Manpyo Hong

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2020
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance.
Multim. Tools Appl., 2020

2017
Automatic Mitigation of Kernel Rootkits in Cloud Environments.
Proceedings of the Information Security Applications - 18th International Conference, 2017

2015
An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration.
Multim. Tools Appl., 2015

Button-based method for the prevention of near field communication relay attacks.
Int. J. Commun. Syst., 2015

Improving packet header compression with adaptive sliding window size.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Secure Collaborative Key Management for Dynamic Groups in Mobile Networks.
J. Appl. Math., 2014

2013
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices.
Pers. Ubiquitous Comput., 2013

Two-factor authentication system based on extended OTP mechanism.
Int. J. Comput. Math., 2013

Polynomial-based key management for secure intra-group and inter-group communication.
Comput. Math. Appl., 2013

A fast and efficient wireless AP connection approach based on NFC Tag.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

2011
Collaborative Peer to Peer Defense Mechanism for DDoS Attacks.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

A structural view definition for RDF data.
Comput. Syst. Sci. Eng., 2011

NACS: non-overlapping AP's caching scheme to reduce handoff in 802.11 wireless LAN
CoRR, 2011

Fast Content-Based File Type Identification.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
EDGAR: Extended Dynamic Group-Key AgReement.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

Fast file-type identification.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Errata on: Light Weight Majority Voting based Data Accuracy Assurance Scheme for Wireless Sensor Networks using Quadtree Topology.
Intell. Autom. Soft Comput., 2009

Light Weight Majority Voting Based Data Accuracy Assurance Scheme for Wireless Sensor Networks Using Quadtree Topology.
Intell. Autom. Soft Comput., 2009

On Improving the Accuracy and Performance of Content-Based File Type Identification.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

Fine-Grained View-Based Access Control for RDF Cloaking.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Proving a Shuffle Using Representations of the Symmetric Group.
Proceedings of the Information Security and Cryptology, 2008

2007
Binding Update Authentication Scheme for Mobile IPv6.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

2005
Abstraction for Privacy in Context-Aware Environments.
Proceedings of the Mobility Aware Technologies and Applications, 2005

A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks.
Proceedings of the Information Networking, 2005

E-mail Worm Detection Using the Analysis of Behavior.
Proceedings of the Distributed Computing and Internet Technology, 2005

Vehicle Area Segmentation Using Grid-Based Feature Values.
Proceedings of the Computer Analysis of Images and Patterns, 11th International Conference, 2005

2004
Effective Packet Marking Approach to Defend against DDoS Attack.
Proceedings of the Computational Science and Its Applications, 2004

Macroscopic Treatment to Polymorphic E-mail Based Viruses.
Proceedings of the Computational Science and Its Applications, 2004

A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host.
Proceedings of the Computational Science and Its Applications, 2004

Artificial Immune System against Viral Attack.
Proceedings of the Computational Science, 2004

Effective Detector Set Generation and Evolution for Artificial Immune System.
Proceedings of the Computational Science, 2004

Biologically Inspired Computer Virus Detection System.
Proceedings of the Biologically Inspired Approaches to Advanced Information Technology, 2004

2001
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Multiple Pipelined Hash Joins Using Synchronization of Page Execution Time.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

1999
Optimal Transmission Scheduling for All-to-All Broadcast in WDM Optical Passive Star Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Optimal Scheduling Algorithms in WDM Optical Passive Star Networks.
Proceedings of the Parallel and Distributed Processing, 1999

1997
Performance Predictor for HPF Compilers.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

1996
A Heuristic Scheduling Algorithm of Imprecise Multiprocessor System with O/l Constraint.
Proceedings of the Third International Workshop on Real-Time Computing Systems Application (RTCSA '96), October 30, 1996

A Real-Time Micro Kernel Implemented on Transputer.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

1995
Real-time scheduling of tasks that contain the external blocking intervals.
Proceedings of the 2nd International Workshop on Real-Time Computing Systems and Applications, October 25, 1995


  Loading...