Tai-Myung Chung

Orcid: 0000-0002-7687-8114

According to our database1, Tai-Myung Chung authored at least 171 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mood Disorder Severity and Subtype Classification Using Multimodal Deep Neural Network Models.
Sensors, January, 2024

Feature Distribution-Based Medical Data Augmentation: Enhancing Mood Disorder Classification.
IEEE Access, 2024

FedUV: Uniformity and Variance for Heterogeneous Federated Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
WM-STGCN: A Novel Spatiotemporal Modeling Method for Parkinsonian Gait Recognition.
Sensors, 2023

Stacking Ensembles-based Approach for Pattern Diagnosis of Tabular Data.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Suicidal Tendency and Depression Diagnosing Medical Agent Using fNIRS and VFT.
Proceedings of the IEEE International Conference on Agents, 2023

Development of a Handwriting Drawings Assessment System for Early Parkinson's Disease Identification with Deep Learning Methods.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023

Personalized Stress Detection System Using Physiological Data from Wearable Sensors.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023

A Digital Therapeutics System for the Diagnosis and Management of Depression: Work in Progress.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023

2022
Explanation of HRV Features for Detecting Atrial Fibrillation.
SN Comput. Sci., 2022

Open problems in medical federated learning.
Int. J. Web Inf. Syst., 2022

FedCC: Robust Federated Learning against Model Poisoning Attacks.
CoRR, 2022

An Improved YOLO V5 Model for Pulmonary Nodule Detection with Synthetic Data Generated by GAN.
Proceedings of the IEEE Smartworld, 2022

Classical music information generating system using AI Video Classification.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Optimal transfer-interval frequency to minimize data loss in BLE network for healthcare service.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Security and Privacy Issues and Solutions in Federated Learning for Digital Healthcare.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022

2021
Synthetic Data Generation System for AI-Based Diabetic Foot Diagnosis.
SN Comput. Sci., 2021

A novel approach to diagnose ADHD using virtual reality.
Int. J. Web Inf. Syst., 2021

Compare Where It Matters: Using Layer-Wise Regularization To Improve Federated Learning on Heterogeneous Data.
CoRR, 2021

ABC-FL: Anomalous and Benign client Classification in Federated Learning.
CoRR, 2021

Personalized Federated Learning with Clustering: Non-IID Heart Rate Variability Data Application.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

Federated Learning: Issues in Medical Application.
Proceedings of the Future Data and Security Engineering - 8th International Conference, 2021

Innovative Way of Detecting Atrial Fibrillation Based on HRV Features Using AI-Techniques.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2021

A Novel Approach to Detect and Monitor COVID-19 Infection Using Transfer Learning Concept in AI.
Proceedings of the Advances in Human Factors and Ergonomics in Healthcare and Medical Devices, 2021

2020
Boundary-RRT* Algorithm for Drone Collision Avoidance and Interleaved Path Re-planning.
J. Inf. Process. Syst., 2020

Lightweight Convolutional Neural Network Based Intrusion Detection System.
J. Commun., 2020

A Novel Approach to Diagnose ADHD Using Virtual Reality.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020

Malicious-Traffic Classification Using Deep Learning with Packet Bytes and Arrival Time.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020

A Synthetic Data Generation Model for Diabetic Foot Treatment.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2020

2019
Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions.
J. Inf. Process. Syst., 2019

Mathematical Modeling of the Scalable LISP-deployed Software-Defined Wireless Network.
J. Commun., 2019

Profiling-Based Classification Algorithms for Security Applications in Internet of Things.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

An efficient MSD protection and authentication scheme for automotive ICT based emergency call system.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

A Method to Enhance the Security Capability of Python IDE.
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019

2018
A novel architecture of Proxy-LMA mobility management scheme for software-based smart factory networking.
Int. J. Commun. Syst., 2018

The Scalable LISP-Deployed Software-Defined Wireless Network (LISP-SDWN) for a Next Generation Wireless Network.
IEEE Access, 2018

2017
Design and Performance Analysis of Sensor Proxy-AAA Authentication Scheme Based on Fast Handover and Forwarding Mode for IP-based Internet of Things.
EAI Endorsed Trans. Mob. Commun. Appl., 2017

Leveraging Software-Defined Wireless Network (SDWN) by Locator/Identifier Split Scheme for Mobility Management.
J. Commun., 2017

Design of the Central LISP Management System for the Software-Defined Wireless Network (SDWN).
Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, 2017

ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a machine learning approach.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure Network.
Proceedings of the Information Science and Applications 2017, 2017

2016
Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call.
IEICE Trans. Inf. Syst., 2016

Method of Detecting Malware Through Analysis of Opcodes Frequency with Machine Learning Technique.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

A Study of Malicious Code Classification System Using MinHash in Network Quarantine Using SDN.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Applying PE-Miner Framework to Software Defined Network Quarantine.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
Dynamic binary analyzer for scanning vulnerabilities with taint analysis.
Multim. Tools Appl., 2015

Study on sensitive information leakage vulnerability modeling.
Kybernetes, 2015

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology.
KSII Trans. Internet Inf. Syst., 2015

HARMS-based Service Discovery Protocol using Address-DNS.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

The Design of Log Analysis Mechanism in SDN Quarantined Network System.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Enhancing PIN Input for Preventing Eavesdropping in BLE Legacy Pairing.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

A Study on the Defense MITM with Message Authentication in WLAN Environments.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Dangerous Wi-Fi access point: attacks to benign smartphone applications.
Pers. Ubiquitous Comput., 2014

Eliminating Duplicated Paths to Reduce Computational Cost of Rule Generation by Using SDN.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

The Multi-level Security for the Android OS.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

A Study of Reducing Resource Waste for Mobile Grid with Software Defined Network.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

Design of Industrial Firewall System Based on Multiple Access Control Filter.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

Abnormal Behavior Detection Technique Based on Big Data.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols.
IEEE Trans. Ind. Electron., 2013

Applying Different Cryptographic Algorithms for Mobile Cloud Computing.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

The Methodology for Hardening SCADA Security Using Countermeasure Ordering.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A Framework of Static Analyzer for Taint Analysis of Binary Executable File.
Proceedings of the Information Technology Convergence, 2013

Attribute Relationship Evaluation Methodology for Big Data Security.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

A Study on Low-Rate DDoS Attacks in Real Networks.
Proceedings of the International Conference on Information Science and Applications, 2013

Vulnerability of the Smartphone Applications to Connect with Compromised Access Point.
Proceedings of the International Conference on Information Science and Applications, 2013

A Remote Control Architecture for Thin-Client in Mobile Cloud Computing.
Proceedings of the International Conference on Information Science and Applications, 2013

Big Data Security Hardening Methodology Using Attributes Relationship.
Proceedings of the International Conference on Information Science and Applications, 2013

Applying Scheduling Algorithms with QoS in the Cloud Computing.
Proceedings of the International Conference on Information Science and Applications, 2013

A Framework for Dynamic Taint Analysis of Binary Executable File.
Proceedings of the International Conference on Information Science and Applications, 2013

The Permission-Based Malicious Behaviors Monitoring Model for the Android OS.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Implementation of Enhanced Android SPICE Protocol for Mobile Cloud.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2012
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Network-based Executable File Extraction and Analysis for Malware Detection.
Proceedings of the SECRYPT 2012, 2012

The clusterhead chaining scheme considering scalability of the wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

The Architecture of User-End Client for Mobile Clout Service.
Proceedings of the Convergence and Hybrid Information Technology, 2012

Jump Oriented Programming on Windows Platform (on the x86).
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

A study on optimization of security function for reducing vulnerabilities in SCADA.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Cyber military strategy for cyberspace superiority in cyber warfare.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance.
Wirel. Commun. Mob. Comput., 2011

Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure.
IEEE Trans. Veh. Technol., 2011

An Efficient Hash-Based Load Balancing Scheme to Support Parallel NIDS.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

A Survey on Privacy Problems and Solutions for VANET Based on Network Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
Cost analysis of IP mobility management protocols for consumer mobile devices.
IEEE Trans. Consumer Electron., 2010

Using Correspondent Information for Route Optimization Scheme on Proxy Mobile IPv6.
J. Networks, 2010

Adaptive Authentication And Registration Key Management Scheme Based On AAA Architecture.
Intell. Autom. Soft Comput., 2010

How much do we gain by introducing route optimization in Proxy Mobile IPv6 networks?
Ann. des Télécommunications, 2010

A study new challenge for billing system in converged service platform.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Diameter-based AAA architecture to support small AAA client.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

A Light-Weighted Misused Key Detection in Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2010

SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs.
Proceedings of the Computational Science and Its Applications, 2010

2009
Route Optimization in Nested NEMO: Classification, Evaluation, and Analysis from NEMO Fringe Stub Perspective.
IEEE Trans. Mob. Comput., 2009

A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Telecommun. Syst., 2009

Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments.
Comput. J., 2009

A Study on Access Control Model for Context-Aware Workflow.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

The Bias Routing Tree Avoiding Technique for Hierarchical Routing Protocol over 6LoWPAN.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Secure Fast Handover Scheme of Proxy Mobile IPv6.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Enhanced Light Weight Route Optimization in Proxy Mobile IPv6.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2009

Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment.
Proceedings of the Computational Science and Its Applications, 2009

A Performance Analysis on Route Optimization for Proxy Mobile IPv6.
Proceedings of IEEE International Conference on Communications, 2009

Eperfi: Design and Implementation of End-to-End Network Performance Measurement and Diagnosis System for High-Speed Networks.
Proceedings of the Communication and Networking, 2009

Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
A comparative signaling cost analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Hybrid PMIPv6 indication mechanism for interaction between MIPv6 and PMIPv6.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Performance Analysis of Route Optimization on Proxy Mobile IPv6.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

PMIPv6 Route Optimization Mechanism Using the Routing Table of MAG.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

DTPD: Data Transfer Tool Performance Diagnosis System in High Speed Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Group Key Locking Scheme in Mobile Multicast Environments with Modified MLDs.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMM.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Performance evaluation of distributed multiple home agents with HAHA protocol.
Int. J. Netw. Manag., 2007

A Novel Inter-LMD Handoff Mechanism for Network-Based Localized Mobility Management.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

The Concentric-Cluster Routing Scheme Adapted to Large-scale Sensor Networks.
Proceedings of the MoMM'2007, 2007

Local Authentication Scheme Based on AAA in Mobile IPv6 Networks.
Proceedings of the Advances in Multimedia Modeling, 2007

PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Design and Implementation of Context-Aware Security Management System for Ubiquitous Computing Environment.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

MANET ID : Improvement on Group Communications and ZRP.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

A Scheme to reduce the handoff latency using mSCTP in Fast Mobile IPv6.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

An Adaptive Inter-Mobility Supports Scheme for NetLMM.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

An Optimal Access Points Allocation Scheme Based on Genetic Algorithm.
Proceedings of the Future Generation Communication and Networking, 2007

Context-Aware Security Management System for Pervasive Computing Environment.
Proceedings of the Modeling and Using Context, 2007

Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment.
Proceedings of the Managing Next Generation Networks and Services, 2007

Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
PKG-MIB: Design and Implementation of Private-mib for Package-based Linux Systems.
J. Convergence Inf. Technol., 2006

An Empirical Study of Quality and Cost Based Security Engineering.
Proceedings of the Information Security Practice and Experience, 2006

Session Key Forwarding Scheme Based on AAA Architecture in Wireless Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Modeling Active Cyber Attack for Network Vulnerability Assessment.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments.
Proceedings of the Information Networking, 2006

An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment.
Proceedings of the Computational Science and Its Applications, 2006

Comparative Analysis of IPv6 VPN Transition in NEMO Environments.
Proceedings of the Computational Science and Its Applications, 2006

An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network.
Proceedings of the Computational Science and Its Applications, 2006

A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems.
Proceedings of the Computational Science and Its Applications, 2006

Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management.
Proceedings of the Computational Science and Its Applications, 2006

Context-Role Based Access Control for Context-Aware Application.
Proceedings of the High Performance Computing and Communications, 2006

Enhanced SCORM Sequencing Rule for e-Learning System.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006

2005
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label.
J. Supercomput., 2005

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation.
J. Inf. Process. Syst., 2005

A Model and Evaluation of Route Optimization in Nested NEMO Environment.
IEICE Trans. Commun., 2005

Adaptive Bandwidth Control Using Fuzzy Inference in Policy-Based Network Management.
Proceedings of the Information Networking, 2005

Policy Based Handoff in MIPv6 Networks.
Proceedings of the Computational Science and Its Applications, 2005

New Binding Update Method using GDMHA in Hierarchical Mobile IPv6.
Proceedings of the Computational Science and Its Applications, 2005

An Analysis and Evaluation of Policy-Based Network Management Approaches.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Distributing Multiple Home Agents in MIPv6 Networks.
Proceedings of the High Performance Computing and Communications, 2005

2004
Active security management based on Secure Zone Cooperation.
Future Gener. Comput. Syst., 2004

Service Negotiation Model for Response Time in Distributed Networks.
Comput. Artif. Intell., 2004

SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks.
Proceedings of the Information Networking, 2004

A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments.
Proceedings of the Computational Science and Its Applications, 2004

A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments.
Proceedings of the Computational Science and Its Applications, 2004

Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain.
Proceedings of the Computational Science and Its Applications, 2004

A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models.
Proceedings of the Computational Science and Its Applications, 2004

The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations.
Proceedings of the Computational Science and Its Applications, 2004

Specifying Policies for Service Negotiations of Response Time.
Proceedings of the Computational Science, 2004

2003
A Policy Propagation Model Using Mobile Agents in Large-Scale Distributed Network Environments.
Proceedings of the Service-Oriented Computing, 2003

Design of Secure Monitor in the Secure Zone Cooperation.
Proceedings of the Computational Science and Its Applications, 2003

The Design of XML-Based Internet Security Integrated System Architecture.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
Design of Network Security Control System for Cooperative Intrusion Detection.
Proceedings of the Information Networking, 2002

Interval Weighted Load Balancing Method for Multiple Application Gateway Firewalls.
Proceedings of the Computational Science - ICCS 2002, 2002

Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

2001
Generation of pseudo random processes with given marginal distribution and autocorrelation function.
Int. J. Comput. Math., 2001

Efficient Random Process Generation for Reliable Simulation of Complex Systems.
Proceedings of the Computational Science - ICCS 2001, 2001

2000
Policy-based hybrid management architecture for IP-based VPN.
Proceedings of the Networked Planet: Management Beyond 2000, 2000


  Loading...