Author of the publication

The Optimistic Schemes of Cluster Analysis and k-NN Classifier Method in Detecting and Counteracting Learned DDoS Attack.

, , , and . NTMS, page 1-5. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of a Robust Data Mining Method Using CBFS and RSM., , , , and . Ershov Memorial Conference, volume 4378 of Lecture Notes in Computer Science, page 377-388. Springer, (2006)The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations., , and . Int. J. Inf. Manag., (2018)The Security Risks of Cloud Computing.. CSE/EUC, page 330. IEEE, (2019)Decision on Replacing Components of Security Functions in COTS-Based Information Systems., , , and . ICCBSS, volume 3412 of Lecture Notes in Computer Science, page 11. Springer, (2005)Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System., and . WISA, volume 4867 of Lecture Notes in Computer Science, page 359-370. Springer, (2007)FWAM: A flexible workflow authorization model using extended RBAC., , , and . CSCWD, page 625-629. IEEE, (2008)Social control through deterrence on the compliance with information security policy., and . Soft Comput., 22 (20): 6765-6772 (2018)Effects of innovation-supportive culture and organizational citizenship behavior on e-government information system security stemming from mimetic isomorphism., and . Gov. Inf. Q., 34 (2): 183-198 (2017)The Optimistic Schemes of Cluster Analysis and k-NN Classifier Method in Detecting and Counteracting Learned DDoS Attack., , , and . NTMS, page 1-5. IEEE, (2008)Educational Requirements Analysis for Information Security Professionals in Korea., and . J. Inf. Syst. Educ., 13 (3): 237-248 (2002)