable Distributed Sensor Networks Through Stochastic Models.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Building Lightweight Intrusion Detection System Based on Random Forest.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Survival of the Internet Applications: A Cluster Recovery Model.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

A Framework of Survivability Model for Wireless Sensor Network.
Proceedings of the The First International Conference on Availability, 2006

2005
Optimization of Intrusion Detection through Fast Hybrid Feature Selection.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

GBR: Grid Based Random Key Predistribution for Wireless Sensor Network.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

A Model of ITS Using Cold Standby Cluster.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005

A Survivability Model for Cluster System.
Proceedings of the Distributed and Parallel Computing, 2005

A Survivability Model for Cluster System Under DoS Attacks.
Proceedings of the High Performance Computing and Communications, 2005

Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

A rejuvenation methodology of cluster recovery.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

Design of Intelligent Security Management System Using Simulation-Based Analysis.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

Genetic Algorithm to Improve SVM Based Network Intrusion Detection System.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Intrusion Detection System for Securing Geographical Information System Web Servers.
Proceedings of the Web and Wireless Geographical Information Systems, 2004

Software Rejuvenation Approach to Security Engineering.
Proceedings of the Computational Science and Its Applications, 2004

Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Transient Time Analysis of Network Security Survivability Using DEVS.
Proceedings of the Artificial Intelligence and Simulation, 2004

Linux-Based System Modelling for Cyber-attack Simulation.
Proceedings of the Artificial Intelligence and Simulation, 2004

A Framework of Software Rejuvenation for Survivability.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
A Role of DEVS Simulation for Information Assurance.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Network-Based Intrusion Detection with Support Vector Machines.
Proceedings of the Information Networking, 2003

2001
SECUSIM: A Tool for the Cyber-Attack Simulation.
Proceedings of the Information and Communications Security, Third International Conference, 2001

An XML-Based 3-Dimensional Graphic Database System.
Proceedings of the Human Society and the Internet, 2001

Network Security Modeling and Cyber Attack Simulation Methodology.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001


  Loading...