Follow
Taejin HA
Title
Cited by
Cited by
Year
Suspicious traffic sampling for intrusion detection in software-defined networks
T Ha, S Kim, N An, J Narantuya, C Jeong, JW Kim, H Lim
Computer Networks 109, 172-182, 2016
882016
Scalable traffic sampling using centrality measure on software-defined networks
S Yoon, T Ha, S Kim, H Lim
IEEE Communications Magazine 55 (7), 43-49, 2017
522017
Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks
T Ha, S Yoon, AC Risdianto, JW Kim, H Lim
IEEE Network 30 (6), 22-27, 2016
432016
Scalable network intrusion detection on virtual SDN environment
C Jeong, T Ha, J Narantuya, H Lim, JW Kim
2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), 264-265, 2014
372014
TDoA localization for wireless networks with imperfect clock synchronization
R Kim, T Ha, H Lim, D Jung
The International Conference on Information Networking 2014 (ICOIN2014), 417-421, 2014
212014
Dynamic priority-adjustment for real-time flows in software-defined networks
N An, T Ha, KJ Park, H Lim
2016 17th International Telecommunications Network Strategy and Planning …, 2016
102016
Seamless Virtualized Controller Migration for Drone Applications
N An, S Yoon, T Ha, Y Kim, H Lim
IEEE Internet Computing 23 (2), 51-58, 2018
72018
Method for detecting intrusion in network
H Lim, J Kim, J Narantuya, HA Tae-Jin, C Jeong
US Patent 9,876,808, 2018
72018
Method for detecting intrusion in network
H Lim, J Kim, J Narantuya, HA Tae-Jin, C Jeong
US Patent 9,876,808, 2018
72018
Namwon An, Jargalsaikhan Narantuya, Chiwook Jeong, JongWon Kim, and Hyuk Lim. Suspicious traffic sampling for intrusion detection in software-defined networks
T Ha, S Kim
Computer Networks 109, 172-182, 2016
52016
MARS: measurement-based allocation of vm resources for cloud data centers
C Jeong, T Ha, J Hwang, H Lim, JW Kim
Proceedings of the 2013 workshop on Student workhop, 63-66, 2013
52013
Dependency Analysis based Approach for Virtual Machine Placement in Software-Defined Data Center
J Narantuya, T Ha, J Bae, H Lim
Applied Sciences 9 (16), 3223, 2019
42019
RTSS: Random Traffic Sampling and Steering for OpenFlow-Enabled Networks
T Ha, S Yoon, S Kim, H Lim
ACM CoNEXT Student Workshop, Irvine, California, 2016
42016
Quality-of-service aware resource allocation for virtual machines
C Jeong, T Ha, JW Kim, H Lim
2017 International Conference on Information Networking (ICOIN), 191-193, 2017
32017
Zero-buffer data delivery for industrial networks
K Koo, T Ha, N An, KJ Park, H Lim
2015 Seventh International Conference on Ubiquitous and Future Networks, 100-102, 2015
12015
A multi-channel assignment for wireless networks with a limited number of channels
T Ha, H Lim, H Kang
2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN …, 2014
12014
Power control for wireless networks with a limited number of channels
A Burton Mwamila, J Hwang, T Ha, H Lim
International Workshop on Multiple Access Communications, 85-88, 2012
12012
사이버 보안을 위한 SDN 기반 MAC 주소 은닉 기법
윤승현, 하태진, 김성환, 김요한, 임혁
한국통신학회 학술대회논문집, 1452-1452, 2018
2018
빌딩 에너지운용시스템을 위한 지능형 클라우드 컴퓨팅 환경
김선용, 하태진, 김량수, 임혁
한국통신학회 학술대회논문집, 272-273, 2017
2017
새로운 보안 위협에 대처하기 위한 사이버 방어 순환 기술
윤승현, 김성환, 하태진, 김요한, 이지애, 임혁
한국통신학회 학술대회논문집, 340-341, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20