Koohong KANG


Executable Code Recognition in Network Flows Using Instruction Transition Probabilities
Ikkyun KIM Koohong KANG Yangseo CHOI Daewon KIM Jintae OH Jongsoo JANG Kijun HAN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/07/01
Vol. E91-D  No. 7  pp. 2076-2078
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
executable codemalware detectionIA-32 Instruction
 Summary | Full Text:PDF(332.9KB)

A Simple Relation between Loss Performance and Buffer Contents in a Statistical Multiplexer with Periodic Vacations
Koohong KANG Bart STEYAERT Cheeha KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1997/11/25
Vol. E80-B  No. 11  pp. 1749-1752
Type of Manuscript:  LETTER
Category: Communication Networks and Services
Keyword: 
discrete-time single-server queueing systemperiodic server vacationsloss performance
 Summary | Full Text:PDF(242.9KB)