1 |
Yeun, C.Y., Han, K., Vo, D.L., Kim, K., "Secure authenticated group key agreement protocol in the MANET environment," information security technical report, Vol. 13, No. 3, pp. 158-164, 2008.
DOI
|
2 |
Bariah, L., Shehada, D., Salahat, E., Yeun, C.Y., "Recent advances in VANET security: a survey," In proceeding of the 82nd IEEE Vehicular Technology Conference, pp. 1-7, September 2015.
|
3 |
Shehada, D., Yeun, C.Y., Zemerly, M.J., Al Qutayri, M., Al Hammadi, Y., Damiani, E., Hu, J., "BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications," Security and Communication Networks, Wiley, Vol. 2017, 3606424, 2017.
|
4 |
Baek, J., Vu, Q.H., Jones, A., Al Mulla, S., Yeun, C.Y., "Smart-frame: A flexible, scalable, and secure information management framework for smart grids," In proceeding of International Conference for Internet Technology And Secured Transactions, pp. 668-673, December 2012.
|
5 |
Al Alkeem, E., Shehada, D., Yeun, C.Y., Zemerly, M.J., Hu, J., "New secure healthcare system using cloud of things," Cluster Computing, Vol. 20, No. 3, Springer, pp. 2211-2219, 2017.
DOI
|
6 |
Han, K., Yeun, C.Y., Shon, T., Park, J., Kim, K., "A scalable and 6.efficient key escrow model for lawful interception of IDBC‐based secure communication," International Journal of Communication Systems, Vol. 24, No. 4, pp. 461-472, 2011.
DOI
|
7 |
Gajparia, A.S., Mitchell, C.J. , Yeun, C.Y., "Supporting user privacy 7.in location based services," IEICE transactions on communications, Vol. 88, No. 7, pp. 2837-2847, 2005.
|
8 |
Konidala, D.M., Yeun, C.Y., Kim, K., "A secure and privacy enhanced protocol for location-based services in ubiquitous society," In proceeding of IEEE Global Telecommunications Conference, GLOBECOM'04, Vol. 4, pp. 2164-2168, 2004
|
9 |
Lu, Y., Wang, M.: An Easy Defense Mechanism Against Botnet-based DDoS Flooding Attack Originated in SDN Environment Using sFlow. In: ACM, New York (2016)
|
10 |
Xiulei, W., Ming, C., Xianglin, W., Guomin, Z.: Defending DDoS attacks in software defined networking based on improved Shiryaev-Roberts detection algorithm. J. High. Speed. Networks. 22, 285-298, (2015)
|
11 |
Trung, P.V, Huong, T.T, Tuyen, D.V, Duc, D.M, Thanh, N.H, Marshall, A.: A Multi-Criteria-based DDoS-Attack Prevention Solution using Software Defined Networking. In: ATC, (2015)
|
12 |
Buragohain, C., Medhi, N.: FlowTrApp: An SDN Based Architecture for DDoS Attack Detection and Mitigation in Data Centers. In: International Conference on Signal Processing and Integrated Networks, (2016)
|
13 |
Xu, Y., Liu, Y.: DDoS Attack Detection under SDN Context. In: The 35th Annual IEEE International Conference on Computer Communications, (2016)
|
14 |
Dharma, G., Muthohar, M.F, Prayuda, A.J.D., Priagung, K., Choi, D.: Time-based DDoS Detection and Mitigation for SDN Controller. In: APNOMS, (2015)
|
15 |
SAHRI, N., OKAMURA, K.: Protecting DNS services from IP spoofing - SDN collaborative authentication approach. In: ACM, New York (2016)
|
16 |
Lim, S., Ha, J., Kim, H., Kim, Y., Yang, S.: A SDNOriented DDoS Blocking Scheme for Botnet-Based Attacks. In: ICUFN, (2014)
|
17 |
Dao, N., Park, J., Park, M., Cho, S.: A Feasible Method to combat against DDoS Attack in SDN Network. In: ICOIN, (2015)
|
18 |
Li, J., Berg, S., Zhang, M., Reiher, P., Wei, T.: DrawBridge-Software-Defined DDoS-Resistant Traffic Engineering. In: ACM, 2014
|