Myung-Sup Kim
Myung-Sup Kim
Professor at Korea University
Verified email at - Homepage
Cited by
Cited by
A flow-based method for abnormal network traffic detection
MS Kim, HJ Kong, SC Hong, SH Chung, JW Hong
2004 IEEE/IFIP network operations and management symposium (IEEE Cat. No …, 2004
Towards automated application signature generation for traffic identification
BC Park, YJ Won, MS Kim, JW Hong
NOMS 2008-2008 IEEE Network Operations and Management Symposium, 160-167, 2008
Traffic flooding attack detection with SNMP MIB using SVM
J Yu, H Lee, MS Kim, D Park
Computer Communications 31 (17), 4212-4219, 2008
A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
H Hasanova, U Baek, M Shin, K Cho, MS Kim
International Journal of Network Management 29 (2), e2060, 2019
Application‐level traffic monitoring and an analysis on IP networks
MS Kim, YJ Won, JWK Hong
ETRI journal 27 (1), 22-42, 2005
Linear SVM-based android malware detection for reliable IoT services
HS Ham, HH Kim, MS Kim, MJ Choi
Journal of Applied Mathematics 2014, 2014
Characteristic analysis of internet traffic from the perspective of flows
MS Kim, YJ Won, JW Hong
Computer Communications 29 (10), 1639-1652, 2006
The Architecture of NG-MON: A Passive Network Monitoring System for High-Speed IP Networks1
SH Han, MS Kim, HT Ju, JWK Hong
Management Technologies for E-Commerce and E-Business Applications: 13th …, 2002
A load cluster management system using SNMP and web
MS Kim, MJ Choi, JW Hong
International Journal of Network Management 12 (6), 367-378, 2002
QoS parameters to network performance metrics mapping for SLA monitoring
HJ Lee, MS Kim, JW Hong, GH Lee
KNOM Review 5 (2), 42-53, 2002
Internet application traffic classification using fixed IP-port
SH Yoon, JW Park, JS Park, YS Oh, MS Kim
Management Enabling the Future Internet for Changing Business and New …, 2009
A generic architecture for autonomic service and network management
Y Cheng, R Farha, MS Kim, A Leon-Garcia, JWK Hong
Computer Communications 29 (18), 3691-3709, 2006
Towards peer-to-peer traffic analysis using flows
MS Kim, HJ Kang, JW Hong
International Workshop on Distributed Systems: Operations and Management, 55-67, 2003
A hybrid approach for accurate application traffic identification
YJ Won, BC Park, HT Ju, MS Kim, JW Hong
2006 4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services …, 2006
A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view
BD Sija, YH Goo, KS Shim, H Hasanova, MS Kim
Security and Communication Networks 2018, 1-17, 2018
Real-time classification of Internet application traffic using a hierarchical multi-class SVM
JH Yu, HS Lee, YH Im, MS Kim, DH Park
KSII Transactions on Internet and Information Systems (TIIS) 4 (5), 859-876, 2010
Fine‐grained traffic classification based on functional separation
B Park, Y Won, JY Chung, M Kim, JWK Hong
International Journal of Network Management 23 (5), 350-381, 2013
A study on smart-phone traffic analysis
SW Lee, JS Park, HS Lee, MS Kim
2011 13th Asia-Pacific Network Operations and Management Symposium, 1-7, 2011
A method on multimedia service traffic monitoring and analysis
HJ Kang, MS Kim, JWK Hong
International Workshop on Distributed Systems: Operations and Management, 93-105, 2003
A novel blockchain-enabled heart disease prediction mechanism using machine learning
H Hasanova, M Tufail, UJ Baek, JT Park, MS Kim
Computers and Electrical Engineering 101, 108086, 2022
The system can't perform the operation now. Try again later.
Articles 1–20