Fit a compact spread estimator in small high-speed memory MK Yoon, T Li, S Chen, JK Peir IEEE/ACM Transactions on Networking 19 (5), 1253-1264, 2010 | 89 | 2010 |
Fit a spread estimator in small memory M Yoon, T Li, S Chen, JK Peir IEEE INFOCOM 2009, 504-512, 2009 | 85 | 2009 |
Aging bloom filter with two active buffers for dynamic sets MK Yoon IEEE Transactions on Knowledge and Data Engineering 22 (1), 134-138, 2009 | 66 | 2009 |
Minimizing the maximum firewall rule set in a network with multiple firewalls MK Yoon, S Chen, Z Zhang IEEE Transactions on Computers 59 (2), 218-230, 2009 | 56 | 2009 |
March: A distributed incentive scheme for peer-to-peer networks Z Zhang, S Chen, M Yoon IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 54 | 2007 |
Using whitelisting to mitigate DDoS attacks on critical internet sites MK Yoon IEEE Communications Magazine 48 (7), 110-115, 2010 | 36 | 2010 |
Bloom tree: A search tree based on bloom filters for multiple-set membership testing MK Yoon, JW Son, SH Shin IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1429-1437, 2014 | 33 | 2014 |
Reducing the size of rule set in a firewall MK Yoon, S Chen, Z Zhang 2007 IEEE International Conference on Communications, 1274-1279, 2007 | 25 | 2007 |
A grand spread estimator using a graphics processing unit SH Shin, EJ Im, MK Yoon Journal of Parallel and Distributed Computing 74 (2), 2039-2047, 2014 | 23 | 2014 |
A constant-time chunking algorithm for packet-level deduplication MK Yoon ICT Express 5 (2), 131-135, 2019 | 20 | 2019 |
When bloom filters are no longer compact: Multi-set membership lookup for network applications Y Qiao, S Chen, Z Mo, M Yoon IEEE/ACM Transactions on Networking 24 (6), 3326-3339, 2016 | 16 | 2016 |
Compact feature hashing for machine learning based malware detection D Moon, JK Lee, MK Yoon ICT Express 8 (1), 124-129, 2022 | 11 | 2022 |
Virtual vectors and network traffic analysis SH Shin, MK Yoon IEEE Network 26 (1), 22-26, 2012 | 11 | 2012 |
Detecting stealthy spreaders by random aging streaming filters MK Yoon, S Chen IEICE transactions on communications 94 (8), 2274-2281, 2011 | 11 | 2011 |
Film: Filtering and machine learning for malware detection in edge computing YJ Kim, CH Park, MK Yoon Sensors 22 (6), 2150, 2022 | 10 | 2022 |
V-gram: Malware Detection Using Opcode Basic Blocks and Deep Learning S Jeong, H Kim, Y Kim, M Yoon Journal of KIISE 46 (7), 599-605, 2019 | 8 | 2019 |
New mobility management method using the trace of terminals in PCS network MK Yoon IEICE transactions on communications 81 (9), 1724-1731, 1998 | 8 | 1998 |
Accurate and communication-efficient detection of widespread events J Jeong, SMA Naqvi, M Yoon IEEE Access 6, 61728-61734, 2018 | 7 | 2018 |
Pride: A protocol-independent de-duplication engine for packet recording SH Shin, J Lee, JM Jeong, HB Kim, JH Kim, I Kim, MK Yoon IEEE Network 30 (6), 42-48, 2016 | 6 | 2016 |
Distributed One-Time Keyboard Systems YL Park, MK Yoon IEICE TRANSACTIONS on Information and Systems 96 (12), 2870-2872, 2013 | 6 | 2013 |