Kang, Young-Myong
18  Ergebnisse:
Personensuche X
?
1

A Systematic Literature Review on the Mobile Malware Detect..:

, In: Communications in Computer and Information Science; Mobile Internet Security,
Kim, Yu-kyung ; Lee, Jemin Justin ; Go, Myong-Hyun.. - p. 263-288 , 2022
 
?
2

Work-in-Progress: A Hybrid Collaborative Multi Agent Decisi..:

, In: 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),
 
?
3

A Scalable Real-Time Multiagent Decision Making Algorithm w..:

, In: 2021 IEEE Symposium on Computers and Communications (ISCC),
 
?
4

A Cybersecurity Model for Decision-Making Problems Under Un..:

, In: 2020 13th International Conference on Communications (COMM),
 
?
5

DAPT 2020 - Constructing a Benchmark Dataset for Advanced P..:

, In: Deployable Machine Learning for Security Defense; Communications in Computer and Information Science,
 
?
6

Building private blockchains over public blockchains (PoP) ..:

, In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing,
Huang, Dijiang ; Chung, Chun-Jen ; Dong, Qiuxiang.. - p. 355-363 , 2019
 
?
7

SDNSOC : Object Oriented SDN Framework:

, In: Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization,
 
?
8

Separation virtual machine monitors:

, In: Proceedings of the 28th Annual Computer Security Applications Conference,
McDermott, John ; Montrose, Bruce ; Li, Margery.. - p. 419-428 , 2012
 
?
9

Injecting RBAC to secure a Web-based workflow system:

, In: Proceedings of the fifth ACM workshop on Role-based access control,
Ahn, Gail-Joon ; Sandhu, Ravi ; Kang, Myong. - p. 1-10 , 2000
 
?
10

Access control mechanisms for inter-organizational workflow:

, In: Proceedings of the sixth ACM symposium on Access control models and technologies,
 
?
11

An insecurity flow model:

, In: Proceedings of the 1997 workshop on New security paradigms,
Moskowitz, Ira S. ; Kang, Myong H. - p. 61-74 , 1998
 
?
12

A pump for rapid, reliable, secure communication:

, In: Proceedings of the 1st ACM conference on Computer and communications security,
Kang, Myong H. ; Moskowitz, Ira S. - p. 119-129 , 1993
 
?
13

GAN-Dummy Fill: Timing-aware Dummy Fill Method using GAN:

, In: Proceedings of the Great Lakes Symposium on VLSI 2022,
Kong, Myong ; Kim, Daeyeon ; Kweon, Minhyuk. - p. 177-181 , 2022
 
?
14

Characterization Technique for Interface Traps in Si Nanosh..:

, In: 2022 IEEE 22nd International Conference on Nanotechnology (NANO),
Yoo, Han Bin ; Kim, Haesung ; Lee, Yongwoo... - p. 116-119 , 2022
 
?
15

Monolithically 3D-printed pressure sensors for application ..:

, In: 2017 IEEE International Electron Devices Meeting (IEDM),
Yoon, Jinsu ; Kang, Min-Ho ; Kim, Sungho... - p. 40.2.1-40.2.4 , 2017
 
1-15