Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Suppression of Edge Effects Based on Analytic Model for Leakage Current Reduction of Sub-40 nm DRAM Device., , , , , , and . IEICE Trans. Electron., 93-C (5): 658-661 (2010)Software decoys for insider threat., and . AsiaCCS, page 93-94. ACM, (2012)Theoretical studies on the formation mechanism and explosive performance of nitro-substituted 1, 3, 5-triazines., , , , , and . J. Comput. Chem., 31 (13): 2483-2492 (2010)A New Approximation of the Receive Minimum Distance and Its Application to MIMO Systems., , , and . IEICE Trans. Commun., 90-B (2): 385-387 (2007)AntiBot: Clustering Common Semantic Patterns for Bot Detection., , , and . COMPSAC, page 262-272. IEEE Computer Society, (2010)Mechanophotopatterning on a Photoresponsive Elastomer, , , and . Advanced Materials, 23 (17): 1977--1981 (2011)Morpheme-based lexical modeling for korean broadcast news transcription., , and . INTERSPEECH, page 1129-1132. ISCA, (2003)Identification of Bot Commands by Run-Time Execution Monitoring., and . ACSAC, page 321-330. IEEE Computer Society, (2009)Fast malware classification by automated behavioral graph matching., , , and . CSIIRW, page 45. ACM, (2010)Tracing Traffic through Intermediate Hosts that Repacketize Flows., , , , and . INFOCOM, page 634-642. IEEE, (2007)