Search Results - "Jeong, Chiwook"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Suspicious traffic sampling for intrusion detection in software-defined networks by Ha, Taejin, Kim, Sunghwan, An, Namwon, Narantuya, Jargalsaikhan, Jeong, Chiwook, Kim, JongWon, Lim, Hyuk

    “…In order to defend a cloud computing system from security attackers, an intrusion detection system (IDS) is widely used to inspect suspicious traffic on the…”
    Get full text
    Journal Article
  2. 2

    Scalable network intrusion detection on virtual SDN environment by Chiwook Jeong, Taejin Ha, Narantuya, Jargalsaikhan, Hyuk Lim, JongWon Kim

    “…We propose a scalable intrusion detection system (IDS) architecture on a software-defined networking (SDN) environment implemented using a virtualization…”
    Get full text
    Conference Proceeding
  3. 3

    Quality-of-service aware resource allocation for virtual machines by Chiwook Jeong, Taejin Ha, JongWon Kim, Hyuk Lim

    “…We propose a quality of service (QoS) aware resource allocation algorithm for virtual machines (VMs) in cloud servers. The proposed scheme consists of two…”
    Get full text
    Conference Proceeding
  4. 4

    Power ratio adjustment for multi-packet reception-capable wireless networks by Wooyeol Choi, Khanh Le Tran Tien, Chiwook Jeong, Hyuk Lim

    “…Because of the rapid advancements in signal processing and multiuser detection (MUD) technologies, a wireless node can successfully decode compound signals…”
    Get full text
    Conference Proceeding