Young-Hoon Moon

Learn More
As the cyber-attack trends are shifted from the volumetric attacks to the multi-layered attacks, it is more difficult for the IT administrators to find those attack attempts within their system and networks. However, vulnerability assessment is not easy due to the complex connections between multi-layered applications, servers, and networks. There are many(More)
In this paper we suggest an evolutionary computational approach by applying a combination of a genetic algorithm and a tabu search to obtain a good solution for relatively large unidirectional automated guided vehicle flowpath design problems. Unidirectional flowpaths are used to lessen the traffic control loads for large fleets of vehicles and to increase(More)
  • 1