Jongsoo Jang
According to our database1,
Jongsoo Jang
authored at least 31 papers
between 1997 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Defense Against TCP Flooding Attack.
Proceedings of the SECRYPT 2012, 2012
2009
Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks.
Proceedings of the SECRYPT 2009, 2009
2008
Discovering and integrating distributed manufacturing services with semantic manufacturing capability profiles.
Int. J. Comput. Integr. Manuf., 2008
IEICE Trans. Inf. Syst., 2008
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities.
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Inf. Syst., 2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
2007
Memory-efficient content filtering hardware for high-speed intrusion detection systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007
Proceedings of the Managing Next Generation Networks and Services, 2007
Proceedings of the Agents and Peer-to-Peer Computing, 6th International Workshop, 2007
2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006
Proceedings of the Information Networking, 2006
2005
IXP2400 Network Processor Architecture for IPSEC Application.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005
2004
Proceedings of the Information Networking, 2004
Fast and Strong Control of Congestion-Making Traffic.
Proceedings of the ICETE 2004, 2004
Proceedings of the Computational Science and Its Applications, 2004
Role-based policy distribution techniques in policy-based networks.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004
2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework.
Proceedings of the International Conference on Security and Management, 2003
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
Proceedings of the International Conference on Security and Management, 2003
A Study on Bandwidth Consumption DDoS: Attack Defense.
Proceedings of the International Conference on Security and Management, 2003
Defeating DoS Attacks Using Wavelet Analysis.
Proceedings of the International Conference on Security and Management, 2003
2002
An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation.
Telecommun. Syst., 2002
A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks.
Proceedings of the Information Networking, 2002
Proceedings of the Information Networking, 2002
Proceedings of the Information Networking, 2002
1997
Architecture of Multimedia Service Interworking for Heterogeneous Multi-Carrier ATM Network.
Proceedings of the Intelligence in Services and Networks: Technology for Cooperative Competition, 1997