Min Sik Kim

Orcid: 0000-0001-7317-5360

According to our database1, Min Sik Kim authored at least 52 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Attentive Pooling-Based Weighted Sum of Spectral Decay Rates for Blind Estimation of Reverberation Time.
IEEE Signal Process. Lett., 2022

2018
A Heuristic for Constructing Smaller Automata Based on Suffix Sorting and Its Application in Network Security.
IEICE Trans. Inf. Syst., 2018

2017
Cyber situational awareness enhancement with regular expressions and an evaluation methodology.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Simulating Exploits for the Creation and Refinement of Detection Signatures.
Proceedings of the 25th IEEE International Symposium on Modeling, 2017

2016
Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems.
IEICE Trans. Inf. Syst., 2016

2015
A multi-omic analysis of human naïve CD4+ T cells.
BMC Syst. Biol., 2015

A highly deterministic hashing scheme using bitmap filter for high speed networking.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

REduce: Removing Redundancy from Regular Expression Matching in Network Security.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

OpenFlow Accelerator: A Decomposition-Based Hashing Approach for Flow Processing.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Increasing Diversity in Network Intrusion Detection System Evaluation.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
TCAM-based classification using divide-and-conquer for range expansion.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A hierarchical hashing scheme to accelerate longest prefix matching.
Proceedings of the IEEE Global Communications Conference, 2014

Protecting Run-Time Filters for Network Intrusion Detection Systems.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
High Performance Table-Based Algorithm for Pipelined CRC Calculation.
J. Commun., 2013

An efficient bit-parallel algorithm for IDS.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

2012
Routing in the presence of groups in mobile ad hoc networks.
Int. J. Inf. Technol. Commun. Convergence, 2012

An application-level content generative model for network applications.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012

GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Efficient memory layout for packet classification system on multi-core architecture.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Fast filtering for intrusion detection systems with the shift-or algorithm.
Proceedings of the 18th Asia-Pacific Conference on Communications, 2012

2011
A Scalable DDoS Detection Framework with Victim Pinpoint Capability.
J. Commun., 2011

Simulating content in traffic for benchmarking intrusion detection systems.
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011

Real-time Netshuffle: Graph distortion for on-line anonymization.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

NFA-Based Pattern Matching for Deep Packet Inspection.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Netshuffle: Improving Traffic Trace Anonymization through Graph Distortion.
Proceedings of IEEE International Conference on Communications, 2011

Identisch. Siehe bereits vorhandene Homepage. DFA-Based Regular Expression Matching on Compressed Traffic.
Proceedings of IEEE International Conference on Communications, 2011

A High-Performance 8-Tap FIR Filter Using Logarithmic Number System.
Proceedings of IEEE International Conference on Communications, 2011

TrustGuard: A flow-level reputation-based DDoS defense system.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Provider-level content migration strategies in P2P-based media distribution networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Using TCAM efficiently for IP route lookup.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Entropy and software systems: towards an information-theoretic foundation of software testing.
Proceedings of the Workshop on Future of Software Engineering Research, 2010

Lightweight Traffic-Aware Packet Classification for Continuous Operation.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Bidirectional Range Extension for TCAM-Based Packet Classification.
Proceedings of the NETWORKING 2010, 2010

Hybrid Regular Expression Matching for Deep Packet Inspection on Multi-Core Architecture.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition.
Proceedings of IEEE International Conference on Communications, 2010

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup.
Proceedings of the Global Communications Conference, 2010

Tree-Based Minimization of TCAM Entries for Packet Classification.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

IP Prefix Matching with Binary and Ternary CAMs.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

A Pipelined CRC Calculation Using Lookup Tables.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
npf-a simple, traffic-adaptive packet classifier using on-line reorganization of rule trees.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Machine Learning Algorithm Selection for Forecasting Behavior of Global Institutional Investors.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
A wavelet-based approach to detect shared congestion.
IEEE/ACM Trans. Netw., 2008

Rule Hashing for Efficient Packet Classification in Network Intrusion Detection.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

2007
Bandwidth-adaptive Clustering for Mobile Ad Hoc Networks.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Traffic-aware packet matching for intrusion detection systems.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

2006
Scalable Clustering of Internet Paths by Shared Congestion.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Eliminating Bottlenecks in Overlay Multicast.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

2004
Application of wavelet denoising to the detection of shared congestion in overlay multimedia networks.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

2003
Transient behaviors of TCP-friendly congestion control protocols.
Comput. Networks, 2003

Optimal Distribution Tree for Internet Streaming Media.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

2000
Optimal Partitioning of Multicast Receivers.
Proceedings of the Eighth Annual International Conference on Network Protocols, 2000


  Loading...