Minho Park

Orcid: 0000-0003-3033-192X

Affiliations:
  • Soongsil University, School of Electronic Engineering, Seoul, South Korea
  • Seoul National University, School of Electrical Engineering and Computer Science, South Korea (PhD 2010)


According to our database1, Minho Park authored at least 49 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
1
1
5
2
1
3
2
1
1
3
2
2
3
2
1
6
1
2
3
5
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Graph Embedding for Graph Neural Network in Intrusion Detection System.
Proceedings of the International Conference on Information Networking, 2024

Enhanced GraphSAGE for Multi-Class Intrusion Detection.
Proceedings of the International Conference on Information Networking, 2024

2022
Dynamic Network Slice Scaling Assisted by Attention-Based Prediction in 5G Core Network.
IEEE Access, 2022

Economic Denial of Sustainability (EDoS) attack detection by attention on flow-based in Software Defined Network (SDN).
Proceedings of the International Conference on Information Networking, 2022

Optimizing Resource Scaling in Network Slicing.
Proceedings of the International Conference on Information Networking, 2022

Detection of DoH Tunneling using Semi-supervised Learning method.
Proceedings of the International Conference on Information Networking, 2022

2021
R-EDoS: Robust Economic Denial of Sustainability Detection in an SDN-Based Cloud Through Stochastic Recurrent Neural Network.
IEEE Access, 2021

Protection against Flow Table Overflow Attack in Software Defined Networks.
Proceedings of the International Conference on Information Networking, 2021

BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Detecting Malicious Middleboxes In Service Function Chaining.
J. Internet Serv. Inf. Secur., 2020

An efficient defense method for compromised switch and middlebox-bypass attacks in service function chaining.
J. Commun. Networks, 2020

EVHS - Elastic Virtual Honeypot System for SDNFV-Based Networks.
Int. J. Commun. Networks Inf. Secur., 2020

ECSD: Enhanced Compromised Switch Detection in an SDN-Based Cloud Through Multivariate Time-Series Analysis.
IEEE Access, 2020

Solar-CTP: An Enhanced CTP for Solar-Powered Wireless Sensor Networks.
IEEE Access, 2020

Dynamic Economic-Denial-of-Sustainability (EDoS) Detection in SDN-based Cloud.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020

2019
Resource-aware relay selection for inter-cell interference avoidance in 5G heterogeneous network for Internet of Things systems.
Future Gener. Comput. Syst., 2019

Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud.
IEEE Access, 2019

Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function Chaining.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

Dynamic Virtual Network Honeypot.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

An Effective Defense Against SYN Flooding Attack in SDN.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

DAAD: DNS Amplification Attack Defender in SDN.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks.
Proceedings of the 33rd International Conference on Information Networking, 2019

Abnormal SDN switches detection based on chaotic analysis of network traffic.
Proceedings of the 25th Asia-Pacific Conference on Communications, 2019

2018
Real-Time Task Assignment Approach Leveraging Reinforcement Learning with Evolution Strategies for Long-Term Latency Minimization in Fog Computing.
Sensors, 2018

MAEC-X: DDoS prevention leveraging multi-access edge computing.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
Adaptive Beaconing for Effective Inter-Vehicle Collision Avoidance System.
Wirel. Pers. Commun., 2017

Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks.
J. Netw. Comput. Appl., 2017

Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in Infrastructureless Peer-Aware Communications.
IEEE Access, 2017

SDNbox: A portable open-source testbed for SDN study.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Optimizing resource allocation for elastic security VNFs in the SDNFV-enabled cloud computing.
Proceedings of the 2017 International Conference on Information Networking, 2017

2016
Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks.
J. Sensors, 2016

Privacy enhancement using selective encryption scheme in data outsourcing.
Int. J. Distributed Sens. Networks, 2016

A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined Networking.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

A comparison of clustering algorithms for botnet detection based on network flow.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Flow-based consensus partitions for botnet detection.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
Efficient Handover Strategy for Inbound Mobility to LTE Small Cell.
Wirel. Pers. Commun., 2015

A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

A Distributed Self-Organizing Map for DoS attack detection.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Privacy enhancement for data outsourcing.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

A new access mode for femtocells in 5G networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

A feasible method to combat against DDoS attack in SDN network.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Efficient Rekeying Framework for SecureMulticast with Diverse-Subscription-Period Mobile Users.
IEEE Trans. Mob. Comput., 2014

An efficient uplink admission control for ertPS in IEEE 802.16.
Proceedings of the International Conference on Information Networking 2014, 2014

2013
Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks.
Wirel. Pers. Commun., 2013

Key Management for Multiple Multicast Groups in Wireless Networks.
IEEE Trans. Mob. Comput., 2013

Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks.
Comput. Networks, 2013

2011
Anonymous Communication in Ubiquitous Computing Environments.
Wirel. Pers. Commun., 2011

RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications.
IEEE J. Sel. Areas Commun., 2011

2010
A Cell-Based Decentralized Key Management Scheme for Secure Multicast in Mobile Cellular Networks.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010


  Loading...