Myong H. Kang
According to our database1,
Myong H. Kang
authored at least 63 papers
between 1992 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Work-in-Progress: A Hybrid Collaborative Multi Agent Decision Making Algorithm With Factored-Value Max-Plus.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
IEEE Embed. Syst. Lett., 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Using Online Planning and Acting to Recover from Cyberattacks on Software-defined Networks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
A Cybersecurity Model for Decision-Making Problems Under Uncertainty Using Game Theory.
Proceedings of the 13th International Conference on Communications, 2020
2019
Building private blockchains over public blockchains (PoP): an attribute-based access control approach.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2017
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing.
IACR Cryptol. ePrint Arch., 2017
2016
Multiple time series fisher periodicity test for the detection of the distributed new shrew attacks.
Proceedings of the International Conference on Communications, 2016
Spectral analysis of low rate of denial of service attacks detection based on fisher and Siegel tests.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2012
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels.
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Eigenvalue characterization of the capacity of discrete memoryless channels with invertible channel matrices.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010
2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
2008
Inf. Secur. Tech. Rep., 2008
2007
J. Data Semant., 2007
An Architecture for Web Services Authentication and Authorization in a Maritime Environment.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
2005
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005
Proceedings of the On the Move to Meaningful Internet Systems 2005: CoopIS, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
A Secure Workflow System for Dynamic Collaboration.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Randomly roving agents for intrusion detection.
Proceedings of the Database and Application Security XV, 2001
2000
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
1999
A Strategy for an MLS Workflow Management System.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
Proceedings of the Advanced Information Systems Engineering, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Proceedings of the 1997 Workshop on New Security Paradigms, 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
1996
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
The Modulated-Input Modulated-Output Model.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
The SINTRA Data Model: Structure and Operations.
Proceedings of the Database Security, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
Using Object Modeling Techniques to Design MLS Data Models.
Proceedings of the Security for Object-Oriented Systems, 1993
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture.
Proceedings of the Database Security, 1993
1992
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System.
Proceedings of the Database Security, 1992