Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Jong Soo Jang"'
Publikováno v:
Journal of Biomedical Research. 14:18-22
The objective of this experiment was to assess the relationship between electrical resistance of the vaginal mucosa and plasma progesterone for optimal mating time in the bitch. Eight mature beagle bitches were examined, and we observed eight times o
Publikováno v:
Journal of the Korean Ceramic Society. 46:700-707
Publikováno v:
The KIPS Transactions:PartC. :283-294
Publikováno v:
The KIPS Transactions:PartC. :855-864
Summary In this paper, we propose an intrusion detection system(IDS) architecture which can detect and respond against the generation of abnormal traffic such as malicious code and Internet worms. We model the system, design and implement a simulator
Publikováno v:
The KIPS Transactions:PartC. :817-826
BcN(Broadband convergence Network) is being developed in order to support a variety of network applications, with enhanced capabilities of QoS(Quality of Service) provisioning and security, and IPv6. In a high-speed network environment such as BcN, i
Publikováno v:
The KIPS Transactions:PartC. :19-28
Recently, it has been sharply increased the interests to detect the network traffic anomalies to help protect the computer network from unknown attacks. In this paper, we propose a new anomaly detection scheme using the simple linear regression analy
Publikováno v:
The KIPS Transactions:PartC. :727-738
Much research efforts are being exerted for the study of intrusion detection system(IDS). However little work has been for the communication medels and performance eveluation of the IDS. Here we present a communication framework for doing hybrid intr
Publikováno v:
The KIPS Transactions:PartC. :775-782
This paper introduces Policy Management Tool which was implemented based on Policy Information Model in network suity system. Network security system consists of policy terror managing and sending policies to keep a specific domain from attackers and
Publikováno v:
The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
Conventionally, a main interest in a computer security has been focused on protection of a computer system itself, i.e., protection against viruses or system attacks such as denial of service attacks (DoS attack), or communication encryption used for
Publikováno v:
Information Networking: Wired Communications and Management ISBN: 9783540442561
ICOIN (1)
ICOIN (1)
In the rate-based congestion control, three distinct schemes - Explicit Forward Congestion Indication (EFCI), Backward Explicit Congestion Notification (BECN), and Explicit rate based scheme - are mixed within the ATM Forum. With respect to implement
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::151a424a94c7f0aa6bff4fc8a87570d6
https://doi.org/10.1007/3-540-45803-4_2
https://doi.org/10.1007/3-540-45803-4_2