Sang Hyun Oh

Learn More
In anomaly intrusion detection, how to model the normal behavior of activities performed by a user is an important issue. To extract the normal behavior as a profile, conventional data mining techniques are widely applied to a finite audit data set. However, these approaches can only model the static behavior of a user in the audit data set. This drawback(More)
It is one of the problems in association rules mining that a great many of rules generated from the dataset makes it difficult to analyze and use. An algorithm named FCABTAR for association rules clustering is proposed and applied to association rules managing. Firstly, an example is presented to demonstrate the weakness by the distance clustering.(More)
We studied whether bee venom (BV) inhibits cervical tumor growth through enhancement of death receptor (DR) expressions and inactivation of nuclear factor kappa B (NF-κB) in mice. In vivo study showed that BV (1 mg/kg) inhibited tumor growth. Similar inhibitory effects of BV on cancer growth in primary human cervical cancer cells were also found. BV (1-5(More)