Dongkyoo Shin
Orcid: 0000-0002-2665-3339
According to our database1,
Dongkyoo Shin
authored at least 116 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Symmetry, September, 2024
A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework.
Inf., 2024
Research on Quantitative Prioritization Techniques for Selecting Optimal Security Measures.
IEEE Access, 2024
Research on Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix.
IEEE Access, 2024
2023
Inf., 2023
Detecting Abnormal Behaviors in Dementia Patients Using Lifelog Data: A Machine Learning Approach.
Inf., 2023
Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study.
Inf., 2023
Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities.
IEEE Access, 2023
Mission Impact Analysis by Measuring the Effect on Physical Combat Operations Associated With Cyber Asset Damage.
IEEE Access, 2023
2022
Mission-Based Cybersecurity Test and Evaluation of Weapon Systems in Association with Risk Management Framework.
Symmetry, November, 2022
Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method.
IEEE Access, 2022
A study on the application of mission-based cybersecurity testing and evalulation of weapon systems.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022
2021
Automatic Malicious Code Classification System through Static Analysis Using Machine Learning.
Symmetry, 2021
Wireless Sensor Network (WSN) Configuration Method to Increase Node Energy Efficiency through Clustering and Location Information.
Symmetry, 2021
Scenario-based cyber attack·defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network.
Multim. Tools Appl., 2021
Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness.
KSII Trans. Internet Inf. Syst., 2021
Study on Network Intrusion Detection Method Using Discrete Pre-Processing Method and Convolution Neural Network.
IEEE Access, 2021
Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups.
IEEE Access, 2021
2020
Symmetry, 2020
Sensor-Based Deviant Behavior Detection System Using Deep Learning to Help Dementia Caregivers.
IEEE Access, 2020
Operation Framework Including Cyber Warfare Execution Process and Operational Concepts.
IEEE Access, 2020
Neuro-Feedback System Enhancing the Level of Symmetry in Left and Right Brain Activities.
IEEE Access, 2020
2019
A Computationally Efficient Joint Cell Search and Frequency Synchronization Scheme for LTE Machine-Type Communications.
Symmetry, 2019
Mob. Networks Appl., 2019
Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment.
J. Real Time Image Process., 2019
KSII Trans. Internet Inf. Syst., 2019
Clust. Comput., 2019
Efficient Estimation Algorithm of Carrier Frequency Offset for LTE Machine-Type Communication Using Frequency Hopping.
IEEE Access, 2019
Prediction System for Fine Particulate Matter Concentration Index by Meteorological and Air Pollution Material Factors Based on Machine Learning.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019
Design and Implementation of Web Browser Secure Storage for Web Standard Authentication Based on FIDO.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019
2018
Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques.
Soft Comput., 2018
Pers. Ubiquitous Comput., 2018
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC.
Pers. Ubiquitous Comput., 2018
Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment.
J. Real Time Image Process., 2018
Lossless data hiding for absolute moment block truncation coding using histogram modification.
J. Real Time Image Process., 2018
Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP.
J. Real Time Image Process., 2018
Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR.
KSII Trans. Internet Inf. Syst., 2018
Improving capacity of Hamming (<i>n</i>, <i>k</i>)+1 stego-code by using optimized Hamming + <i>k</i>.
Digit. Signal Process., 2018
Improvement of JPEG XT Floating-Point HDR Image Coding Using Region Adaptive Prediction.
IEEE Access, 2018
Ubiquitous Healthcare System for Analysis of Chronic Patients' Biological and Lifelog Data.
IEEE Access, 2018
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection.
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Development of emotion recognition interface using complex EEG/ECG bio-signal for interactive contents.
Multim. Tools Appl., 2017
IEEE Access, 2017
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
2016
System architecture using human interaction markup language for context awareness in home network.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
KSII Trans. Internet Inf. Syst., 2016
Int. J. Distributed Sens. Networks, 2016
Implicit Correlation Intensity Mining Based on the Monte Carlo Method with Attenuation.
Proceedings of the International Conference on Identification, 2016
Stackelberg Game Based Optimal Workload Allocation and Pricing Mechanism in Crowdsourcing.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2014
Ubiquitous Health Management System with Watch-Type Monitoring Device for Dementia Patients.
J. Appl. Math., 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home Services.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
2012
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012
2011
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Intelligent Information and Database Systems, 2011
2010
KSII Trans. Internet Inf. Syst., 2010
Human Movement Detection Algorithm Using 3-Axis Accelerometer Sensor Based on Low-Power Management Scheme for Mobile Health Care System.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010
2009
Real-Time Tracking of Human Location and Motion using Cameras in a Ubiquitous Smart Home.
KSII Trans. Internet Inf. Syst., 2009
Real-Time Human Tracker Based on Location and Motion Recognition of User for Smart Home.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2008
An XML Based User Context Language for Personalized Service in Ubiquitous Digital Library.
Proceedings of the ALPIT 2008, 2008
2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Real-Time Human Tracker Based Location and Motion Recognition for the Ubiquitous Smart Home.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Structural, 2006
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006
Research on Smart Multi-agent Middleware for RFID-Based Ubiquitous Computing Environment.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006
Proceedings of the Agent Computing and Multi-Agent Systems, 2006
Research on Design and Implementation of Adaptive Physics Game Agent for 3D Physics Game.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006
Proceedings of the Agent Computing and Multi-Agent Systems, 2006
An XML-Based Security Architecture for Integrating Single Sign-On and Rule-Based Access Control in Mobile and Ubiquitous Web Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Structural Similarity Mining in Semi-structured Microarray Data for Efficient Storage Construction.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006
Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing.
Proceedings of the Frontiers of WWW Research and Development, 2006
2005
Intellectual property management on MPEG-4 video for hand-held device and mobile video streaming service.
IEEE Trans. Consumer Electron., 2005
Research and implementation of the context-aware middleware for controlling home appliances.
IEEE Trans. Consumer Electron., 2005
Proceedings of the Advances in Web-Age Information Management, 2005
Research on Design and Implementation of the Artificial Intelligence Agent for Smart Home Based on Support Vector Machine.
Proceedings of the Advances in Natural Computation, First International Conference, 2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005
The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
2004
IEEE Trans. Consumer Electron., 2004
An XML-based single sign-on scheme supporting mobile and home network service environments.
IEEE Trans. Consumer Electron., 2004
Proceedings of the Web Engineering - 4th International Conference, 2004
Design of a Middleware and HIML (Human Interaction Markup Language) for Context Aware Services in a Ubiquitous Computing Environment.
Proceedings of the Embedded and Ubiquitous Computing, 2004
An Effective Adaptation of Encryption on MPEG-4 Video Streams for Digital Rights Management in an Ubiquitous Computing Environment.
Proceedings of the Embedded and Ubiquitous Computing, 2004
A Study on the XML-Based Single Sign-On System Supporting Mobile and Ubiquitous Service Environments.
Proceedings of the Embedded and Ubiquitous Computing, 2004
Proceedings of the Computational and Information Science, First International Symposium, 2004
Java-Based Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Distributed Web Services.
Proceedings of the Advanced Web Technologies and Applications, 2004
Proceedings of the Artificial Intelligence and Simulation, 2004
2003
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003
Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
2002
Design and implementation of the SMIL (Synchronized Multimedia Integration Language) player.
IEEE Trans. Consumer Electron., 2002
2000
IEEE Trans. Consumer Electron., 2000
1999
Design and Implementation of a JAVA-based Synchronized Multimedia Integration Language Player.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
1997
Proceedings of the Medical Imaging 1997: Image Display, 1997