Dongkyoo Shin

Orcid: 0000-0002-2665-3339

According to our database1, Dongkyoo Shin authored at least 116 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Study on Network Anomaly Detection Using Fast Persistent Contrastive Divergence.
Symmetry, September, 2024

A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework.
Inf., 2024

Research on Quantitative Prioritization Techniques for Selecting Optimal Security Measures.
IEEE Access, 2024

Research on Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix.
IEEE Access, 2024

2023
BGP Dataset-Based Malicious User Activity Detection Using Machine Learning.
Inf., 2023

Detecting Abnormal Behaviors in Dementia Patients Using Lifelog Data: A Machine Learning Approach.
Inf., 2023

Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study.
Inf., 2023

Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities.
IEEE Access, 2023

Mission Impact Analysis by Measuring the Effect on Physical Combat Operations Associated With Cyber Asset Damage.
IEEE Access, 2023

2022
Mission-Based Cybersecurity Test and Evaluation of Weapon Systems in Association with Risk Management Framework.
Symmetry, November, 2022

Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method.
IEEE Access, 2022

Study on Cyber Attack Damage Assessment Framework.
IEEE Access, 2022

A study on the application of mission-based cybersecurity testing and evalulation of weapon systems.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

2021
Automatic Malicious Code Classification System through Static Analysis Using Machine Learning.
Symmetry, 2021

Wireless Sensor Network (WSN) Configuration Method to Increase Node Energy Efficiency through Clustering and Location Information.
Symmetry, 2021

Scenario-based cyber attack·defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network.
Multim. Tools Appl., 2021

Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness.
KSII Trans. Internet Inf. Syst., 2021

Study on Network Intrusion Detection Method Using Discrete Pre-Processing Method and Convolution Neural Network.
IEEE Access, 2021

Host-Based Intrusion Detection Model Using Siamese Network.
IEEE Access, 2021

Network Anomaly Detection Using Memory-Augmented Deep Autoencoder.
IEEE Access, 2021

Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups.
IEEE Access, 2021

2020
Method for Effectiveness Assessment of Electronic Warfare Systems in Cyberspace.
Symmetry, 2020

Sensor-Based Deviant Behavior Detection System Using Deep Learning to Help Dementia Caregivers.
IEEE Access, 2020

Operation Framework Including Cyber Warfare Execution Process and Operational Concepts.
IEEE Access, 2020

A CFI Countermeasure Against GOT Overwrite Attacks.
IEEE Access, 2020

Neuro-Feedback System Enhancing the Level of Symmetry in Left and Right Brain Activities.
IEEE Access, 2020

2019
A Computationally Efficient Joint Cell Search and Frequency Synchronization Scheme for LTE Machine-Type Communications.
Symmetry, 2019

Generalizing Hamming+k data hiding by overlapped pixels.
Multim. Tools Appl., 2019

Attack Detection Application with Attack Tree for Mobile System using Log Analysis.
Mob. Networks Appl., 2019

Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment.
J. Real Time Image Process., 2019

Data Hiding Using Sequential Hamming + k with m Overlapped Pixels.
KSII Trans. Internet Inf. Syst., 2019

Fast attack detection system using log analysis and attack tree generation.
Clust. Comput., 2019

Efficient Estimation Algorithm of Carrier Frequency Offset for LTE Machine-Type Communication Using Frequency Hopping.
IEEE Access, 2019

Prediction System for Fine Particulate Matter Concentration Index by Meteorological and Air Pollution Material Factors Based on Machine Learning.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

Design and Implementation of Web Browser Secure Storage for Web Standard Authentication Based on FIDO.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

Sensor-based Abnormal Behavior Detection Using Autoencoder.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

2018
Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques.
Soft Comput., 2018

Personal search system based on android using lifelog and machine learning.
Pers. Ubiquitous Comput., 2018

Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC.
Pers. Ubiquitous Comput., 2018

Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment.
J. Real Time Image Process., 2018

Lossless data hiding for absolute moment block truncation coding using histogram modification.
J. Real Time Image Process., 2018

Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP.
J. Real Time Image Process., 2018

Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR.
KSII Trans. Internet Inf. Syst., 2018

Improving capacity of Hamming (<i>n</i>, <i>k</i>)+1 stego-code by using optimized Hamming + <i>k</i>.
Digit. Signal Process., 2018

Separable reversible data hiding in encrypted halftone image.
Displays, 2018

Improvement of JPEG XT Floating-Point HDR Image Coding Using Region Adaptive Prediction.
IEEE Access, 2018

Ubiquitous Healthcare System for Analysis of Chronic Patients' Biological and Lifelog Data.
IEEE Access, 2018

Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Development of emotion recognition interface using complex EEG/ECG bio-signal for interactive contents.
Multim. Tools Appl., 2017

Hand-Mouse Interface Using Virtual Monitor Concept for Natural Interaction.
IEEE Access, 2017

Real-Time Human Depression Diagnosis System Using Brain Wave Analysis.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

System Information Comparison and Analysis Technology for Cyber Attacks.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Life Log Collection and Analysis System Using Mobile Device.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Study on Customer Rating Using RFM and K-Means.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural Network.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
System architecture using human interaction markup language for context awareness in home network.
Multim. Tools Appl., 2016

Mouse operation on monitor by interactive analysis of intuitive hand motions.
Multim. Tools Appl., 2016

Real-Time Recognition Method of Counting Fingers for Natural User Interface.
KSII Trans. Internet Inf. Syst., 2016

Secure protection of video recorder video in smart car.
Int. J. Distributed Sens. Networks, 2016

Implicit Correlation Intensity Mining Based on the Monte Carlo Method with Attenuation.
Proceedings of the International Conference on Identification, 2016

Stackelberg Game Based Optimal Workload Allocation and Pricing Mechanism in Crowdsourcing.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2014
A secret sharing scheme for EBTC using steganography.
J. Intell. Manuf., 2014

Ubiquitous Health Management System with Watch-Type Monitoring Device for Dementia Patients.
J. Appl. Math., 2014

Intuitive Hand Motion Recognition and NUI/NUX Framework.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Smart Watch and Monitoring System for Dementia Patients.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home Services.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Emotion Recognition Technique Using Complex Biomedical Signal Analysis.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
Research on a Smart Input Device Using Multimodal Bio-signal Interface.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Data Hiding in a Halftone Image Using Hamming Code (15, 11).
Proceedings of the Intelligent Information and Database Systems, 2011

2010
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping.
KSII Trans. Internet Inf. Syst., 2010

Human Movement Detection Algorithm Using 3-Axis Accelerometer Sensor Based on Low-Power Management Scheme for Mobile Health Care System.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010

2009
Real-Time Tracking of Human Location and Motion using Cameras in a Ubiquitous Smart Home.
KSII Trans. Internet Inf. Syst., 2009

Real-Time Human Tracker Based on Location and Motion Recognition of User for Smart Home.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Fundamentals and Design of Smart Home Middleware.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Towards an Emotion Recognition System Based on Biometrics.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Effective Diagnosis of Heart Disease through Bagging Approach.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
An XML Based User Context Language for Personalized Service in Ubiquitous Digital Library.
Proceedings of the ALPIT 2008, 2008

2007
Integration of Distributed Biological Data Using Modified K-Means Algorithm.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

2006
Intelligent Pervasive Middleware Based on Biometrics.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Real-Time Human Tracker Based Location and Motion Recognition for the Ubiquitous Smart Home.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Ubiquitous Intelligent Sensing System for a Smart Home.
Proceedings of the Structural, 2006

Research on Multi-Agent Service Bundle Middleware for Smart Space.
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006

Research on Smart Multi-agent Middleware for RFID-Based Ubiquitous Computing Environment.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Multi-user Human Tracking Agent for the Smart Home.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Research on Design and Implementation of Adaptive Physics Game Agent for 3D Physics Game.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Intelligent Game Agent Based Physics Engine for Intelligent Non Player Characters.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

An XML-Based Security Architecture for Integrating Single Sign-On and Rule-Based Access Control in Mobile and Ubiquitous Web Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Structural Similarity Mining in Semi-structured Microarray Data for Efficient Storage Construction.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Design and Implementation of a Game Physics Editor Using XML.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006

Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
Intellectual property management on MPEG-4 video for hand-held device and mobile video streaming service.
IEEE Trans. Consumer Electron., 2005

Research and implementation of the context-aware middleware for controlling home appliances.
IEEE Trans. Consumer Electron., 2005

Design and Implementation of a Service Bundle Manager for Home Network Middleware.
Proceedings of the Advances in Web-Age Information Management, 2005

Research on Design and Implementation of the Artificial Intelligence Agent for Smart Home Based on Support Vector Machine.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Research on Artificial Intelligence Character Based Physics Engine in 3D Car Game.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
An efficient methodology for multimedia digital rights management on mobile handset.
IEEE Trans. Consumer Electron., 2004

An XML-based single sign-on scheme supporting mobile and home network service environments.
IEEE Trans. Consumer Electron., 2004

A Study on the Secure Business Web Service Based on ebXML.
Proceedings of the Web Engineering - 4th International Conference, 2004

Design of a Middleware and HIML (Human Interaction Markup Language) for Context Aware Services in a Ubiquitous Computing Environment.
Proceedings of the Embedded and Ubiquitous Computing, 2004

An Effective Adaptation of Encryption on MPEG-4 Video Streams for Digital Rights Management in an Ubiquitous Computing Environment.
Proceedings of the Embedded and Ubiquitous Computing, 2004

A Study on the XML-Based Single Sign-On System Supporting Mobile and Ubiquitous Service Environments.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Performance Evaluation of Numerical Integration Methods in the Physics Engine.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Java-Based Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Distributed Web Services.
Proceedings of the Advanced Web Technologies and Applications, 2004

Research and Implementation of the Context-Aware Middleware Based on Neural Network.
Proceedings of the Artificial Intelligence and Simulation, 2004

2003
A Study on the Digital Right Management of MPEG-4 Streams for Digital Video Library.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2002
Design and implementation of the SMIL (Synchronized Multimedia Integration Language) player.
IEEE Trans. Consumer Electron., 2002

2000
Efficient data broadcast scheme on wireless link errors.
IEEE Trans. Consumer Electron., 2000

1999
Design and Implementation of a JAVA-based Synchronized Multimedia Integration Language Player.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1997
Region-of-interest-based wavelet compression scheme for medical images.
Proceedings of the Medical Imaging 1997: Image Display, 1997


  Loading...