default search action
Min Sik Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j9]Min Sik Kim, Hyung Soon Kim:
Attentive Pooling-Based Weighted Sum of Spectral Decay Rates for Blind Estimation of Reverberation Time. IEEE Signal Process. Lett. 29: 1639-1643 (2022) - 2018
- [j8]Inbok Lee, Victor C. Valgenti, Min Sik Kim, Sung-il Oh:
A Heuristic for Constructing Smaller Automata Based on Suffix Sorting and Its Application in Network Security. IEICE Trans. Inf. Syst. 101-D(3): 613-615 (2018) - 2016
- [j7]Min Shao, Min Sik Kim, Victor C. Valgenti, Jungkeun Park:
Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems. IEICE Trans. Inf. Syst. 99-D(8): 2090-2099 (2016) - 2015
- [j6]Christopher J. Mitchell, Derese Getnet, Min Sik Kim, Srinivas Manda Srikanth, Praveen Kumar, Tai-Chung Huang, Sneha M. Pinto, Nirujogi Raja Sekhar, Mio Iwasaki, Patrick G. Shaw, Xinyan Wu, Jun Zhong, Raghothama Chaerkady, Arivusudar Marimuthu, Babylakshmi Muthusamy, Nandini A. Sahasrabuddhe, Rajesh Raju, Caitlyn Bowman, Ludmila V. Danilova, Jevon Cutler, Dhanashree S. Kelkar, Charles G. Drake, T. S. Keshava Prasad, Luigi Marchionni, Peter N. Murakami, Alan F. Scott, Leming Shi, Jean Thierry-Mieg, Danielle Thierry-Mieg, Rafael A. Irizarry, Leslie Cope, Yasushi Ishihama, Charles Wang, Harsha Gowda, Akhilesh Pandey:
A multi-omic analysis of human naïve CD4+ T cells. BMC Syst. Biol. 9: 75 (2015) - 2013
- [j5]Yan Sun, Min Sik Kim:
High Performance Table-Based Algorithm for Pipelined CRC Calculation. J. Commun. 8(2): 128-135 (2013) - 2012
- [j4]Madhusoodan Parthasarathy, Min Sik Kim:
Routing in the presence of groups in mobile ad hoc networks. Int. J. Inf. Technol. Commun. Convergence 2(1): 1-24 (2012) - 2011
- [j3]Haiqin Liu, Yan Sun, Min Sik Kim:
A Scalable DDoS Detection Framework with Victim Pinpoint Capability. J. Commun. 6(9): 660-670 (2011) - 2008
- [j2]Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S. Lam, Edward J. Powers:
A wavelet-based approach to detect shared congestion. IEEE/ACM Trans. Netw. 16(4): 763-776 (2008) - 2003
- [j1]Yang Richard Yang, Min Sik Kim, Simon S. Lam:
Transient behaviors of TCP-friendly congestion control protocols. Comput. Networks 41(2): 193-210 (2003)
Conference and Workshop Papers
- 2017
- [c46]Victor C. Valgenti, Ya-Wen Lin, Atsuhiro Suzuki, Min Sik Kim:
Simulating Exploits for the Creation and Refinement of Detection Signatures. MASCOTS 2017: 150-156 - [c45]Hyun Kyoo Park, Min Sik Kim, Moosung Park, Kyungho Lee:
Cyber situational awareness enhancement with regular expressions and an evaluation methodology. MILCOM 2017: 406-411 - 2015
- [c44]Victor C. Valgenti, Min Sik Kim:
Increasing Diversity in Network Intrusion Detection System Evaluation. GLOBECOM 2015: 1-7 - [c43]Hai Sun, Yan Sun, Victor C. Valgenti, Min Sik Kim:
OpenFlow Accelerator: A Decomposition-Based Hashing Approach for Flow Processing. ICCCN 2015: 1-10 - [c42]Victor C. Valgenti, Min Sik Kim, Sung-il Oh, Inbok Lee:
REduce: Removing Redundancy from Regular Expression Matching in Network Security. ICCCN 2015: 1-10 - [c41]Hai Sun, Yan Sun, Victor C. Valgenti, Min Sik Kim:
A highly deterministic hashing scheme using bitmap filter for high speed networking. ICNC 2015: 778-784 - 2014
- [c40]Victor C. Valgenti, Hai Sun, Min Sik Kim:
Protecting Run-Time Filters for Network Intrusion Detection Systems. AINA 2014: 116-122 - [c39]Hai Sun, Yan Sun, Victor C. Valgenti, Min Sik Kim:
A hierarchical hashing scheme to accelerate longest prefix matching. GLOBECOM 2014: 1296-1302 - [c38]Hai Sun, Yan Sun, Victor C. Valgenti, Min Sik Kim:
TCAM-based classification using divide-and-conquer for range expansion. ICCCN 2014: 1-8 - 2013
- [c37]Sung-il Oh, Min Sik Kim, Inbok Lee:
An efficient bit-parallel algorithm for IDS. RACS 2013: 43-44 - 2012
- [c36]Sung-il Oh, Inbok Lee, Min Sik Kim:
Fast filtering for intrusion detection systems with the shift-or algorithm. APCC 2012: 869-870 - [c35]Shariful Hasan Shaikot, Min Sik Kim:
Efficient memory layout for packet classification system on multi-core architecture. GLOBECOM 2012: 2553-2559 - [c34]Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey:
GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors. RAID 2012: 334-353 - [c33]Victor C. Valgenti, Min Sik Kim:
An application-level content generative model for network applications. SimuTools 2012: 47-56 - 2011
- [c32]Haiqin Liu, Yan Sun, Victor C. Valgenti, Min Sik Kim:
TrustGuard: A flow-level reputation-based DDoS defense system. CCNC 2011: 287-291 - [c31]Haiqin Liu, Yan Sun, Min Sik Kim:
Provider-level content migration strategies in P2P-based media distribution networks. CCNC 2011: 337-341 - [c30]Yan Sun, Haiqin Liu, Min Sik Kim:
Using TCAM efficiently for IP route lookup. CCNC 2011: 816-817 - [c29]Yan Sun, Min Sik Kim:
A High-Performance 8-Tap FIR Filter Using Logarithmic Number System. ICC 2011: 1-5 - [c28]Yan Sun, Min Sik Kim:
Identisch. Siehe bereits vorhandene Homepage. DFA-Based Regular Expression Matching on Compressed Traffic. ICC 2011: 1-5 - [c27]Victor C. Valgenti, Ruma R. Paul, Min Sik Kim:
Netshuffle: Improving Traffic Trace Anonymization through Graph Distortion. ICC 2011: 1-6 - [c26]Haiqin Liu, Yan Sun, Min Sik Kim:
Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch. ICCCN 2011: 1-6 - [c25]Yan Sun, Victor C. Valgenti, Min Sik Kim:
NFA-Based Pattern Matching for Deep Packet Inspection. ICCCN 2011: 1-6 - [c24]Ruma R. Paul, Victor C. Valgenti, Min Sik Kim:
Real-time Netshuffle: Graph distortion for on-line anonymization. ICNP 2011: 133-134 - [c23]Victor C. Valgenti, Min Sik Kim:
Simulating content in traffic for benchmarking intrusion detection systems. SimuTools 2011: 44-50 - 2010
- [c22]Yan Sun, Min Sik Kim:
A Pipelined CRC Calculation Using Lookup Tables. CCNC 2010: 1-2 - [c21]Yan Sun, Min Sik Kim:
IP Prefix Matching with Binary and Ternary CAMs. CCNC 2010: 1-2 - [c20]Yan Sun, Min Sik Kim:
Tree-Based Minimization of TCAM Entries for Packet Classification. CCNC 2010: 1-5 - [c19]Yan Sun, Min Sik Kim:
A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup. GLOBECOM 2010: 1-5 - [c18]Haiqin Liu, Min Sik Kim:
Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition. ICC 2010: 1-6 - [c17]Yan Sun, Haiqin Liu, Victor C. Valgenti, Min Sik Kim:
Hybrid Regular Expression Matching for Deep Packet Inspection on Multi-Core Architecture. ICCCN 2010: 1-7 - [c16]Yan Sun, Min Sik Kim:
Bidirectional Range Extension for TCAM-Based Packet Classification. Networking 2010: 351-361 - [c15]Shariful Hasan Shaikot, Min Sik Kim:
Lightweight Traffic-Aware Packet Classification for Continuous Operation. SAINT 2010: 59-67 - [c14]Linmin Yang, Zhe Dang, Thomas R. Fischer, Min Sik Kim, Li Tan:
Entropy and software systems: towards an information-theoretic foundation of software testing. FoSER 2010: 427-432 - 2009
- [c13]Madhusoodan Parthasarathy, Min Sik Kim:
Routing in the Presence of Groups in Mobile Ad Hoc Networks. CSA 2009: 1-8 - [c12]Jae Joon Ahn, Suk Jun Lee, Kyong Joo Oh, Tae Yoon Kim, Hyoung Yong Lee, Min Sik Kim:
Machine Learning Algorithm Selection for Forecasting Behavior of Global Institutional Investors. HICSS 2009: 1-9 - [c11]Shariful Hasan Shaikot, Min Sik Kim:
npf-a simple, traffic-adaptive packet classifier using on-line reorganization of rule trees. LCN 2009: 899-906 - 2008
- [c10]Atsushi Yoshioka, Shariful Hasan Shaikot, Min Sik Kim:
Rule Hashing for Efficient Packet Classification in Network Intrusion Detection. ICCCN 2008: 614-619 - 2007
- [c9]Atsushi Yoshioka, Min Sik Kim:
Traffic-aware packet matching for intrusion detection systems. BROADNETS 2007: 309-310 - [c8]Yong Wang, Min Sik Kim:
Bandwidth-adaptive Clustering for Mobile Ad Hoc Networks. ICCCN 2007: 103-108 - 2006
- [c7]Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S. Lam, Edward J. Powers:
Scalable Clustering of Internet Paths by Shared Congestion. INFOCOM 2006 - 2005
- [c6]Min Sik Kim, Yi Li, Simon S. Lam:
Eliminating Bottlenecks in Overlay Multicast. NETWORKING 2005: 893-905 - 2004
- [c5]Taekhyun Kim, YongJune Shin, Edward J. Powers, Min Sik Kim, Simon S. Lam:
Application of wavelet denoising to the detection of shared congestion in overlay multimedia networks. MMSP 2004: 474-477 - [c4]Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S. Lam, Edward J. Powers:
A wavelet-based approach to detect shared congestion. SIGCOMM 2004: 293-306 - 2003
- [c3]Min Sik Kim, Simon S. Lam, Dong-Young Lee:
Optimal Distribution Tree for Internet Streaming Media. ICDCS 2003: 116-125 - 2001
- [c2]Yang Richard Yang, Min Sik Kim, Simon S. Lam:
Transient Behaviors of TCP-friendly Congestion Control Protocols. INFOCOM 2001: 1716-1725 - 2000
- [c1]Yang Richard Yang, Min Sik Kim, Simon S. Lam:
Optimal Partitioning of Multicast Receivers. ICNP 2000: 129-140
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint