Koohong KANG


A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks
Taekeun PARK Koohong KANG Daesung MOON 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2706-2709
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Network Security
Keyword: 
cyber securitymoving target defenseaddress mutationconnection migrationlegacy network
 Summary | Full Text:PDF(298.9KB)

Executable Code Recognition in Network Flows Using Instruction Transition Probabilities
Ikkyun KIM Koohong KANG Yangseo CHOI Daewon KIM Jintae OH Jongsoo JANG Kijun HAN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/07/01
Vol. E91-D  No. 7  pp. 2076-2078
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
executable codemalware detectionIA-32 Instruction
 Summary | Full Text:PDF(332.9KB)

A Simple Relation between Loss Performance and Buffer Contents in a Statistical Multiplexer with Periodic Vacations
Koohong KANG Bart STEYAERT Cheeha KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1997/11/25
Vol. E80-B  No. 11  pp. 1749-1752
Type of Manuscript:  LETTER
Category: Communication Networks and Services
Keyword: 
discrete-time single-server queueing systemperiodic server vacationsloss performance
 Summary | Full Text:PDF(242.9KB)