Koohong Kang

According to our database1, Koohong Kang authored at least 10 papers between 1997 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks.
IEICE Trans. Inf. Syst., 2018

2012
Performance Anomaly of the IEEE 802.11 DCF in Different Frame Error Rate Conditions.
J. Inf. Process. Syst., 2012

2009
Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities.
IEICE Trans. Inf. Syst., 2008

2007
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

A Practical Approach for Detecting Executable Codes in Network Traffic.
Proceedings of the Managing Next Generation Networks and Services, 2007

2003
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
Proceedings of the International Conference on Security and Management, 2003

2002
A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks.
Proceedings of the Information Networking, 2002

1999
Bound analysis for WRR scheduling in a statistical multiplexer with bursty sources.
Telecommun. Syst., 1999

1997
Performance analysis of statistical multiplexing of heterogeneous discrete-time Markovian arrival processes in an ATM network.
Comput. Commun., 1997


  Loading...