Follow
myungkeun yoon
myungkeun yoon
Verified email at kookmin.ac.kr
Title
Cited by
Cited by
Year
Fit a compact spread estimator in small high-speed memory
MK Yoon, T Li, S Chen, JK Peir
IEEE/ACM Transactions on Networking 19 (5), 1253-1264, 2010
892010
Fit a spread estimator in small memory
M Yoon, T Li, S Chen, JK Peir
IEEE INFOCOM 2009, 504-512, 2009
852009
Aging bloom filter with two active buffers for dynamic sets
MK Yoon
IEEE Transactions on Knowledge and Data Engineering 22 (1), 134-138, 2009
662009
Minimizing the maximum firewall rule set in a network with multiple firewalls
MK Yoon, S Chen, Z Zhang
IEEE Transactions on Computers 59 (2), 218-230, 2009
562009
March: A distributed incentive scheme for peer-to-peer networks
Z Zhang, S Chen, M Yoon
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
542007
Using whitelisting to mitigate DDoS attacks on critical internet sites
MK Yoon
IEEE Communications Magazine 48 (7), 110-115, 2010
362010
Bloom tree: A search tree based on bloom filters for multiple-set membership testing
MK Yoon, JW Son, SH Shin
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1429-1437, 2014
332014
Reducing the size of rule set in a firewall
MK Yoon, S Chen, Z Zhang
2007 IEEE International Conference on Communications, 1274-1279, 2007
252007
A grand spread estimator using a graphics processing unit
SH Shin, EJ Im, MK Yoon
Journal of Parallel and Distributed Computing 74 (2), 2039-2047, 2014
232014
A constant-time chunking algorithm for packet-level deduplication
MK Yoon
ICT Express 5 (2), 131-135, 2019
202019
When bloom filters are no longer compact: Multi-set membership lookup for network applications
Y Qiao, S Chen, Z Mo, M Yoon
IEEE/ACM Transactions on Networking 24 (6), 3326-3339, 2016
162016
Compact feature hashing for machine learning based malware detection
D Moon, JK Lee, MK Yoon
ICT Express 8 (1), 124-129, 2022
112022
Virtual vectors and network traffic analysis
SH Shin, MK Yoon
IEEE Network 26 (1), 22-26, 2012
112012
Detecting stealthy spreaders by random aging streaming filters
MK Yoon, S Chen
IEICE transactions on communications 94 (8), 2274-2281, 2011
112011
Film: Filtering and machine learning for malware detection in edge computing
YJ Kim, CH Park, MK Yoon
Sensors 22 (6), 2150, 2022
102022
V-gram: Malware Detection Using Opcode Basic Blocks and Deep Learning
S Jeong, H Kim, Y Kim, M Yoon
Journal of KIISE 46 (7), 599-605, 2019
82019
New mobility management method using the trace of terminals in PCS network
MK Yoon
IEICE transactions on communications 81 (9), 1724-1731, 1998
81998
Accurate and communication-efficient detection of widespread events
J Jeong, SMA Naqvi, M Yoon
IEEE Access 6, 61728-61734, 2018
72018
Pride: A protocol-independent de-duplication engine for packet recording
SH Shin, J Lee, JM Jeong, HB Kim, JH Kim, I Kim, MK Yoon
IEEE Network 30 (6), 42-48, 2016
62016
Distributed One-Time Keyboard Systems
YL Park, MK Yoon
IEICE TRANSACTIONS on Information and Systems 96 (12), 2870-2872, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20