|
2012 Journal Article Detection of DDoS attacks using optimized traffic matrixLee, Sang Min, Kim, Dong Seong, Lee, Je Hak and Park, Jong Sou (2012). Detection of DDoS attacks using optimized traffic matrix. Computers & Mathematics with Applications, 63 (2), 501-510. doi: 10.1016/j.camwa.2011.08.020 |
|
2012 Journal Article Sensitivity analysis of server virtualized system availabilityMatos, Rubens De S., MacIel, Paulo R. M., Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2012). Sensitivity analysis of server virtualized system availability. IEEE Transactions on Reliability, 61 (4) 6324402, 994-1006. doi: 10.1109/TR.2012.2220711 |
|
2011 Journal Article Cost-sensitive spam detection using parameters optimization and feature selectionLee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Cost-sensitive spam detection using parameters optimization and feature selection. Journal of Universal Computer Science, 17 (6), 944-960. doi: 10.3217/jucs-017-06-0944 |
|
2008 Journal Article Modeling network intrusion detection system using feature selection and parameters optimizationKim, Dong Seong and Park, Jong Sou (2008). Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems, E91-D (4), 1050-1057. doi: 10.1093/ietisy/e91-d.4.1050 |
|
2007 Journal Article International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007)Park, Jong Sou, Lee, Jang-Se and Kim, Dong Seong (2007). International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4743 LNCS |
|
2004 Journal Article Determining optimal decision model for support vector machine by genetic algorithmOhn, Syng-Yup, Nguyen, Ha-Nam, Kim, Dong Seong and Park, Jong Sou (2004). Determining optimal decision model for support vector machine by genetic algorithm. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3314, 895-902. |
|
2003 Journal Article Network-based intrusion detection with support vector machinesKim, Dong Seong and Park, Jong Sou (2003). Network-based intrusion detection with support vector machines. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2662, 747-756. |