Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Won Hyung Park
@article{DBLP:journals/wpc/KimLP17, author = {Hyuncheol Kim and Dong Hwi Lee and Won Hyung Park}, title = {Special Issue on Mobile Sensor Networks: Advanced Technologies and Their Applications}, journal = {Wirel. Pers. Commun.}, volume = {94}, number = {1}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4102-x}, doi = {10.1007/S11277-017-4102-X}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/KimLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ParkA17, author = {Won Hyung Park and Seongjin Ahn}, title = {Performance Comparison and Detection Analysis in Snort and Suricata Environment}, journal = {Wirel. Pers. Commun.}, volume = {94}, number = {2}, pages = {241--252}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3209-9}, doi = {10.1007/S11277-016-3209-9}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ParkA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ParkNC16, author = {Won Hyung Park and Onechul Na and Hangbae Chang}, title = {An exploratory research on advanced smart media security design for sustainable intelligence information system}, journal = {Multim. Tools Appl.}, volume = {75}, number = {11}, pages = {6059--6070}, year = {2016}, url = {https://doi.org/10.1007/s11042-014-2393-4}, doi = {10.1007/S11042-014-2393-4}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ParkNC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeP16, author = {Chi{-}Seok Lee and Won Hyung Park}, title = {Enhancing industrial security management system for multimedia environment}, journal = {Multim. Tools Appl.}, volume = {75}, number = {22}, pages = {14597--14615}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2868-y}, doi = {10.1007/S11042-015-2868-Y}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ParkL15a, author = {Won Hyung Park and Dong Hwi Lee}, title = {Improvement of evidence collection module using live response technology on a windows system}, journal = {Multim. Tools Appl.}, volume = {74}, number = {16}, pages = {6453--6464}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-2098-8}, doi = {10.1007/S11042-014-2098-8}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ParkL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ParkSPL15, author = {Kwang Cheol Park and Hoon Shin and Won Hyung Park and Jong In Lim}, title = {New detection method and countermeasure of cyber attacks in mix networks}, journal = {Multim. Tools Appl.}, volume = {74}, number = {16}, pages = {6509--6518}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-2127-7}, doi = {10.1007/S11042-014-2127-7}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/ParkSPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HeoPP15, author = {Geon Il Heo and Yong Jun Park and Won Hyung Park}, title = {Vulnerability of information disclosure in data transfer section for constructing a safe smart work infrastructure}, journal = {Multim. Tools Appl.}, volume = {74}, number = {20}, pages = {8831--8847}, year = {2015}, url = {https://doi.org/10.1007/s11042-013-1627-1}, doi = {10.1007/S11042-013-1627-1}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HeoPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimKPL14, author = {Ae Chan Kim and Seongkon Kim and Won Hyung Park and Dong Hoon Lee}, title = {Fraud and financial crime detection model using malware forensics}, journal = {Multim. Tools Appl.}, volume = {68}, number = {2}, pages = {479--496}, year = {2014}, url = {https://doi.org/10.1007/s11042-013-1410-3}, doi = {10.1007/S11042-013-1410-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimKPL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimP14, author = {Yong{-}Ho Kim and Won Hyung Park}, title = {A study on cyber threat prediction based on intrusion detection event for {APT} attack detection}, journal = {Multim. Tools Appl.}, volume = {71}, number = {2}, pages = {685--698}, year = {2014}, url = {https://doi.org/10.1007/s11042-012-1275-x}, doi = {10.1007/S11042-012-1275-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LimLPK13, author = {Young Hwan Lim and Dong Hwi Lee and Won Hyung Park and Kwang Ho Kook}, title = {Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment}, journal = {Wirel. Pers. Commun.}, volume = {73}, number = {2}, pages = {319--328}, year = {2013}, url = {https://doi.org/10.1007/s11277-013-1240-7}, doi = {10.1007/S11277-013-1240-7}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LimLPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisa/KimGPP13, author = {Dae Hyeob Kim and Ji Hoon Gong and Won Hyung Park and Neo Park}, title = {Vulnerability of Information Disclosure in Data Transfer Section for Safe Smartwork Infrastructure}, booktitle = {International Conference on Information Science and Applications, {ICISA} 2013, Hilton Pattaya Hotel, Pattaya, Thailand, June 24-26, 2013}, pages = {1--3}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.ieeecomputersociety.org/10.1109/ICISA.2013.6579329}, doi = {10.1109/ICISA.2013.6579329}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisa/KimGPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkKKP13, author = {Won Hyung Park and Dae Hyeob Kim and Myung{-}Soo Kim and Neo Park}, title = {A Study on Trend and Detection Technology for Cyber Threats in Mobile Environment}, booktitle = {2013 International Conference on {IT} Convergence and Security, {ICITCS} 2013, Macau, China, December 16-18, 2013}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICITCS.2013.6717792}, doi = {10.1109/ICITCS.2013.6717792}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ParkKKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimPL12, author = {Ae Chan Kim and Won Hyung Park and Dong Hoon Lee}, editor = {Kuinam J. Kim and Kyung{-}Yong Chung}, title = {A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012}, series = {Lecture Notes in Electrical Engineering}, volume = {215}, pages = {93--99}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-94-007-5860-5\_12}, doi = {10.1007/978-94-007-5860-5\_12}, timestamp = {Wed, 10 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KimPL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HeoKJCP12, author = {Geon Il Heo and Nam Hun Kim and Ah Ra Jo and Sae In Choi and Won Hyung Park}, editor = {Kuinam J. Kim and Kyung{-}Yong Chung}, title = {A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012}, series = {Lecture Notes in Electrical Engineering}, volume = {215}, pages = {169--175}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-94-007-5860-5\_20}, doi = {10.1007/978-94-007-5860-5\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HeoKJCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkP12, author = {Neo Park and Won Hyung Park}, editor = {Kuinam J. Kim and Kyung{-}Yong Chung}, title = {Cyber Threat Prediction Model Using Security Monitoring System Event}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012}, series = {Lecture Notes in Electrical Engineering}, volume = {215}, pages = {233--239}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-94-007-5860-5\_27}, doi = {10.1007/978-94-007-5860-5\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ParkP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.