A New Logging-based IP Traceback Approach using Data Mining Techniques. HS Kang, SR Kim J. Internet Serv. Inf. Secur. 3 (3/4), 72-80, 2013 | 31 | 2013 |
A dynamic edit distance table SR Kim, K Park Journal of Discrete Algorithms 2 (2), 303-312, 2004 | 31 | 2004 |
Graph-based KNN Algorithm for Spam SMS Detection. TP Ho, HS Kang, SR Kim J. Univers. Comput. Sci. 19 (16), 2404-2419, 2013 | 25 | 2013 |
Graph-based KNN Algorithm for Spam SMS Detection. TP Ho, HS Kang, SR Kim J. Univers. Comput. Sci. 19 (16), 2404-2419, 2013 | 25 | 2013 |
Application of sim-hash algorithm and big data analysis in spam email detection system PT Ho, HS Kim, SR Kim Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014 | 22 | 2014 |
A dynamic edit distance table SR Kim, K Park Combinatorial Pattern Matching: 11th Annual Symposium, CPM 2000 Montreal …, 2000 | 22 | 2000 |
Finding approximate covers of strings JS Sim, KS Park, SR Kim, JS Lee Journal of KIISE: Computer Systems and Theory 29 (1), 16-21, 2002 | 18 | 2002 |
Improved clustering for intrusion detection by principal component analysis with effective noise reduction L Zhao, HS Kang, SR Kim Information and Communication Technology: International Conference, ICT …, 2013 | 17 | 2013 |
Improved sampling for triangle counting with MapReduce JH Yoon, SR Kim Convergence and Hybrid Information Technology: 5th International Conference …, 2011 | 16 | 2011 |
A fast algorithm for the generalized k-keyword proximity problem given keyword offsets SR Kim, I Lee, K Park Information processing letters 91 (3), 115-120, 2004 | 16 | 2004 |
An efficient privacy protection in mobility social network services with novel clustering-based anonymization ZG Chen, HS Kang, SN Yin, SR Kim EURASIP journal on Wireless communications and networking 2016, 1-9, 2016 | 14 | 2016 |
K-strings algorithm, a new approach based on Kmeans VH Le, SR Kim Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015 | 14 | 2015 |
Fully scalable fault-tolerant simulations for bsp and cgm SR Kim, K Park Journal of Parallel and Distributed Computing 60 (12), 1531-1560, 2000 | 14 | 2000 |
Fully scalable fault-tolerant simulations for bsp and cgm SR Kim, K Park Journal of Parallel and Distributed Computing 60 (12), 1531-1560, 2000 | 14 | 2000 |
High‐speed parallel implementations of the rainbow method based on perfect tables in a heterogeneous system JW Kim, J Seo, J Hong, K Park, SR Kim Software: Practice and Experience 45 (6), 837-855, 2015 | 13 | 2015 |
High-speed parallel implementations of the rainbow method in a heterogeneous system JW Kim, J Seo, J Hong, K Park, SR Kim Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012 | 13 | 2012 |
Algorithms on Extended (δ, γ)-Matching I Lee, R Clifford, SR Kim International Conference on Computational Science and its Applications, 1137 …, 2006 | 13 | 2006 |
Improved scalable hash chain traversal SR Kim International Conference on Applied Cryptography and Network Security, 86-95, 2003 | 13 | 2003 |
Copy protection system for android app using public key infrastructure SR Kim Journal of Security Engineering 9 (1), 121-134, 2012 | 11 | 2012 |
sShield: small DDoS defense system using RIP-based traffic deflection in autonomous system HS Kang, SR Kim The Journal of Supercomputing 67, 820-836, 2014 | 10 | 2014 |