BibTeX records: Won Hyung Park

download as .bib file

@article{DBLP:journals/wpc/KimLP17,
  author       = {Hyuncheol Kim and
                  Dong Hwi Lee and
                  Won Hyung Park},
  title        = {Special Issue on Mobile Sensor Networks: Advanced Technologies and
                  Their Applications},
  journal      = {Wirel. Pers. Commun.},
  volume       = {94},
  number       = {1},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4102-x},
  doi          = {10.1007/S11277-017-4102-X},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/KimLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ParkA17,
  author       = {Won Hyung Park and
                  Seongjin Ahn},
  title        = {Performance Comparison and Detection Analysis in Snort and Suricata
                  Environment},
  journal      = {Wirel. Pers. Commun.},
  volume       = {94},
  number       = {2},
  pages        = {241--252},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3209-9},
  doi          = {10.1007/S11277-016-3209-9},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ParkA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ParkNC16,
  author       = {Won Hyung Park and
                  Onechul Na and
                  Hangbae Chang},
  title        = {An exploratory research on advanced smart media security design for
                  sustainable intelligence information system},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {11},
  pages        = {6059--6070},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-014-2393-4},
  doi          = {10.1007/S11042-014-2393-4},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ParkNC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeP16,
  author       = {Chi{-}Seok Lee and
                  Won Hyung Park},
  title        = {Enhancing industrial security management system for multimedia environment},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {22},
  pages        = {14597--14615},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2868-y},
  doi          = {10.1007/S11042-015-2868-Y},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ParkL15a,
  author       = {Won Hyung Park and
                  Dong Hwi Lee},
  title        = {Improvement of evidence collection module using live response technology
                  on a windows system},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {16},
  pages        = {6453--6464},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-2098-8},
  doi          = {10.1007/S11042-014-2098-8},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ParkL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ParkSPL15,
  author       = {Kwang Cheol Park and
                  Hoon Shin and
                  Won Hyung Park and
                  Jong In Lim},
  title        = {New detection method and countermeasure of cyber attacks in mix networks},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {16},
  pages        = {6509--6518},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-2127-7},
  doi          = {10.1007/S11042-014-2127-7},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ParkSPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HeoPP15,
  author       = {Geon Il Heo and
                  Yong Jun Park and
                  Won Hyung Park},
  title        = {Vulnerability of information disclosure in data transfer section for
                  constructing a safe smart work infrastructure},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {20},
  pages        = {8831--8847},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-013-1627-1},
  doi          = {10.1007/S11042-013-1627-1},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HeoPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimKPL14,
  author       = {Ae Chan Kim and
                  Seongkon Kim and
                  Won Hyung Park and
                  Dong Hoon Lee},
  title        = {Fraud and financial crime detection model using malware forensics},
  journal      = {Multim. Tools Appl.},
  volume       = {68},
  number       = {2},
  pages        = {479--496},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-013-1410-3},
  doi          = {10.1007/S11042-013-1410-3},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimKPL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimP14,
  author       = {Yong{-}Ho Kim and
                  Won Hyung Park},
  title        = {A study on cyber threat prediction based on intrusion detection event
                  for {APT} attack detection},
  journal      = {Multim. Tools Appl.},
  volume       = {71},
  number       = {2},
  pages        = {685--698},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-012-1275-x},
  doi          = {10.1007/S11042-012-1275-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LimLPK13,
  author       = {Young Hwan Lim and
                  Dong Hwi Lee and
                  Won Hyung Park and
                  Kwang Ho Kook},
  title        = {Detection and Traceback of Illegal Users based on Anonymous Network
                  in BitTorrent Environment},
  journal      = {Wirel. Pers. Commun.},
  volume       = {73},
  number       = {2},
  pages        = {319--328},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11277-013-1240-7},
  doi          = {10.1007/S11277-013-1240-7},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LimLPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisa/KimGPP13,
  author       = {Dae Hyeob Kim and
                  Ji Hoon Gong and
                  Won Hyung Park and
                  Neo Park},
  title        = {Vulnerability of Information Disclosure in Data Transfer Section for
                  Safe Smartwork Infrastructure},
  booktitle    = {International Conference on Information Science and Applications,
                  {ICISA} 2013, Hilton Pattaya Hotel, Pattaya, Thailand, June 24-26,
                  2013},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICISA.2013.6579329},
  doi          = {10.1109/ICISA.2013.6579329},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisa/KimGPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkKKP13,
  author       = {Won Hyung Park and
                  Dae Hyeob Kim and
                  Myung{-}Soo Kim and
                  Neo Park},
  title        = {A Study on Trend and Detection Technology for Cyber Threats in Mobile
                  Environment},
  booktitle    = {2013 International Conference on {IT} Convergence and Security, {ICITCS}
                  2013, Macau, China, December 16-18, 2013},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITCS.2013.6717792},
  doi          = {10.1109/ICITCS.2013.6717792},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkKKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimPL12,
  author       = {Ae Chan Kim and
                  Won Hyung Park and
                  Dong Hoon Lee},
  editor       = {Kuinam J. Kim and
                  Kyung{-}Yong Chung},
  title        = {A Framework for Anomaly Pattern Recognition in Electronic Financial
                  Transaction Using Moving Average Method},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {215},
  pages        = {93--99},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-94-007-5860-5\_12},
  doi          = {10.1007/978-94-007-5860-5\_12},
  timestamp    = {Wed, 10 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimPL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HeoKJCP12,
  author       = {Geon Il Heo and
                  Nam Hun Kim and
                  Ah Ra Jo and
                  Sae In Choi and
                  Won Hyung Park},
  editor       = {Kuinam J. Kim and
                  Kyung{-}Yong Chung},
  title        = {A Study on Traceback of Illegal Users Using Anonymity Technology in
                  BitTorrent},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {215},
  pages        = {169--175},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-94-007-5860-5\_20},
  doi          = {10.1007/978-94-007-5860-5\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HeoKJCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkP12,
  author       = {Neo Park and
                  Won Hyung Park},
  editor       = {Kuinam J. Kim and
                  Kyung{-}Yong Chung},
  title        = {Cyber Threat Prediction Model Using Security Monitoring System Event},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {215},
  pages        = {233--239},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-94-007-5860-5\_27},
  doi          = {10.1007/978-94-007-5860-5\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics