Digital Library[ Search Result ]
Search : "[ author: Jong Soo Jang ]" (6)
Anomaly Detection Method Using Entropy of Network Traffic Distributions
Koo Hong Kang Jin Tae Oh Jong Soo Jang
Vol. 13, No. 3, pp. 283-294, Jun. 2006
10.3745/KIPSTC.2006.13.3.283
Vol. 13, No. 3, pp. 283-294, Jun. 2006
10.3745/KIPSTC.2006.13.3.283
Modeling and Performance Analysis on the Response Capacity against Alert Information in an Intrusion Detection System
Yong Hee Jeon Jung Sook Jang Jong Soo Jang
Vol. 12, No. 6, pp. 855-864, Oct. 2005
10.3745/KIPSTC.2005.12.6.855
Vol. 12, No. 6, pp. 855-864, Oct. 2005
10.3745/KIPSTC.2005.12.6.855
Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure
Jung Sook Jang Yong Hee Jeon Jong Soo Jang
Vol. 12, No. 6, pp. 817-826, Oct. 2005
10.3745/KIPSTC.2005.12.6.817
Vol. 12, No. 6, pp. 817-826, Oct. 2005
10.3745/KIPSTC.2005.12.6.817
A Real-Time Network Traffic Anomaly Detection Scheme Using NetFlow Data
Koo Hong Kang Jong Soo Jang Ki Young Kim
Vol. 12, No. 1, pp. 19-28, Feb. 2005
10.3745/KIPSTC.2005.12.1.19
Vol. 12, No. 1, pp. 19-28, Feb. 2005
10.3745/KIPSTC.2005.12.1.19
The Implementation of Policy Management Tool Based on Network Security Policy Information Model
Geon Lyang Kim Jong Soo Jang Sung Won Sohn
Vol. 9, No. 5, pp. 775-782, Oct. 2002
10.3745/KIPSTC.2002.9.5.775
Vol. 9, No. 5, pp. 775-782, Oct. 2002
10.3745/KIPSTC.2002.9.5.775
Design and Simulation of Policy Based Integrated Server System Capable to Provide Real - time Internet Security Service
Ki Young Kim Gae Il Ahn Jong Soo Jang Sang Ho Lee
Vol. 8, No. 5, pp. 565-572, Oct. 2001
10.3745/KIPSTC.2001.8.5.565
Vol. 8, No. 5, pp. 565-572, Oct. 2001
10.3745/KIPSTC.2001.8.5.565