default search action
Jongsoo Jang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c26]Minjae Kim, Jong Geun Park, Daesung Moon, Jongsoo Jang, Youngsoo Kim, Jonghoon Lee:
Long-Term Evolution Vulnerability Focusing on System Information Block Messages. ICTC 2020: 837-842
2010 – 2019
- 2012
- [c25]Seungyong Yoon, Jintae Oh, Ikkyun Kim, Jongsoo Jang:
Defense Against TCP Flooding Attack. SECRYPT 2012: 416-420 - [c24]Yangseo Choi, Ik-Kyun Kim, Jintae Oh, Jongsoo Jang:
AIGG Threshold Based HTTP GET Flooding Attack Detection. WISA 2012: 270-284
2000 – 2009
- 2009
- [c23]Young-Jun Heo, Jintae Oh, Jongsoo Jang:
Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks. SECRYPT 2009: 140-143 - 2008
- [j5]Jabeom Gu, Jaehoon Nah, Hyeokchan Kwon, Jongsoo Jang, Sehyun Park:
Random Visitor: Defense against Identity Attacks in P2P Networks. IEICE Trans. Inf. Syst. 91-D(4): 1058-1073 (2008) - [j4]Ikkyun Kim, Koohong Kang, Yangseo Choi, Daewon Kim, Jintae Oh, Jongsoo Jang, Kijun Han:
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities. IEICE Trans. Inf. Syst. 91-D(7): 2076-2078 (2008) - [j3]Daewon Kim, Ikkyun Kim, Jintae Oh, Jongsoo Jang:
Tracing Stored Program Counter to Detect Polymorphic Shellcode. IEICE Trans. Inf. Syst. 91-D(8): 2192-2195 (2008) - [j2]Jongsoo Jang, Buhwan Jeong, Boonserm Kulvatunyou, Jaegyong Chang, Hyunbo Cho:
Discovering and integrating distributed manufacturing services with semantic manufacturing capability profiles. Int. J. Comput. Integr. Manuf. 21(6): 631-646 (2008) - [c22]Daewon Kim, Yangseo Choi, Ikkyun Kim, Jintae Oh, Jongsoo Jang:
Function Call Mechanism Based Executable Code Detection for the Network Security. SAINT 2008: 62-67 - 2007
- [c21]Jabeom Gu, Jaehoon Nah, Hyeokchan Kwon, Jongsoo Jang, Sehyun Park:
Performance Prediction in Peer-to-Peer MultiAgent Networks. AP2PC 2007: 27-40 - [c20]Seungyong Yoon, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang:
High Performance Session State Management Scheme for Stateful Packet Inspection. APNOMS 2007: 591-594 - [c19]Hyeokchan Kwon, Sangchoon Kim, Jaehoon Nah, Jongsoo Jang:
Public Key Management Framework for Two-tier Super Peer Architecture. ICDCS Workshops 2007: 72 - [c18]Sungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das:
Memory-efficient content filtering hardware for high-speed intrusion detection systems. SAC 2007: 264-269 - 2006
- [c17]Hyeokchan Kwon, Jaehoon Nah, Jongsoo Jang:
A Protocol Switching Scheme for Developing Network Management Applications. ICOIN 2006: 862-872 - [c16]Wonjoo Park, Dong-il Seo, Jongsoo Jang, Daeyoung Kim:
A Study on Security Middleware Framework for the Ubiquitous Platform. VTC Fall 2006: 1-5 - [c15]Jabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jae-Kwang Lee, Jongsoo Jang:
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks. WISA 2006: 282-296 - 2005
- [c14]Minho Han, Kiyoung Kim, Jongsoo Jang:
IXP2400 Network Processor Architecture for IPSEC Application. IMSA 2005: 28-31 - 2004
- [c13]Geonlyang Kim, Jinoh Kim, Jungchan Na, Jongsoo Jang:
Role-based policy distribution techniques in policy-based networks. Communications, Internet, and Information Technology 2004: 103-107 - [c12]Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jongsoo Jang:
Design and Implementation of High-Performance Intrusion Detection System. ICCSA (4) 2004: 594-602 - [c11]Gaeil Ahn, Kiyoung Kim, Jongsoo Jang:
Fast and Strong Control of Congestion-Making Traffic. ICETE (2) 2004: 20-29 - [c10]Hyeyoung Cho, Daeyoung Kim, Juhong Kim, Yoonmee Doh, Jongsoo Jang:
Network Processor Based Network Intrusion Detection System. ICOIN 2004: 973-982 - 2003
- [c9]Jinoh Kim, Ikkyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang:
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. Security and Management 2003: 20-26 - [c8]Young-Jun Heo, Jongsoo Jang:
Defeating DoS Attacks Using Wavelet Analysis. Security and Management 2003: 248-252 - [c7]Sang-Kil Park, Jongsoo Jang, BongNam Noh:
Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. Security and Management 2003: 397-401 - [c6]Dong-Ho Kang, Dong-il Seo, Jongsoo Jang:
A Study on Bandwidth Consumption DDoS: Attack Defense. Security and Management 2003: 491-494 - [c5]Gaeil Ahn, Kiyoung Kim, Jongsoo Jang:
MF (Minority First) Scheme for defeating Distributed Denial of Service Attacks. ISCC 2003: 1233-1238 - 2002
- [j1]Gaeil Ahn, Jongsoo Jang, Woojik Chun:
An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation. Telecommun. Syst. 19(3-4): 481-495 (2002) - [c4]Ikkyun Kim, Koohong Kang, Zyn-Oh Kim, Jongsoo Jang, Youngsik Baek:
A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks. ICOIN (1) 2002: 17-27 - [c3]Jinoh Kim, Kiyoung Kim, Jongsoo Jang:
Policy-Based Intrusion Detection and Automated Response Mechanism. ICOIN (2) 2002: 399-408 - [c2]Sook-Yeon Kim, Myung-Eun Kim, Kiyoung Kim, Jongsoo Jang:
Information Model for Policy-Based Network Security Management. ICOIN (1) 2002: 662-672
1990 – 1999
- 1997
- [c1]Sung Won Sohn, Jongsoo Jang, Chang Suk Oh:
Architecture of Multimedia Service Interworking for Heterogeneous Multi-Carrier ATM Network. IS&N 1997: 49-60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint