Suspicious traffic sampling for intrusion detection in software-defined networks T Ha, S Kim, N An, J Narantuya, C Jeong, JW Kim, H Lim Computer Networks 109, 172-182, 2016 | 90 | 2016 |
Scalable traffic sampling using centrality measure on software-defined networks S Yoon, T Ha, S Kim, H Lim IEEE Communications Magazine 55 (7), 43-49, 2017 | 58 | 2017 |
Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks T Ha, S Yoon, AC Risdianto, JW Kim, H Lim IEEE Network 30 (6), 22-27, 2016 | 46 | 2016 |
Scalable network intrusion detection on virtual SDN environment C Jeong, T Ha, J Narantuya, H Lim, JW Kim 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), 264-265, 2014 | 37 | 2014 |
TDoA localization for wireless networks with imperfect clock synchronization R Kim, T Ha, H Lim, D Jung The International Conference on Information Networking 2014 (ICOIN2014), 417-421, 2014 | 22 | 2014 |
Dynamic priority-adjustment for real-time flows in software-defined networks N An, T Ha, KJ Park, H Lim 2016 17th International Telecommunications Network Strategy and Planning …, 2016 | 12 | 2016 |
Seamless Virtualized Controller Migration for Drone Applications N An, S Yoon, T Ha, Y Kim, H Lim IEEE Internet Computing 23 (2), 51-58, 2018 | 9 | 2018 |
Method for detecting intrusion in network H Lim, J Kim, J Narantuya, HA Tae-Jin, C Jeong US Patent 9,876,808, 2018 | 7 | 2018 |
Method for detecting intrusion in network H Lim, J Kim, J Narantuya, HA Tae-Jin, C Jeong US Patent 9,876,808, 2018 | 7 | 2018 |
MARS: measurement-based allocation of vm resources for cloud data centers C Jeong, T Ha, J Hwang, H Lim, JW Kim Proceedings of the 2013 workshop on Student workhop, 63-66, 2013 | 6 | 2013 |
Namwon An, Jargalsaikhan Narantuya, Chiwook Jeong, JongWon Kim, and Hyuk Lim. Suspicious traffic sampling for intrusion detection in software-defined networks T Ha, S Kim Computer Networks 109, 172-182, 2016 | 5 | 2016 |
Dependency Analysis based Approach for Virtual Machine Placement in Software-Defined Data Center J Narantuya, T Ha, J Bae, H Lim Applied Sciences 9 (16), 3223, 2019 | 4 | 2019 |
Quality-of-service aware resource allocation for virtual machines C Jeong, T Ha, JW Kim, H Lim 2017 International Conference on Information Networking (ICOIN), 191-193, 2017 | 4 | 2017 |
RTSS: Random Traffic Sampling and Steering for OpenFlow-Enabled Networks T Ha, S Yoon, S Kim, H Lim ACM CoNEXT Student Workshop, Irvine, California, 2016 | 4 | 2016 |
Reference Node Selection Scheme for Estimating Relative Locations of Mobile Robots T Ha, S Kim, SY Park, D Kwon, J Ham, H Lim Journal of the Korea Institute of Military Science and Technology 19 (4 …, 2016 | 1 | 2016 |
Zero-buffer data delivery for industrial networks K Koo, T Ha, N An, KJ Park, H Lim 2015 Seventh International Conference on Ubiquitous and Future Networks, 100-102, 2015 | 1 | 2015 |
A multi-channel assignment for wireless networks with a limited number of channels T Ha, H Lim, H Kang 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN …, 2014 | 1 | 2014 |
Power control for wireless networks with a limited number of channels A Burton Mwamila, J Hwang, T Ha, H Lim International Workshop on Multiple Access Communications, 85-88, 2012 | 1 | 2012 |
사이버 보안을 위한 SDN 기반 MAC 주소 은닉 기법 윤승현, 하태진, 김성환, 김요한, 임혁 한국통신학회 학술대회논문집, 1452-1452, 2018 | | 2018 |
빌딩 에너지운용시스템을 위한 지능형 클라우드 컴퓨팅 환경 김선용, 하태진, 김량수, 임혁 한국통신학회 학술대회논문집, 272-273, 2017 | | 2017 |