Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Koohong Kang"'
Publikováno v:
IEICE Transactions on Information and Systems. :2706-2709
Autor:
Koohong Kang
Publikováno v:
Journal of the Korea Society of Computer and Information. 21:1-8
Autor:
Jinoh Kim, Koohong Kang
Publikováno v:
International Journal of Security and Its Applications. 9:77-94
Today’s security initiatives have encouraged incorporation of physical security and information security into converged security for greater effectiveness and capabilities. However, efforts for converging security have largely limited to the issues
Autor:
Koohong Kang
Publikováno v:
Journal of the Korea Society of Computer and Information. 20:41-51
Autor:
Koohong Kang
Publikováno v:
Journal of the Korea Society of Computer and Information. 19:47-57
In order to publicly notify the information security (Internet or Cyber) threat level, the security companies have developed the Threat Meters. As the physical security devices are getting more intelligent and can be monitored and managed through net
Autor:
Koohong Kang
Publikováno v:
Journal of Information Processing Systems. 8:739-748
We propose an analytic model to compute the station`s saturated throughput and packet delay performance of the IEEE 802.11 DCF (Distributed Coordination Function) in which frame transmission error rates in the channel are different from each other. O
Autor:
Koohong Kang
Publikováno v:
Journal of the Korea Industrial Information Systems Research. 16:1-11
A lot of works on the throughput analysis of the IEEE 802.11 DCF have been studied since last few years. However, we should predict the throughput of the IEEE 802.11g that we mostly use today because the existing numerical results do not consider exa
Publikováno v:
The KIPS Transactions:PartC. :283-294
Autor:
Koohong Kang
Publikováno v:
The KIPS Transactions:PartC. :687-694
Publikováno v:
The KIPS Transactions:PartC. :19-28
Recently, it has been sharply increased the interests to detect the network traffic anomalies to help protect the computer network from unknown attacks. In this paper, we propose a new anomaly detection scheme using the simple linear regression analy