Follow
Sung-Ryul Kim
Sung-Ryul Kim
Verified email at konkuk.ac.kr
Title
Cited by
Cited by
Year
A New Logging-based IP Traceback Approach using Data Mining Techniques.
HS Kang, SR Kim
J. Internet Serv. Inf. Secur. 3 (3/4), 72-80, 2013
312013
A dynamic edit distance table
SR Kim, K Park
Journal of Discrete Algorithms 2 (2), 303-312, 2004
312004
Graph-based KNN Algorithm for Spam SMS Detection.
TP Ho, HS Kang, SR Kim
J. Univers. Comput. Sci. 19 (16), 2404-2419, 2013
252013
Graph-based KNN Algorithm for Spam SMS Detection.
TP Ho, HS Kang, SR Kim
J. Univers. Comput. Sci. 19 (16), 2404-2419, 2013
252013
Application of sim-hash algorithm and big data analysis in spam email detection system
PT Ho, HS Kim, SR Kim
Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014
222014
A dynamic edit distance table
SR Kim, K Park
Combinatorial Pattern Matching: 11th Annual Symposium, CPM 2000 Montreal …, 2000
222000
Finding approximate covers of strings
JS Sim, KS Park, SR Kim, JS Lee
Journal of KIISE: Computer Systems and Theory 29 (1), 16-21, 2002
182002
Improved clustering for intrusion detection by principal component analysis with effective noise reduction
L Zhao, HS Kang, SR Kim
Information and Communication Technology: International Conference, ICT …, 2013
172013
Improved sampling for triangle counting with MapReduce
JH Yoon, SR Kim
Convergence and Hybrid Information Technology: 5th International Conference …, 2011
162011
A fast algorithm for the generalized k-keyword proximity problem given keyword offsets
SR Kim, I Lee, K Park
Information processing letters 91 (3), 115-120, 2004
162004
An efficient privacy protection in mobility social network services with novel clustering-based anonymization
ZG Chen, HS Kang, SN Yin, SR Kim
EURASIP journal on Wireless communications and networking 2016, 1-9, 2016
142016
K-strings algorithm, a new approach based on Kmeans
VH Le, SR Kim
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
142015
Fully scalable fault-tolerant simulations for bsp and cgm
SR Kim, K Park
Journal of Parallel and Distributed Computing 60 (12), 1531-1560, 2000
142000
Fully scalable fault-tolerant simulations for bsp and cgm
SR Kim, K Park
Journal of Parallel and Distributed Computing 60 (12), 1531-1560, 2000
142000
High‐speed parallel implementations of the rainbow method based on perfect tables in a heterogeneous system
JW Kim, J Seo, J Hong, K Park, SR Kim
Software: Practice and Experience 45 (6), 837-855, 2015
132015
High-speed parallel implementations of the rainbow method in a heterogeneous system
JW Kim, J Seo, J Hong, K Park, SR Kim
Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012
132012
Algorithms on Extended (δ, γ)-Matching
I Lee, R Clifford, SR Kim
International Conference on Computational Science and its Applications, 1137 …, 2006
132006
Improved scalable hash chain traversal
SR Kim
International Conference on Applied Cryptography and Network Security, 86-95, 2003
132003
Copy protection system for android app using public key infrastructure
SR Kim
Journal of Security Engineering 9 (1), 121-134, 2012
112012
sShield: small DDoS defense system using RIP-based traffic deflection in autonomous system
HS Kang, SR Kim
The Journal of Supercomputing 67, 820-836, 2014
102014
The system can't perform the operation now. Try again later.
Articles 1–20