-
1مؤتمر
المؤلفون: Jinoh Kim, Koohong Kang, JungChan Na, Ikkyun Kim, Kiyoung Kim, Jongsoo Jang, Sungwon Sohn
المصدر: 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732) Communications Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference on. 3:1038-1041 Vol.3 2003
Relation: 9th Asia-Pacific Conference on Communications
-
2مؤتمر
المؤلفون: Koohong Kang, Yongseok Yoon, Cheeha Kim
المصدر: Proceedings of GLOBECOM '95 GLOBECOM '95 Global Telecommunications Conference, 1995. GLOBECOM '95., IEEE. 1:422-426 vol.1 1995
Relation: Proceedings of GLOBECOM '95
-
3
المؤلفون: Daesung Moon, Koohong Kang, Tae-Keun Park
المصدر: IEICE Transactions on Information and Systems. :2706-2709
مصطلحات موضوعية: Scheme (programming language), Computer science, business.industry, 02 engineering and technology, 021001 nanoscience & nanotechnology, Connection (mathematics), Artificial Intelligence, Hardware and Architecture, Scalability, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Moving target defense, Computer Vision and Pattern Recognition, Electrical and Electronic Engineering, 0210 nano-technology, business, computer, Software, computer.programming_language, Computer network
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::2ddaec280ed2294c2bf1bcf156a3133d
https://doi.org/10.1587/transinf.2017icl0001 -
4
المؤلفون: Koohong Kang
المصدر: Journal of the Korea Society of Computer and Information. 21:1-8
مصطلحات موضوعية: Flood myth, Computer science, business.industry, Web page, NetFlow, Internet security, business, Computer security, computer.software_genre, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::c70e115efc86f76acb571986fb089fb9
https://doi.org/10.9708/jksci.2016.21.7.001 -
5
المؤلفون: Jinoh Kim, Koohong Kang
المصدر: International Journal of Security and Its Applications. 9:77-94
مصطلحات موضوعية: Engineering, Cloud computing security, General Computer Science, business.industry, Computer security model, Computer security, computer.software_genre, Security testing, Security information and event management, Security service, Security through obscurity, Security convergence, business, computer, Physical security
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::c011ef2c1f5c34cce2bf9833f79139c2
https://doi.org/10.14257/ijsia.2015.9.9.08 -
6
المؤلفون: Koohong Kang
المصدر: Journal of the Korea Society of Computer and Information. 20:41-51
مصطلحات موضوعية: Computer science, Brute force, Stepping stone, Computer graphics (images), Server, Self-diagnosis
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::324e98bbbb8e8da600daafca282cd6c4
https://doi.org/10.9708/jksci.2015.20.5.041 -
7
المؤلفون: Koohong Kang
المصدر: Journal of the Korea Society of Computer and Information. 19:47-57
مصطلحات موضوعية: Engineering, Cloud computing security, business.industry, Computer security model, Computer security, computer.software_genre, Security testing, Security information and event management, Security through obscurity, Security convergence, business, computer, Countermeasure (computer), Physical security
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::e84fe206d641571bee76b19f90902cde
https://doi.org/10.9708/jksci.2014.19.7.047 -
8
المؤلفون: Koohong Kang
المصدر: Journal of Information Processing Systems. 8:739-748
مصطلحات موضوعية: Network packet, Computer science, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Real-time computing, Frame (networking), Throughput, Network allocation vector, Distributed coordination function, IEEE 802.11, Sensitivity (control systems), Algorithm, Software, Information Systems, Communication channel
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::3718a131948be12a9a32602d8625977f
https://doi.org/10.3745/jips.2012.8.4.739 -
9
المؤلفون: Koohong Kang
المصدر: Journal of the Korea Industrial Information Systems Research. 16:1-11
مصطلحات موضوعية: Engineering, IEEE 802, File Transfer Protocol, SIMPLE (military communications protocol), business.industry, Orthogonal frequency-division multiplexing, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Physical layer, IEEE 802.11b-1999, Computer engineering, IEEE 802.11e-2005, business, Throughput (business), Computer network
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::ef82373292dda67138e2acec6087785c
https://doi.org/10.9723/jksiis.2011.16.2.001 -
10
المؤلفون: Jong Soo Jang, Jin Tae Oh, Koohong Kang
المصدر: The KIPS Transactions:PartC. :283-294
مصطلحات موضوعية: Network security, business.industry, Computer science, Entropy (information theory), Anomaly detection, Intrusion detection system, Statistical physics, business
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::07dc12c5658cb47078edc9313f80ef39
https://doi.org/10.3745/kipstc.2006.13c.3.283