Hoh Peter In

Orcid: 0000-0003-4192-4122

According to our database1, Hoh Peter In authored at least 110 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SC-CAAC: A Smart-Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems.
IEEE Internet Things J., June, 2024

DataMesh+: A Blockchain-Powered Peer-to-Peer Data Exchange Model for Self-Sovereign Data Marketplaces.
Sensors, March, 2024

Performance evaluation of a quantum-resistant Blockchain: a comparative study with Secp256k1 and Schnorr.
Quantum Inf. Process., March, 2024

Q-RTOP: Quantum-Secure Random Transaction Ordering Protocol for Mitigating Maximal Extractable Value Attacks in Blockchains With a Priority Gas-Fee Policy.
IEEE Access, 2024

2023
Multitier Web System Reliability: Identifying Causative Metrics and Analyzing Performance Anomaly Using a Regression Model.
Sensors, February, 2023

A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs.
IEEE Trans. Serv. Comput., 2023

Decentralized Global Copyright System Based on Consortium Blockchain With Proof of Authority.
IEEE Access, 2023

A Blockchain-based Trustworthy and Secure Review System for Decentralized e-Portfolio Platforms.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

2022
A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme.
Sensors, 2022

B-GPS: Blockchain-Based Global Positioning System for Improved Data Integrity and Reliability.
ISPRS Int. J. Geo Inf., 2022

A Comparative Analysis of Proof-of-Authority Consensus Algorithms: Aura vs Clique.
Proceedings of the IEEE International Conference on Services Computing, 2022

2021
A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR.
Sensors, 2021

Towards Context-Aware Smart Contracts for Blockchain IoT Systems.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

SmartBuilder: A Block-based Visual Programming Framework for Smart Contract Development.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Topic Modeling Based Warning Prioritization from Change Sets of Software Repository.
J. Comput. Sci. Technol., 2020

Investigating the Relationship Between Mutants and Real Faults with Respect to Mutated Code.
Int. J. Softw. Eng. Knowl. Eng., 2020

Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior.
Int. J. Hum. Comput. Stud., 2020

Overlap-aware rapid type analysis for constructing one-to-one matched call graphs in regression test selection.
IET Softw., 2020

GUI information-based interaction logging and visualization for asynchronous usability testing.
Expert Syst. Appl., 2020

Introduction to the Minitrack on Blockchain Engineering.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Automatic Stop Word Generation for Mining Software Artifact Using Topic Model with Pointwise Mutual Information.
IEICE Trans. Inf. Syst., 2019

2018
Measuring the Degree of Content Immersion in a Non-experimental Environment Using a Portable EEG Device.
J. Inf. Process. Syst., 2018

2017
EURECA: End-user requirements engineering with collaborative animation.
Softw. Pract. Exp., 2017

A probabilistic approach to building defect prediction model for platform-based product lines.
Int. Arab J. Inf. Technol., 2017

2016
Developer Micro Interaction Metrics for Software Defect Prediction.
IEEE Trans. Software Eng., 2016

Value-Driven V-Model: From Requirements Analysis to Acceptance Testing.
IEICE Trans. Inf. Syst., 2016

2015
A survey: energy exhausting attacks in MAC protocols in WBANs.
Telecommun. Syst., 2015

An adaptive loss protection for video transmission over content-centric networks.
Multim. Tools Appl., 2015

Probabilistic Approach to Predicting Risk in Software Projects Using Software Repository Data.
Int. J. Softw. Eng. Knowl. Eng., 2015

Effect Analysis of Coding Convention Violations on Readability of Post-Delivered Code.
IEICE Trans. Inf. Syst., 2015

Situation-awareness overheating protection solution for mobile devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

2014
Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks.
KSII Trans. Internet Inf. Syst., 2014

Self-adaptive testing to determine sample size for flash memory solutions.
KSII Trans. Internet Inf. Syst., 2014

A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks.
Inf. Sci., 2014

3G IP Multimedia Subsystem based framework for lawful interception.
Ann. des Télécommunications, 2014

8<sup>th</sup> International Workshop on Dynamic Software Product Lines (DSPL 2014).
Proceedings of the 18th International Software Product Line Conference, 2014

Customer Requirements Validation Method Based on Mental Models.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
Sustainable Embedded Software Life-Cycle Planning.
IEEE Softw., 2013

Selfish attacks and detection in cognitive radio Ad-Hoc networks.
IEEE Netw., 2013

Adaptive Retransmission Scheme for Video Streaming over Content-Centric Wireless Networks.
IEEE Commun. Lett., 2013

7<sup>th</sup> International Workshop on Dynamic Software Product Lines (DSPL 2013).
Proceedings of the 17th International Software Product Line Conference, 2013

2012
Adaptive pattern mining model for early detection of botnet-propagation scale.
Secur. Commun. Networks, 2012

Low-Cost H.264/AVC Inter Frame Mode Decision Algorithm for Mobile Communication Systems.
Mob. Networks Appl., 2012

Stakeholder Conflict Resolution Model (S-CRM) Based On Supervised Learning.
KSII Trans. Internet Inf. Syst., 2012

Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis.
Proceedings of the Information Security and Privacy Research, 2012

2011
Customer Requirements Elicitation based on Social Network Service.
KSII Trans. Internet Inf. Syst., 2011

Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS).
KSII Trans. Internet Inf. Syst., 2011

Mobile user-preference-based data dissemination on mobile P2P networks.
EURASIP J. Wirel. Commun. Netw., 2011

Micro interaction metrics for defect prediction.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

2010
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs.
KSII Trans. Internet Inf. Syst., 2010

A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks.
IEICE Trans. Inf. Syst., 2010

Learning-based Threshold Estimation Model for Detection of Botnet Malicious Activities.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
A seamless lawful interception architecture for mobile users in IEEE 802.16e networks.
J. Commun. Networks, 2009

A situation-aware cross-platform architecture for ubiquitous game.
Comput. Informatics, 2009

Scalable attack graph for risk assessment.
Proceedings of the 2009 International Conference on Information Networking, 2009

Defending Battery Exhaustion Attacks on Mobile Systems.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

A Prioritized Multi-queue Method for H.264/AVC Live Streaming in Wireless Networks.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
VIRE: Sailing a Blue Ocean with Value-Innovative Requirements.
IEEE Softw., 2008

Customer Value-based HW/SW Partitioning Decision in Embedded Systems.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Effective Security Safeguard Selection Process for Return on Security Investment.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Making every student a winner: The WinWin approach in software engineering education.
J. Syst. Softw., 2007

Effective Appliance Selection by Complementary Context Feeding in Smart Home System.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2007

Situation-Aware Based Self-adaptive Architecture for Mission Critical Systems.
Proceedings of the Embedded Software and Systems, [Third] International Conference, 2007

Conflict Resolution Model Based on Weight in Situation Aware Collaboration System.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

Cyber Threat Trend Analysis Model Using HMM.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Effective Service Decision Using Ambient-Based HHMM in Smart Home System.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

The Value Gap Model: Value-Based Requirements Elicitation.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
A quality-based cost estimation model for the product line life cycle.
Commun. ACM, 2006

Cascade Damage Estimation Model for Internet Attacks.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

Situation aware RFID system: evaluating abnormal behavior detecting approach.
Proceedings of the Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems and the Second International Workshop on Collaborative Computing, 2006

A Situation Aware Personalization in Ubiquitous Mobile Computing Environments.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

The Partitioning Methodology in Hardware/Software Co-Design Using Extreme Programming: Evaluation through the Lego Robot Project.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
A message conversion system, XML-based metadata semantics description language and metadata repository.
J. Inf. Sci., 2005

From requirements negotiation to software architecture decisions.
Inf. Softw. Technol., 2005

Adaptation Policies for Web Server Intrusion-Tolerant System.
IEICE Trans. Commun., 2005

A Comparative Evaluation of Query Modeling Cost of SQL/MDR.
Proceedings of the Third ACIS International Conference on Software Engineering, 2005

Software Engineering Issues for Ubiquitous Entertainment Service.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.
Proceedings of the Information Security and Cryptology, 2005

Security Risk Vector for Quantitative Asset Assessment.
Proceedings of the Computational Science and Its Applications, 2005

The Performance Estimation of the Situation Awareness RFID System from Ubiquitous Environment Scenario.
Proceedings of the Embedded and Ubiquitous Computing, 2005

TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Requirements Negotiation Using Multi-Criteria Preference Analysis.
J. Univers. Comput. Sci., 2004

Inconsistency Detection of Authorization Policies in Distributed Component Environment.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Q-MAR: An Adaptive QoS Management Model for Situation-Aware Middleware.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Analyzing Web Interfaces of Databases for Retrieving Web Information.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

A Scalable, Ordered Scenario-Based Network Security Simulator.
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004

Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios.
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004

Simulating Groundwater Transport Process Using a Vertical Heterogeneity Model: A Case Study.
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004

A Security Risk Analysis Model for Information Systems.
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004

Dynamic Enclose Cell Routing in Mobile Sensor Networks.
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004

SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing.
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004

Towards Situation-Aware Cross-Platform Ubi-Game Development.
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004

Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme.
Proceedings of the Advances in Information Systems, Third International Conference, 2004

2003
A Prototype of Information Requirement Elicitation in m-Commerce.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

Web-Based Feature Reduction System: A Case Study.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

Situation-Aware Contract Specification Language for Middleware for Ubiquitous Computing.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

Q-MAR: A QoS Resource Conflict Identification Model for Situation-Aware Middleware.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

2002
SmartClick: An Enabler for Human-Centered Wireless Web Service.
Proceedings of the Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS'02), 2002

A Shared Information System Architecture for Integrating Risk Management Tools: A Case Study.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Multi-Criteria Preference Analysis for Systematic Requirements Negotiation.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Using WinWin Quality Requirements Management Tools: A Case Study.
Ann. Softw. Eng., 2001

Issues of Visualized Conflict Resolution.
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001

A Requirements Negotiation Model Based on Multi-Criteria Analysis.
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001

Applying WinWin to Quality Requirements: A Case Study.
Proceedings of the 23rd International Conference on Software Engineering, 2001

Visualization Issues for Software Requirements Negotiation.
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001

2000
Transforming Legacy Energy Management System (EMS) Modules into Reusable Components: A Case Study.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
Initial Design of the "Plug-n-Analyze" Framework for Architecture Tradeoff Analysis.
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

1996
Identifying Quality-Requirement Conflicts.
IEEE Softw., 1996

Software Cost Option Strategy Tool (S-COST).
Proceedings of the COMPSAC '96, 1996


  Loading...