Follow
Chiwook Jeong
Title
Cited by
Cited by
Year
Suspicious traffic sampling for intrusion detection in software-defined networks
T Ha, S Kim, N An, J Narantuya, C Jeong, JW Kim, H Lim
Computer Networks 109, 172-182, 2016
892016
Scalable network intrusion detection on virtual SDN environment
C Jeong, T Ha, J Narantuya, H Lim, JW Kim
2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), 264-265, 2014
372014
Method for detecting intrusion in network
H Lim, J Kim, J Narantuya, HA Tae-Jin, C Jeong
US Patent 9,876,808, 2018
72018
MARS: Measurement-based allocation of VM resources for cloud data centers
C Jeong, T Ha, J Hwang, H Lim, JW Kim
Proceedings of the 2013 workshop on Student workhop, 63-66, 2013
52013
Quality-of-Service aware resource allocation for virtual machines
C Jeong, T Ha, JW Kim, H Lim
2017 International Conference on Information Networking (ICOIN), 191-193, 2017
32017
Power ratio adjustment for multi-packet reception-capable wireless networks
W Choi, KLT Tien, C Jeong, H Lim
2015 IEEE International Conference on Communication Workshop (ICCW), 1464-1468, 2015
2015
of KIISE
C Jeong, S Park, H Lim, JW Kim, HY Kim, SW Kim, SW Kim, W Choi, J Kim, ...
정보과학회지, 2, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–7