Jongsoo Jang

According to our database1, Jongsoo Jang authored at least 31 papers between 1997 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Long-Term Evolution Vulnerability Focusing on System Information Block Messages.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2012
AIGG Threshold Based HTTP GET Flooding Attack Detection.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Defense Against TCP Flooding Attack.
Proceedings of the SECRYPT 2012, 2012

2009
Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks.
Proceedings of the SECRYPT 2009, 2009

2008
Discovering and integrating distributed manufacturing services with semantic manufacturing capability profiles.
Int. J. Comput. Integr. Manuf., 2008

Tracing Stored Program Counter to Detect Polymorphic Shellcode.
IEICE Trans. Inf. Syst., 2008

Executable Code Recognition in Network Flows Using Instruction Transition Probabilities.
IEICE Trans. Inf. Syst., 2008

Random Visitor: Defense against Identity Attacks in P2P Networks.
IEICE Trans. Inf. Syst., 2008

Function Call Mechanism Based Executable Code Detection for the Network Security.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

2007
Memory-efficient content filtering hardware for high-speed intrusion detection systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Public Key Management Framework for Two-tier Super Peer Architecture.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

High Performance Session State Management Scheme for Stateful Packet Inspection.
Proceedings of the Managing Next Generation Networks and Services, 2007

Performance Prediction in Peer-to-Peer MultiAgent Networks.
Proceedings of the Agents and Peer-to-Peer Computing, 6th International Workshop, 2007

2006
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

A Study on Security Middleware Framework for the Ubiquitous Platform.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

A Protocol Switching Scheme for Developing Network Management Applications.
Proceedings of the Information Networking, 2006

2005
IXP2400 Network Processor Architecture for IPSEC Application.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

2004
Network Processor Based Network Intrusion Detection System.
Proceedings of the Information Networking, 2004

Fast and Strong Control of Congestion-Making Traffic.
Proceedings of the ICETE 2004, 2004

Design and Implementation of High-Performance Intrusion Detection System.
Proceedings of the Computational Science and Its Applications, 2004

Role-based policy distribution techniques in policy-based networks.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

2003
MF (Minority First) Scheme for defeating Distributed Denial of Service Attacks.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework.
Proceedings of the International Conference on Security and Management, 2003

An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
Proceedings of the International Conference on Security and Management, 2003

A Study on Bandwidth Consumption DDoS: Attack Defense.
Proceedings of the International Conference on Security and Management, 2003

Defeating DoS Attacks Using Wavelet Analysis.
Proceedings of the International Conference on Security and Management, 2003

2002
An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation.
Telecommun. Syst., 2002

A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks.
Proceedings of the Information Networking, 2002

Information Model for Policy-Based Network Security Management.
Proceedings of the Information Networking, 2002

Policy-Based Intrusion Detection and Automated Response Mechanism.
Proceedings of the Information Networking, 2002

1997
Architecture of Multimedia Service Interworking for Heterogeneous Multi-Carrier ATM Network.
Proceedings of the Intelligence in Services and Networks: Technology for Cooperative Competition, 1997


  Loading...