|
2008 Conference Publication Achieving availability and survivability in Wireless Sensor Networks by software rejuvenationParvin, Sazia, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2008). Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation. International Conference on Pervasive Services, ICPS 2008 - 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU'08, , , July 6, 2008-July 10, 2008. New York, NY, USA: ACM. doi: 10.1145/1387329.1387332 |
|
2008 Conference Publication Software rejuvenation and reconfiguration for enhancing survivability of sensor networksKim, Dong Seong, Parvin, Sazia and Park, Jong Sou (2008). Software rejuvenation and reconfiguration for enhancing survivability of sensor networks. doi: 10.1109/WAINA.2008.231 |
|
2008 Conference Publication Privacy preserving support vector machines in wireless sensor networksKim, Dong Seong, Azim, Muhammad Anwarul and Park, Jong Sou (2008). Privacy preserving support vector machines in wireless sensor networks. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, Barcelona, Spain, 4-7 March 2008. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ARES.2008.151 |
|
2008 Journal Article Modeling network intrusion detection system using feature selection and parameters optimizationKim, Dong Seong and Park, Jong Sou (2008). Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems, E91-D (4), 1050-1057. doi: 10.1093/ietisy/e91-d.4.1050 |
|
2007 Conference Publication Access control and authorization for security of RFID multi-domain using SAML and XACMLKim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). Access control and authorization for security of RFID multi-domain using SAML and XACML. IEEE Computer Society. doi: 10.1109/ICCIAS.2006.295330 |
|
2007 Journal Article International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007)Park, Jong Sou, Lee, Jang-Se and Kim, Dong Seong (2007). International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4743 LNCS |
|
2007 Conference Publication A key revocation scheme for mobile sensor networksKim, Dong Seong, Sadi, Mohammed Golam and Park, Jong Sou (2007). A key revocation scheme for mobile sensor networks. 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007 International Workshops: SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN, , , August 29, 2007-August 31, 2007. Springer Verlag. doi: 10.1007/978-3-540-74767-3_5 |
|
2007 Conference Publication Toward modeling sensor node security using task-role based access control with TinySecMoon, Misun, Kim, Dong Seong and Park, Jong Sou (2007). Toward modeling sensor node security using task-role based access control with TinySec. Springer Verlag. doi: 10.1007/978-3-540-74377-4_77 |
|
2007 Conference Publication A secure data aggregation scheme for wireless sensor networksRen, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks. |
|
2007 Conference Publication A security framework in RFID multi-domain systemKim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). A security framework in RFID multi-domain system. IEEE Computer Society. doi: 10.1109/ARES.2007.24 |
|
2007 Conference Publication Adaptation mechanisms for survivable sensor networks against denial of service attackKim, Dong Seong, Yang, Chung Su and Park, Jong Sou (2007). Adaptation mechanisms for survivable sensor networks against denial of service attack. IEEE Computer Society. doi: 10.1109/ARES.2007.32 |
|
2005 Conference Publication Genetic algorithm to improve SVM based network intrusion detection systemKim, Dong Seong, Nguyen, Ha-Nam and Park, Jong Sou (2005). Genetic algorithm to improve SVM based network intrusion detection system. 19th International Conference on Advanced Information Networking and Applications, AINA 2005, , , March 28, 2005-March 30, 2005. IEEE. doi: 10.1109/AINA.2005.191 |
|
2005 Conference Publication Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selectionPark, Jong Sou, Shazzad, Khaja Mohammad and Kim, Dong Seong (2005). Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, , , December 15, 2005-December 17, 2005. Springer Verlag. doi: 10.1007/11599548_24 |
|
2005 Conference Publication An optimized intrusion detection system using PCA and BNNKim, Dong Seong, Nguyen, Ha-Nam, Thein, Thandar and Park, Jong Sou (2005). An optimized intrusion detection system using PCA and BNN. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005, , , November 9, 2005-November 10, 2005. |
|
2005 Conference Publication Intrusion detection system for securing geographical information system Web serversPark, Jong Sou, Jin, Hong Tae and Kim, Dong Seong (2005). Intrusion detection system for securing geographical information system Web servers. Springer Verlag. doi: 10.1007/11427865_9 |
|
2005 Conference Publication Design of intelligent security management system using simulation-based analysisLee, Jang-Se, Kim, Dong Seong, Park, Jong Sou and Chi, Sung-Do (2005). Design of intelligent security management system using simulation-based analysis. 18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence, Sydney, Australia, 5 - 9 December, 2005. Heidelberg, Germany: Springer. doi: 10.1007/11589990_79 |
|
2004 Journal Article Determining optimal decision model for support vector machine by genetic algorithmOhn, Syng-Yup, Nguyen, Ha-Nam, Kim, Dong Seong and Park, Jong Sou (2004). Determining optimal decision model for support vector machine by genetic algorithm. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3314, 895-902. |
|
2003 Journal Article Network-based intrusion detection with support vector machinesKim, Dong Seong and Park, Jong Sou (2003). Network-based intrusion detection with support vector machines. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2662, 747-756. |