Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jungchan Na
@inproceedings{DBLP:conf/mue/SohnNL17, author = {Seon{-}Gyoung Sohn and Jungchan Na and Kyung{-}Soo Lim}, editor = {James Jong Hyuk Park and Shu{-}Ching Chen and Kim{-}Kwang Raymond Choo}, title = {Development of Unidirectional Security Gateway Satisfying Security Functional Requirements}, booktitle = {Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2017, Seoul, Korea, 22-24 May 2017}, series = {Lecture Notes in Electrical Engineering}, volume = {448}, pages = {709--714}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5041-1\_113}, doi = {10.1007/978-981-10-5041-1\_113}, timestamp = {Wed, 22 Jul 2020 12:38:11 +0200}, biburl = {https://dblp.org/rec/conf/mue/SohnNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/HeoN16, author = {Youngjun Heo and Jungchan Na}, title = {Development of unidirectional security gateway appliance using intel 82580EB {NIC} interface}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2016, Jeju Island, South Korea, October 19-21, 2016}, pages = {1194--1196}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICTC.2016.7763404}, doi = {10.1109/ICTC.2016.7763404}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ictc/HeoN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SimN14, author = {Jaebum Sim and Jungchan Na}, title = {Secure firmware architecture using virtual hard disks}, booktitle = {10th International Conference on Information Assurance and Security, {IAS} 2014, Okinawa, Japan, November 28-30, 2014}, pages = {66--70}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIAS.2014.7064622}, doi = {10.1109/ISIAS.2014.7064622}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/SimN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/KimN08, author = {Jonghyun Kim and Jungchan Na}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Yun Ji Na}, title = {An Efficient Algorithm for Intrusion Source Identification}, booktitle = {{NCM} 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 2}, pages = {188--190}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/NCM.2008.198}, doi = {10.1109/NCM.2008.198}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/KimN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/RyuN08, author = {Jongho Ryu and Jungchan Na}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Yun Ji Na}, title = {Security Requirement for Cyber Attack Traceback}, booktitle = {{NCM} 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 2}, pages = {653--658}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/NCM.2008.188}, doi = {10.1109/NCM.2008.188}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/RyuN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/KimKN05, author = {Geonlyang Kim and Jinoh Kim and Jungchan Na}, title = {Design and Implementation of Policy Decision Point in Policy-Based Network}, booktitle = {4th Annual {ACIS} International Conference on Computer and Information Science {(ICIS} 2005), 14-16 July 2005, Jeju Island, South Korea}, pages = {534--538}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICIS.2005.46}, doi = {10.1109/ICIS.2005.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/KimKN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciit/KimKNJ04, author = {Geonlyang Kim and Jinoh Kim and Jungchan Na and Jongsoo Jang}, editor = {M. H. Hamza}, title = {Role-based policy distribution techniques in policy-based networks}, booktitle = {{IASTED} International Conference on Communications, Internet, and Information Technology, November 22 - 24, 2004, St. Thomas, {US} Virgin Islands, {USA}}, pages = {103--107}, publisher = {{IASTED/ACTA} Press}, year = {2004}, timestamp = {Thu, 05 Jul 2018 07:27:58 +0200}, biburl = {https://dblp.org/rec/conf/ciit/KimKNJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.