default search action
Jungsuk Song
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Jung-suk Song 0001 (aka: Jungsuk Song 0001) — Korea Institute of Science and Technology Information (KISTI), Daejeon
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2017
- [j8]Mansik Kim, Kyung-Soo Lim, Jungsuk Song, Moon-Seog Jun:
An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment. Symmetry 9(8): 143 (2017) - 2013
- [j7]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao:
Toward a more practical unsupervised anomaly detection system. Inf. Sci. 231: 4-14 (2013) - 2011
- [j6]Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:
O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 245-254 (2011) - [j5]Hyung Chan Kim, Tatsunori Orii, Katsunari Yoshioka, Daisuke Inoue, Jungsuk Song, Masashi Eto, Junji Shikata, Tsutomu Matsumoto, Koji Nakao:
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation. IEICE Trans. Inf. Syst. 94-D(9): 1778-1791 (2011) - [j4]Junji Nakazato, Jungsuk Song, Masashi Eto, Daisuke Inoue, Koji Nakao:
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads. IEICE Trans. Inf. Syst. 94-D(11): 2150-2158 (2011) - 2010
- [j3]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao:
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data. IEICE Trans. Inf. Syst. 93-D(9): 2544-2554 (2010) - 2009
- [j2]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon:
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM. IEICE Trans. Commun. 92-B(6): 1981-1990 (2009) - 2008
- [j1]Jungsuk Song, Kenji Ohira, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon:
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System. IEICE Trans. Inf. Syst. 91-D(5): 1282-1291 (2008)
Conference and Workshop Papers
- 2020
- [c15]Shaoning Pang, Tao Ban, Youki Kadobayashi, Jungsuk Song, Kaizhu Huang, Geongsen Poh, Iqbal Gondal, Kitsuchart Pasupa, Fadi A. Aloul:
CDMC'19 - The 10th International Cybersecurity Data Mining Competition. ICONIP (2) 2020: 235-245 - 2011
- [c14]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao:
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. BADGERS@EuroSys 2011: 29-36 - [c13]Masashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao:
nicter: a large-scale network incident analysis system: case studies for understanding threat landscape. BADGERS@EuroSys 2011: 37-45 - [c12]Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao:
Correlation Analysis between Spamming Botnets and Malware Infected Hosts. SAINT 2011: 372-375 - 2010
- [c11]Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
Working Towards a Primary Binary Analysis System. Security and Management 2010: 459-465 - [c10]Jungsuk Song, Masashi Eto, Hyung Chan Kim, Daisuke Inoue, Koji Nakao:
A Heuristic-Based Feature Selection Method for Clustering Spam Emails. ICONIP (1) 2010: 290-297 - [c9]Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers. SAINT 2010: 257-260 - [c8]Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
How to Locate a Target Binary Process and Its Derivatives in System Emulator. SAINT 2010: 273-276 - 2009
- [c7]Jungsuk Song, Daisuke Inoue, Masashi Eto, Mio Suzuki, Satoshi Hayashi, Koji Nakao:
A Methodology for Analyzing Overall Flow of Spam-Based Attacks. ICONIP (2) 2009: 556-564 - 2008
- [c6]Jungsuk Song, Hiroki Takakura, Yongjin Kwon:
A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. SAINT 2008: 55-61 - 2007
- [c5]Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon:
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. ASIAN 2007: 247-253 - [c4]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon:
A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System. DASFAA 2007: 140-151 - 2006
- [c3]Jong Hyuk Park, Jungsuk Song, Sangjin Lee, Byoung-Soo Koh, In-Hwa Hong:
User Centric Intelligent IPMPS in Ubi-Home. ICCSA (4) 2006: 245-254 - [c2]Jong Hyuk Park, Jungsuk Song, Byoung-Soo Koh, Deok-Gyu Lee, Byoung-Ha Park:
A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment. ICHIT 2006: 395-403 - 2004
- [c1]Jungsuk Song, Woosaeng Kim:
Extensible Index Technique for Storing and Retrieving XML Documents. CIT 2004: 280-287
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint