Dao Nhu Ngoc
  Yonghun Kim
  Seohyeon Jeong
  Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.[citation needed] Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
N. Dao, J. Kim, M. Park, and S. Cho, "Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-based Convergent Networks," PLoS ONE, vol. 11, no. 8 , June 2016. [PDF]

W. Na and S. Cho, "MAC security for IEEE 802.15.8 PAC (doc)," IEEE P802.15 TG8 standardization, March 2015. (Doc#: IEEE 802. 15-15-0254-00-0008)
W. Na and S. Cho, "MAC security for IEEE 802.15.8 PAC," IEEE P802.15 TG8 standardization, March 2015. (Doc#: IEEE 802. 15-15-0253-00-0008)
N.-N. Dao, J. Park, M. Park, and S. Cho "A Feasible Method to combat against DDoS Attack in SDN Network," in Proc. of ICOIN, Siem Reap, Cambodia, January 2015. [PDF]
, 漱, , ؿ, , , , , , "4G Ʈũ ׷ (Group-based Authentication in 4G Network)," ѱȸ мǥȸ, , January 2017.