Jong Sou Park
According to our database1,
Jong Sou Park
authored at least 87 papers
between 2001 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security.
IEEE Access, 2022
2020
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models.
Secur. Commun. Networks, 2020
2019
A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking.
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
2018
Proceedings of the International Conference on Software Security and Assurance, 2018
How to Define Value on Data under Blockchain Driven Open Data System for E-Government.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018
2016
Future Gener. Comput. Syst., 2016
Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
2013
A DTN System for Nanosatellite-based Sensor Networks using a New ALOHA Multiple Access with Gateway Priority.
Smart Comput. Rev., 2013
Computing, 2013
2012
Secur. Commun. Networks, 2012
J. Internet Serv. Inf. Secur., 2012
Design and Implementation of Embedded Hardware and Software Architecture in an Unmanned Airship.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
2011
J. Univers. Comput. Sci., 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus Platform for E-Government Data Center.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
2010
Multi agent Community to support information processing in Wireless Sensor Network applications.
Int. J. Intell. Inf. Database Syst., 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
A 'digital gap' between developed country and least developed country: a comparative case study between Nepal and Korea.
Proceedings of the ICEGOV 2010, Proceedings of the 4th International Conference on Theory and Practice of Electronic Governance, Beijing, China, October 25, 2010
Proceedings of the CISIS 2010, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Wirel. Pers. Commun., 2009
Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization.
J. Comput. Sci. Technol., 2009
Proceedings of the UKSim'11, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009
Proceedings of the ICEGOV 2009, 2009
2008
Proceedings of the Software Engineering, 2008
Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization.
IEICE Trans. Inf. Syst., 2008
A Recovery Model for Survivable Distributed Systems through the Use of Virtualization.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Self Organized Mobility in Nanosensor Network Based on Particle Swarm Optimization and Coverage Criteria.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center.
Proceedings of the IEEE International Conference on Software Reliability Engineering Workshops, 2008
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack.
Proceedings of the The Second International Conference on Availability, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration.
Int. J. Netw. Secur., 2006
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006
A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006
Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005
Proceedings of the Distributed and Parallel Computing, 2005
Proceedings of the High Performance Computing and Communications, 2005
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Proceedings of the Web and Wireless Geographical Information Systems, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational and Information Science, First International Symposium, 2004
Proceedings of the Artificial Intelligence and Simulation, 2004
Proceedings of the Artificial Intelligence and Simulation, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Information Networking, 2003
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the Human Society and the Internet, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001