Seguir
Jinoh Kim
Título
Citado por
Citado por
Ano
A survey of deep learning-based network anomaly detection
D Kwon, H Kim, J Kim, SC Suh, I Kim, KJ Kim
Cluster Computing 22, 949-961, 2019
8002019
An empirical study on network anomaly detection using convolutional neural networks
D Kwon, K Natarajan, SC Suh, H Kim, J Kim
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
1592018
An empirical evaluation of deep learning for network anomaly detection
RK Malaiya, D Kwon, SC Suh, H Kim, I Kim, J Kim
IEEE Access 7, 140806-140817, 2019
1202019
Parallel in situ indexing for data-intensive computing
J Kim, H Abbasi, L Chacon, C Docan, S Klasky, Q Liu, N Podhorszki, ...
2011 IEEE Symposium on Large Data Analysis and Visualization, 65-72, 2011
712011
An encoding technique for CNN-based network anomaly detection
T Kim, SC Suh, H Kim, J Kim, J Kim
2018 IEEE International Conference on Big Data (Big Data), 2960-2965, 2018
682018
Enhancing IoT anomaly detection performance for federated learning
B Weinger, J Kim, A Sim, M Nakashima, N Moustafa, KJ Wu
Digital Communications and Networks 8 (3), 314-323, 2022
502022
Energy proportionality for disk storage using replication
J Kim, D Rotem
Proceedings of the 14th International Conference on Extending Database …, 2011
462011
Unsupervised labeling for supervised anomaly detection in enterprise and cloud networks
S Baek, D Kwon, J Kim, SC Suh, H Kim, I Kim
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017
452017
Federated wireless network intrusion detection
B Cetin, A Lazar, J Kim, A Sim, K Wu
2019 IEEE International Conference on Big Data (Big Data), 6004-6006, 2019
432019
Energy-aware scheduling in disk storage systems
J Chou, J Kim, D Rotem
2011 31st International Conference on Distributed Computing Systems, 423-433, 2011
372011
5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network
S Samarakoon, Y Siriwardhana, P Porambage, M Liyanage, SY Chang, ...
arXiv preprint arXiv:2212.01298, 2022
362022
Anomaly detection based on traffic monitoring for secure blockchain networking
J Kim, M Nakashima, W Fan, S Wuthier, X Zhou, I Kim, SY Chang
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-9, 2021
302021
Applying data mining techniques to analyze alert data
M Shin, HS Moon, KH Ryu, KY Kim, JO Kim
Web Technologies and Applications: 5th Asia-Pacific Web Conference, APWeb …, 2003
292003
Multivariate network traffic analysis using clustered patterns
J Kim, A Sim, B Tierney, S Suh, I Kim
Computing 101, 339-361, 2019
262019
Using data accessibility for resource selection in large-scale distributed systems
J Kim, A Chandra, JB Weissman
IEEE Transactions on Parallel and Distributed Systems 20 (6), 788-801, 2009
232009
Energy proportionality and performance in data parallel computing clusters
J Kim, J Chou, D Rotem
Scientific and Statistical Database Management: 23rd International …, 2011
222011
Botnet detection using recurrent variational autoencoder
J Kim, A Sim, J Kim, K Wu
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
192020
Automated feature selection for anomaly detection in network traffic data
M Nakashima, A Sim, Y Kim, J Kim, J Kim
ACM Transactions on Management Information Systems (TMIS) 12 (3), 1-28, 2021
172021
FREP: Energy proportionality for disk storage using replication
J Kim, D Rotem
Journal of Parallel and Distributed Computing 72 (8), 960-974, 2012
152012
Learning-based dynamic cache management in a cloud
J Choi, Y Gu, J Kim
Journal of Parallel and Distributed Computing 145, 98-110, 2020
142020
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20