Skip to menu Skip to content Skip to footer

2007

Conference Publication

A secure data aggregation scheme for wireless sensor networks

Ren, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks.

A secure data aggregation scheme for wireless sensor networks

2007

Conference Publication

A key revocation scheme for mobile sensor networks

Kim, Dong Seong, Sadi, Mohammed Golam and Park, Jong Sou (2007). A key revocation scheme for mobile sensor networks. 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007 International Workshops: SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN, , , August 29, 2007-August 31, 2007. Springer Verlag. doi: 10.1007/978-3-540-74767-3_5

A key revocation scheme for mobile sensor networks

2007

Conference Publication

A security framework in RFID multi-domain system

Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). A security framework in RFID multi-domain system. 2nd International Conference on Availability, Reliability and Security, Vienna Austria, Apr 10-13, 2007. LOS ALAMITOS: IEEE Computer Society. doi: 10.1109/ARES.2007.24

A security framework in RFID multi-domain system

2007

Conference Publication

Adaptation mechanisms for survivable sensor networks against denial of service attack

Kim, Dong Seong, Yang, Chung Su and Park, Jong Sou (2007). Adaptation mechanisms for survivable sensor networks against denial of service attack. 2nd International Conference on Availability, Reliability and Security, Vienna Austria, Apr 10-13, 2007. LOS ALAMITOS: IEEE Computer Society. doi: 10.1109/ARES.2007.32

Adaptation mechanisms for survivable sensor networks against denial of service attack

2005

Conference Publication

Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection

Park, Jong Sou, Shazzad, Khaja Mohammad and Kim, Dong Seong (2005). Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, , , December 15, 2005-December 17, 2005. Springer Verlag. doi: 10.1007/11599548_24

Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection

2005

Conference Publication

An optimized intrusion detection system using PCA and BNN

Kim, Dong Seong, Nguyen, Ha-Nam, Thein, Thandar and Park, Jong Sou (2005). An optimized intrusion detection system using PCA and BNN. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005, , , November 9, 2005-November 10, 2005.

An optimized intrusion detection system using PCA and BNN

2005

Conference Publication

Genetic algorithm to improve SVM based network intrusion detection system

Kim, Dong Seong, Nguyen, Ha-Nam and Park, Jong Sou (2005). Genetic algorithm to improve SVM based network intrusion detection system. 19th International Conference on Advanced Information Networking and Applications, AINA 2005, , , March 28, 2005-March 30, 2005. IEEE. doi: 10.1109/AINA.2005.191

Genetic algorithm to improve SVM based network intrusion detection system

2005

Conference Publication

Intrusion detection system for securing geographical information system Web servers

Park, Jong Sou, Jin, Hong Tae and Kim, Dong Seong (2005). Intrusion detection system for securing geographical information system Web servers. Springer Verlag. doi: 10.1007/11427865_9

Intrusion detection system for securing geographical information system Web servers

2005

Conference Publication

Design of intelligent security management system using simulation-based analysis

Lee, Jang-Se, Kim, Dong Seong, Park, Jong Sou and Chi, Sung-Do (2005). Design of intelligent security management system using simulation-based analysis. 18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence, Sydney, Australia, 5 - 9 December, 2005. Heidelberg, Germany: Springer. doi: 10.1007/11589990_79

Design of intelligent security management system using simulation-based analysis