default search action
Manpyo Hong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j10]Jaehan Jeong, SungMoon Kwon, Man-Pyo Hong, Jin Kwak, Taeshik Shon:
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance. Multim. Tools Appl. 79(23-24): 16077-16091 (2020)
2010 – 2019
- 2017
- [c32]Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt, Manpyo Hong:
Automatic Mitigation of Kernel Rootkits in Cloud Environments. WISA 2017: 137-149 - 2015
- [j9]Sukin Kang, Jonguk Kim, Manpyo Hong:
Button-based method for the prevention of near field communication relay attacks. Int. J. Commun. Syst. 28(10): 1628-1639 (2015) - [j8]Kangseok Kim, Wonjeong Ha, Okkyung Choi, Hongjin Yeh, Jai-Hoon Kim, Manpyo Hong, Taeshik Shon:
An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration. Multim. Tools Appl. 74(5): 1557-1576 (2015) - [c31]Hyejin Cha, Taeshik Shon, Kangseok Kim, Manpyo Hong:
Improving packet header compression with adaptive sliding window size. ICOIN 2015: 541-543 - 2014
- [j7]Sukin Kang, Cheongmin Ji, Manpyo Hong:
Secure Collaborative Key Management for Dynamic Groups in Mobile Networks. J. Appl. Math. 2014: 601625:1-601625:10 (2014) - 2013
- [j6]Piao Yanji, Jonguk Kim, Usman Tariq, Manpyo Hong:
Polynomial-based key management for secure intra-group and inter-group communication. Comput. Math. Appl. 65(9): 1300-1309 (2013) - [j5]Yunlim Ku, Okkyung Choi, Kangseok Kim, Taeshik Shon, Manpyo Hong, Hongjin Yeh, Jai-Hoon Kim:
Two-factor authentication system based on extended OTP mechanism. Int. J. Comput. Math. 90(12): 2515-2529 (2013) - [j4]Sukin Kang, Jonguk Kim, Manpyo Hong:
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices. Pers. Ubiquitous Comput. 17(5): 933-943 (2013) - [c30]Sangheum Lee, Taekkyeun Lee, Ki-Hyung Kim, Manpyo Hong:
A fast and efficient wireless AP connection approach based on NFC Tag. ICTC 2013: 1076-1077 - 2011
- [j3]Eun-Sun Cho, Manpyo Hong:
A structural view definition for RDF data. Comput. Syst. Sci. Eng. 26(1) (2011) - [c29]Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
Fast Content-Based File Type Identification. IFIP Int. Conf. Digital Forensics 2011: 65-75 - [c28]Usman Tariq, Yasir Malik, Bessam Abdulrazak, Manpyo Hong:
Collaborative Peer to Peer Defense Mechanism for DDoS Attacks. ANT/MobiWIS 2011: 157-164 - [i1]Usman Tariq, Yasir Malik, Manpyo Hong:
NACS: non-overlapping AP's caching scheme to reduce handoff in 802.11 wireless LAN. CoRR abs/1112.4775 (2011) - 2010
- [c27]Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
Fast file-type identification. SAC 2010: 1601-1602 - [c26]Jonguk Kim, Sukin Kang, Manpyo Hong, Seong-uck Lee:
EDGAR: Extended Dynamic Group-Key AgReement. SUTC/UMC 2010: 390-395
2000 – 2009
- 2009
- [j2]Usman Tariq, Manpyo Hong:
Light Weight Majority Voting Based Data Accuracy Assurance Scheme for Wireless Sensor Networks Using Quadtree Topology. Intell. Autom. Soft Comput. 15(1): 105-115 (2009) - [j1]Usman Tariq, Manpyo Hong:
Errata on: Light Weight Majority Voting based Data Accuracy Assurance Scheme for Wireless Sensor Networks using Quadtree Topology. Intell. Autom. Soft Comput. 15(4): 697-698 (2009) - [c25]Eun-Sun Cho, Yun-Sam Kim, Manpyo Hong, We-Duke Cho:
Fine-Grained View-Based Access Control for RDF Cloaking. CIT (1) 2009: 336-341 - [c24]Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
On Improving the Accuracy and Performance of Content-Based File Type Identification. ACISP 2009: 44-59 - 2008
- [c23]Soojin Cho, Manpyo Hong:
Proving a Shuffle Using Representations of the Symmetric Group. ICISC 2008: 354-367 - 2007
- [c22]Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong:
Binding Update Authentication Scheme for Mobile IPv6. IAS 2007: 109-114 - 2006
- [c21]Usman Tariq, Manpyo Hong, Kyung-suk Lhee:
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. ADMA 2006: 1025-1036 - [c20]Gunhee Lee, Song-hwa Chae, Inwhan Hwang, Manpyo Hong:
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments. EUC Workshops 2006: 619-628 - 2005
- [c19]Nakhoon Baek, Ku-Jin Kim, Manpyo Hong:
Vehicle Area Segmentation Using Grid-Based Feature Values. CAIP 2005: 464-471 - [c18]Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong:
E-mail Worm Detection Using the Analysis of Behavior. ICDCIT 2005: 348-356 - [c17]GangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee:
A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. ICOIN 2005: 806-813 - [c16]Eun-Sun Cho, Kang-Woo Lee, Manpyo Hong:
Abstraction for Privacy in Context-Aware Environments. MATA 2005: 384-393 - 2004
- [c15]Hyungjoon Lee, Wonil Kim, Manpyo Hong:
Biologically Inspired Computer Virus Detection System. BioADIT 2004: 153-165 - [c14]Cholmin Kim, Wonil Kim, Manpyo Hong:
Effective Detector Set Generation and Evolution for Artificial Immune System. International Conference on Computational Science 2004: 491-498 - [c13]Hyungjoon Lee, Wonil Kim, Manpyo Hong:
Artificial Immune System against Viral Attack. International Conference on Computational Science 2004: 499-506 - [c12]Soon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim:
A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. ICCSA (4) 2004: 611-616 - [c11]Heeran Lim, Manpyo Hong:
Effective Packet Marking Approach to Defend against DDoS Attack. ICCSA (4) 2004: 708-716 - [c10]Cholmin Kim, Soung-uck Lee, Manpyo Hong:
Macroscopic Treatment to Polymorphic E-mail Based Viruses. ICCSA (3) 2004: 867-876 - 2001
- [c9]Eun-Sun Cho, Sunho Hong, Sechang Oh, Hongjin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park:
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. ACISP 2001: 177-189 - 2000
- [c8]Kyuock Lee, Youngsun Weon, Manpyo Hong:
Multiple Pipelined Hash Joins Using Synchronization of Page Execution Time. PDPTA 2000 - [c7]Kyuock Lee, Youngsun Weon, Manpyo Hong:
Multiple Pipelined Hash Joins Using Synchronization of Page Execution Time. PDPTA 2000
1990 – 1999
- 1999
- [c6]Hongjin Yeh, Kyubum Wee, Manpyo Hong:
Optimal Scheduling Algorithms in WDM Optical Passive Star Networks. IPPS/SPDP Workshops 1999: 887-896 - [c5]Youngho Park, Manpyo Hong, Yonghwa Lee, Kyubum Wee, Hongjin Yeh:
Optimal Transmission Scheduling for All-to-All Broadcast in WDM Optical Passive Star Networks. PDPTA 1999: 2300-2306 - 1997
- [c4]Dong-Soo Han, Manpyo Hong:
Performance Predictor for HPF Compilers. ICPADS 1997: 302-307 - 1996
- [c3]Do Park, Jaehong Shim, Kyunghee Choi, K. Chung, Dongyoon Kim, Seungkyu Park, Manpyo Hong:
A Real-Time Micro Kernel Implemented on Transputer. PDPTA 1996: 1106-1117 - [c2]Kyongok Yun, Kihyun Song, Kyunghee Choi, Gihyun Jung, Seungkyu Park, Manpyo Hong, Dugkyoo Choi:
A Heuristic Scheduling Algorithm of Imprecise Multiprocessor System with O/l Constraint. RTCSA 1996: 307-313 - 1995
- [c1]In-Guk Kim, Kyung-Hee Choi, Seung-Kyu Park, Dong-Yoon Kim, Man-Pyo Hong:
Real-time scheduling of tasks that contain the external blocking intervals. RTCSA 1995: 54-59
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint