A flow-based method for abnormal network traffic detection MS Kim, HJ Kong, SC Hong, SH Chung, JW Hong 2004 IEEE/IFIP network operations and management symposium (IEEE Cat. No …, 2004 | 386 | 2004 |
Towards automated application signature generation for traffic identification BC Park, YJ Won, MS Kim, JW Hong NOMS 2008-2008 IEEE Network Operations and Management Symposium, 160-167, 2008 | 236 | 2008 |
Traffic flooding attack detection with SNMP MIB using SVM J Yu, H Lee, MS Kim, D Park Computer Communications 31 (17), 4212-4219, 2008 | 192 | 2008 |
Application‐level traffic monitoring and an analysis on IP networks MS Kim, YJ Won, JWK Hong ETRI journal 27 (1), 22-42, 2005 | 153 | 2005 |
A survey on blockchain cybersecurity vulnerabilities and possible countermeasures H Hasanova, U Baek, M Shin, K Cho, MS Kim International Journal of Network Management 29 (2), e2060, 2019 | 140 | 2019 |
Linear SVM-based android malware detection for reliable IoT services HS Ham, HH Kim, MS Kim, MJ Choi Journal of Applied Mathematics 2014, 2014 | 132 | 2014 |
Characteristic analysis of internet traffic from the perspective of flows MS Kim, YJ Won, JW Hong Computer Communications 29 (10), 1639-1652, 2006 | 98 | 2006 |
The Architecture of NG-MON: A Passive Network Monitoring System for High-Speed IP Networks1 SH Han, MS Kim, HT Ju, JWK Hong Management Technologies for E-Commerce and E-Business Applications: 13th …, 2002 | 86 | 2002 |
A load cluster management system using SNMP and web MS Kim, MJ Choi, JW Hong International Journal of Network Management 12 (6), 367-378, 2002 | 72 | 2002 |
QoS parameters to network performance metrics mapping for SLA monitoring HJ Lee, MS Kim, JW Hong, GH Lee KNOM Review 5 (2), 42-53, 2002 | 66 | 2002 |
Internet application traffic classification using fixed IP-port SH Yoon, JW Park, JS Park, YS Oh, MS Kim Management Enabling the Future Internet for Changing Business and New …, 2009 | 65 | 2009 |
Towards peer-to-peer traffic analysis using flows MS Kim, HJ Kang, JW Hong International Workshop on Distributed Systems: Operations and Management, 55-67, 2003 | 60 | 2003 |
A generic architecture for autonomic service and network management Y Cheng, R Farha, MS Kim, A Leon-Garcia, JWK Hong Computer Communications 29 (18), 3691-3709, 2006 | 59 | 2006 |
A hybrid approach for accurate application traffic identification YJ Won, BC Park, HT Ju, MS Kim, JW Hong 2006 4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services …, 2006 | 50 | 2006 |
A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view BD Sija, YH Goo, KS Shim, H Hasanova, MS Kim Security and Communication Networks 2018, 1-17, 2018 | 49 | 2018 |
Real-time classification of Internet application traffic using a hierarchical multi-class SVM JH Yu, HS Lee, YH Im, MS Kim, DH Park KSII Transactions on Internet and Information Systems (TIIS) 4 (5), 859-876, 2010 | 48 | 2010 |
Fine‐grained traffic classification based on functional separation B Park, Y Won, JY Chung, M Kim, JWK Hong International Journal of Network Management 23 (5), 350-381, 2013 | 45 | 2013 |
A study on smart-phone traffic analysis SW Lee, JS Park, HS Lee, MS Kim 2011 13th Asia-Pacific Network Operations and Management Symposium, 1-7, 2011 | 44 | 2011 |
A method on multimedia service traffic monitoring and analysis HJ Kang, MS Kim, JWK Hong International Workshop on Distributed Systems: Operations and Management, 93-105, 2003 | 41 | 2003 |
Streaming media and multimedia conferencing traffic analysis using payload examination HJ Kang, MS Kim, JW Hong ETRI journal 26 (3), 203-217, 2004 | 35 | 2004 |