Kyungsan Cho

According to our database1, Kyungsan Cho authored at least 9 papers between 2004 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
P2P and P2P botnet traffic classification in two stages.
Soft Comput., 2017

2014
Hybrid P2P traffic classification with heuristic rules and machine learning.
Soft Comput., 2014

2013
Two-step hierarchical scheme for detecting detoured attacks to the web server.
Comput. Sci. Inf. Syst., 2013

Two-Step P2P Traffic Classification with Connection Heuristics.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Detection of Mobile Botnet Using VPN.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Detection of Insider Attacks to the Web Server.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

2005
Comments on Yeh-Shen-Hwang's One-Time Password Authentication Scheme.
IEICE Trans. Commun., 2005

Two-Step Hierarchical Protocols for Establishing Session Keys in Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005

2004
A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...