Suspicious traffic sampling for intrusion detection in software-defined networks T Ha, S Kim, N An, J Narantuya, C Jeong, JW Kim, H Lim Computer Networks 109, 172-182, 2016 | 89 | 2016 |
Scalable network intrusion detection on virtual SDN environment C Jeong, T Ha, J Narantuya, H Lim, JW Kim 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), 264-265, 2014 | 37 | 2014 |
Method for detecting intrusion in network H Lim, J Kim, J Narantuya, HA Tae-Jin, C Jeong US Patent 9,876,808, 2018 | 7 | 2018 |
MARS: Measurement-based allocation of VM resources for cloud data centers C Jeong, T Ha, J Hwang, H Lim, JW Kim Proceedings of the 2013 workshop on Student workhop, 63-66, 2013 | 6 | 2013 |
Quality-of-Service aware resource allocation for virtual machines C Jeong, T Ha, JW Kim, H Lim 2017 International Conference on Information Networking (ICOIN), 191-193, 2017 | 4 | 2017 |
Power ratio adjustment for multi-packet reception-capable wireless networks W Choi, KLT Tien, C Jeong, H Lim 2015 IEEE International Conference on Communication Workshop (ICCW), 1464-1468, 2015 | | 2015 |
of KIISE C Jeong, S Park, H Lim, JW Kim, HY Kim, SW Kim, SW Kim, W Choi, J Kim, ... 정보과학회지, 2, 2014 | | 2014 |