Myong H. Kang
  According to our database1,
  Myong H. Kang
  authored at least 63 papers
  between 1992 and 2023.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2023
Work-in-Progress: A Hybrid Collaborative Multi Agent Decision Making Algorithm With Factored-Value Max-Plus.
    
  
    Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023
    
  
  2022
    IEEE Trans. Dependable Secur. Comput., 2022
    
  
    Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
    
  
  2021
    IEEE Embed. Syst. Lett., 2021
    
  
    Proceedings of the IEEE Symposium on Computers and Communications, 2021
    
  
Using Online Planning and Acting to Recover from Cyberattacks on Software-defined Networks.
    
  
    Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
    
  
  2020
A Cybersecurity Model for Decision-Making Problems Under Uncertainty Using Game Theory.
    
  
    Proceedings of the 13th International Conference on Communications, 2020
    
  
  2019
Building private blockchains over public blockchains (PoP): an attribute-based access control approach.
    
  
    Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
    
  
S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks.
    
  
    Proceedings of the 22nd International Symposium on Research in Attacks, 2019
    
  
    Proceedings of the 2019 IEEE International Conference on Communications, 2019
    
  
  2018
    Proceedings of the 2018 IEEE Military Communications Conference, 2018
    
  
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data.
    
  
    Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
    
  
  2017
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption.
    
  
    IACR Cryptol. ePrint Arch., 2017
    
  
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing.
    
  
    IACR Cryptol. ePrint Arch., 2017
    
  
  2016
Multiple time series fisher periodicity test for the detection of the distributed new shrew attacks.
    
  
    Proceedings of the International Conference on Communications, 2016
    
  
Spectral analysis of low rate of denial of service attacks detection based on fisher and Siegel tests.
    
  
    Proceedings of the 2016 IEEE International Conference on Communications, 2016
    
  
  2012
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels.
    
  
    IEEE Trans. Inf. Forensics Secur., 2012
    
  
    Proceedings of the 31st IEEE Military Communications Conference, 2012
    
  
    Proceedings of the 28th Annual Computer Security Applications Conference, 2012
    
  
  2011
    Proceedings of the MILCOM 2011, 2011
    
  
    Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
    
  
  2010
    Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
    
  
    Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
    Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
    
  
Eigenvalue characterization of the capacity of discrete memoryless channels with invertible channel matrices.
    
  
    Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010
    
  
  2009
    Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
    
  
  2008
    Inf. Secur. Tech. Rep., 2008
    
  
  2007
    J. Data Semant., 2007
    
  
An Architecture for Web Services Authentication and Authorization in a Maritime Environment.
    
  
    Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
    
  
  2006
    Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
    
  
  2005
    Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005
    
  
    Proceedings of the On the Move to Meaningful Internet Systems 2005: CoopIS, 2005
    
  
    Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
    
  
  2001
    Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
    
  
A Secure Workflow System for Dynamic Collaboration.
  
    Proceedings of the Trusted Information: The New Decade Challenge, 2001
    
  
    Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
    
  
Randomly roving agents for intrusion detection.
  
    Proceedings of the Database and Application Security XV, 2001
    
  
  2000
    Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000
    
  
    Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
    
  
  1999
A Strategy for an MLS Workflow Management System.
  
    Proceedings of the Research Advances in Database and Information Systems Security, 1999
    
  
    Proceedings of the Advanced Information Systems Engineering, 1999
    
  
    Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
    
  
  1998
    Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
    
  
  1997
    Proceedings of the 1997 Workshop on New Security Paradigms, 1997
    
  
    Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
    
  
  1996
    Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
    
  
    Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996
    
  
    Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
    
  
  1995
    Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
    
  
The Modulated-Input Modulated-Output Model.
  
    Proceedings of the Database Security IX: Status and Prospects, 1995
    
  
  1994
The SINTRA Data Model: Structure and Operations.
  
    Proceedings of the Database Security, 1994
    
  
    Proceedings of the 10th Annual Computer Security Applications Conference, 1994
    
  
    Proceedings of the 10th Annual Computer Security Applications Conference, 1994
    
  
  1993
Using Object Modeling Techniques to Design MLS Data Models.
  
    Proceedings of the Security for Object-Oriented Systems, 1993
    
  
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture.
  
    Proceedings of the Database Security, 1993
    
  
  1992
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System.
  
    Proceedings of the Database Security, 1992