Won Hyung Park

According to our database1, Won Hyung Park authored at least 15 papers between 2012 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Performance Comparison and Detection Analysis in Snort and Suricata Environment.
Wirel. Pers. Commun., 2017

Special Issue on Mobile Sensor Networks: Advanced Technologies and Their Applications.
Wirel. Pers. Commun., 2017

2016
An exploratory research on advanced smart media security design for sustainable intelligence information system.
Multim. Tools Appl., 2016

Enhancing industrial security management system for multimedia environment.
Multim. Tools Appl., 2016

2015
New detection method and countermeasure of cyber attacks in mix networks.
Multim. Tools Appl., 2015

Improvement of evidence collection module using live response technology on a windows system.
Multim. Tools Appl., 2015

Vulnerability of information disclosure in data transfer section for constructing a safe smart work infrastructure.
Multim. Tools Appl., 2015

2014
A study on cyber threat prediction based on intrusion detection event for APT attack detection.
Multim. Tools Appl., 2014

Fraud and financial crime detection model using malware forensics.
Multim. Tools Appl., 2014

2013
Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment.
Wirel. Pers. Commun., 2013

A Study on Trend and Detection Technology for Cyber Threats in Mobile Environment.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

Vulnerability of Information Disclosure in Data Transfer Section for Safe Smartwork Infrastructure.
Proceedings of the International Conference on Information Science and Applications, 2013

2012
Cyber Threat Prediction Model Using Security Monitoring System Event.
Proceedings of the International Conference on IT Convergence and Security, 2012

A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method.
Proceedings of the International Conference on IT Convergence and Security, 2012

A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent.
Proceedings of the International Conference on IT Convergence and Security, 2012


  Loading...