BongNam Noh
According to our database1,
BongNam Noh
authored at least 43 papers
between 1995 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Generation of Network Traffic Using WGAN-GP and a DFT Filter for Resolving Data Imbalance.
Proceedings of the Internet and Distributed Computing Systems, 2019
2018
A Study on the Vulnerability Assessment for Digital I&C System in Nuclear Power Plant.
Proceedings of the Information Security Applications - 19th International Conference, 2018
2016
Proceedings of the Advances in Information and Computer Security, 2016
2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
2010
Adv. Inf. Sci. Serv. Sci., 2010
2009
Proceedings of the Third International Conference on the Digital Society (ICDS 2009), 2009
2008
Design of an event system adopting ontology-based event model for ubiquitous environment.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
2007
Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network.
Proceedings of the Future Generation Communication and Networking, 2007
2006
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment.
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing.
Proceedings of the WEBIST 2006, 2006
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
Proceedings of the Advances in Information and Computer Security, 2006
A similarity based technique for detecting malicious executable files for computer forensics.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006
Proceedings of the Advances in Hybrid Information Technology, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
A Security Architecture for Adapting Multiple Access Control Models to Operating Systems.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006
2005
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
Proceedings of the Applied Parallel Computing, 2004
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network.
Proceedings of the Information Networking, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science, 2004
Proceedings of the Computational Science, 2004
Proceedings of the IEEE International Conference on Fuzzy Systems, 2004
2003
Proceedings of the Computer and Information Sciences, 2003
A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance.
Proceedings of the International Conference on Security and Management, 2003
Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework.
Proceedings of the International Conference on Security and Management, 2003
Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment.
Proceedings of the Web Technologies and Applications, 5th Asian-Pacific Web Conference, 2003
2002
Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management.
Proceedings of the Information Networking, 2002
1999
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
1995
Proceedings of the 1995 International Conference on Network Protocols, 1995