Seungwon Shin
Seungwon Shin
Email verificata su - Home page
TitoloCitata daAnno
FRESCO: Modular Composable Security Services for Software-Defined Networks
S Shin, P Porras, V Yegneswaran, M Fong, G Gu, M Tyson
Internet Society NDSS (Feb. 2013). To appear, 2013
A security enforcement kernel for OpenFlow networks
P Porras, S Shin, V Yegneswaran, M Fong, M Tyson, G Gu
Proceedings of the first workshop on Hot topics in software defined networks …, 2012
Avant-guard: Scalable and vigilant switch flow management in software-defined networks
S Shin, V Yegneswaran, P Porras, G Gu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter
C Yang, R Harkreader, J Zhang, S Shin, G Gu
Proceedings of the 21st international conference on World Wide Web, 71-80, 2012
Attacking software-defined networks: A first feasibility study
SW Shin, G Gu
ACM SIGCOMM workshop on Hot topics in software defined networking, 165-166, 2013
Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks
SW Shin, G Gu
Network Protocols (ICNP) 2012, 1-6, 2012
Rosemary: A robust, secure, and high-performance network operating system
S Shin, Y Song, T Lee, S Lee, J Chung, P Porras, V Yegneswaran, J Noh, ...
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Model checking invariant security properties in OpenFlow
S Son, S Shin, V Yegneswaran, P Porras, G Gu
2013 IEEE international conference on communications (ICC), 1974-1979, 2013
Conficker and beyond: a large-scale empirical study
S Shin, G Gu
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Malware prevalence in the KaZaA file-sharing network
S Shin, J Jung, H Balakrishnan
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 333-338, 2006
A large-scale empirical study of conficker
S Shin, G Gu, N Reddy, CP Lee
IEEE Transactions on Information Forensics and Security 7 (2), 676-690, 2011
Network intrusion detection and prevention system and method thereof
SW Shin, J Oh, KY Kim, JS Jang, SW Sohn
US Patent 7,565,693, 2009
Enabling security functions with SDN: A feasibility study
C Yoon, T Park, S Lee, H Kang, S Shin, Z Zhang
Computer Networks 85, 19-35, 2015
DELTA: A Security Assessment Framework for Software-Defined Networks.
S Lee, C Yoon, C Lee, S Shin, V Yegneswaran, PA Porras
NDSS, 2017
Enhancing network security through software defined networking (SDN)
S Shin, L Xu, S Hong, G Gu
2016 25th international conference on computer communication and networks …, 2016
Effort: Efficient and effective bot malware detection
S Shin, Z Xu, G Gu
2012 Proceedings IEEE INFOCOM, 2846-2850, 2012
A first step toward network security virtualization: From concept to prototype
S Shin, H Wang, G Gu
IEEE Transactions on Information Forensics and Security 10 (10), 2236-2249, 2015
Real-time network attack pattern detection system for unknown network attack and method thereof
J Oh, SW Shin, KY Kim, JS Jang, SW Sohn
US Patent 7,571,477, 2009
D-SAT: detecting SYN flooding attack by two-stage statistical approach
S Shin, K Kim, J Jang
The 2005 Symposium on Applications and the Internet, 430-436, 2005
Cross-analysis of botnet victims: New insights and implications
S Shin, R Lin, G Gu
International Workshop on Recent Advances in Intrusion Detection, 242-261, 2011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20