Ilsun You
Orcid: 0000-0002-0604-3445Affiliations:
- Kookmin University, Department of Financial Information Security, Seoul, South Korea
- Soonchunhyang University, Department of Information Security Engineering, Asan, South Korea
- Korean Bible University, Department of Information Science, Seoul, South Korea
- Kyushu University, Japan (PhD 2012)
- Dankook University, Department of Electronics and Computer Engineering, Seoul, South Korea (PhD 2002)
According to our database1,
Ilsun You
authored at least 362 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orkg.org
-
on orcid.org
-
on isyou.info
On csauthors.net:
Bibliography
2024
Adaptive Service Provisioning for Dynamic Resource Allocation in Network Digital Twin.
IEEE Netw., January, 2024
Sensors, 2024
A Study on the Implementation of a Network Function for Real-time False Base Station Detection for the Next Generation Mobile Communication Environment.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2024
FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system.
Int. J. Ad Hoc Ubiquitous Comput., 2024
Decentralized Real-Time IIoT Data Integrity Verification System and Its Comprehensive Analysis.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
2023
IEEE Syst. J., December, 2023
Sensors, December, 2023
IEEE Commun. Mag., August, 2023
Towards secure asynchronous messaging with forward secrecy and mutual authentication.
Inf. Sci., May, 2023
An Enhanced Deep Learning Neural Network for the Detection and Identification of Android Malware.
IEEE Internet Things J., May, 2023
Blockchain-Based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT Devices.
IEEE J. Biomed. Health Informatics, February, 2023
An Intrusion Detection and Identification System for Internet of Things Networks Using a Hybrid Ensemble Deep Learning Framework.
IEEE Trans. Sustain. Comput., 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
Smart Collaborative Evolvement for Virtual Group Creation in Customized Industrial IoT.
IEEE Trans. Netw. Sci. Eng., 2023
A Smart Retransmission Mechanism for Ultra-Reliable Applications in Industrial Wireless Networks.
IEEE Trans. Ind. Informatics, 2023
APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System.
Sensors, 2023
Comput. Syst. Sci. Eng., 2023
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment.
Comput. Commun., 2023
Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
2022
Empirical Mode Decomposition-empowered Network Traffic Anomaly Detection for Secure Multipath TCP Communications.
Mob. Networks Appl., December, 2022
IEEE Wirel. Commun., 2022
ACM Trans. Internet Techn., 2022
Sensors, 2022
Sensors, 2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
J. Internet Serv. Inf. Secur., 2022
MoTH: Mobile Terminal Handover Security Protocol for HUB Switching Based on 5G and Beyond (5GB) P2MP Backhaul Environment.
IEEE Internet Things J., 2022
AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber-Physical Systems.
IEEE Internet Things J., 2022
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System.
Future Gener. Comput. Syst., 2022
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks.
Connect. Sci., 2022
Comput. Secur., 2022
Introduction to the special section on Smart Green Applications: QoS and Security-aware solutions in collaborative wireless networks (VSI-cwn).
Comput. Electr. Eng., 2022
Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security Vulnerabilities.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022
A Hybrid Deep Neural Network for Classifying Transportation Modes based on Human Activity Vibration.
Proceedings of the 14th International Conference on Knowledge and Smart Technology, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
Proceedings of the APKC '22: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
TrMAps: Trust Management in Specification-Based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System.
IEEE J. Biomed. Health Informatics, 2021
Smart Collaborative Balancing for Dependable Network Components in Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
Mobile Edge Cooperation Optimization for Wearable Internet of Things: A Network Representation-Based Framework.
IEEE Trans. Ind. Informatics, 2021
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019).
Sensors, 2021
Bluetooth 5.1: An Analysis of Direction Finding Capability for High-Precision Location Services.
Sensors, 2021
Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone.
Sensors, 2021
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols.
Sensors, 2021
IEEE Netw., 2021
Mob. Networks Appl., 2021
Mob. Networks Appl., 2021
Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems.
Int. J. Mach. Learn. Cybern., 2021
Scrutinizing the Vulnerability of Ephemeral Diffie-Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches.
Mob. Inf. Syst., 2021
A fuzzy control system for energy-efficient wireless devices in the Internet of vehicles.
Int. J. Intell. Syst., 2021
IEEE Access, 2021
A Formally Verified Security Scheme for Inter-gNB-DU Handover in 5G Vehicle-to-Everything.
IEEE Access, 2021
Behavior-Rule Specification-based IDS for Safety-Related Embedded Devices in Smart Home.
Proceedings of the 2021 World Automation Congress, 2021
Proceedings of the 2021 World Automation Congress, 2021
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
Proceedings of the International Conference on Electronics, Information, and Communication, 2021
2020
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems.
IEEE Trans. Netw. Serv. Manag., 2020
Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks.
IEEE Trans. Ind. Informatics, 2020
Efficient Resource Allocation for Backhaul-Aware Unmanned Air Vehicles-to-Everything (U2X).
Sensors, 2020
Toward Efficient Image Recognition in Sensor-Based IoT: A Weight Initialization Optimizing Method for CNN Based on RGB Influence Proportion.
Sensors, 2020
IEEE Netw., 2020
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process.
Mob. Inf. Syst., 2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Smart Collaborative Tracking for Ubiquitous Power IoT in Edge-Cloud Interplay Domain.
IEEE Internet Things J., 2020
Int. J. Ad Hoc Ubiquitous Comput., 2020
Human Arthritis Analysis in Fog Computing Environment Using Bayesian Network Classifier and Thread Protocol.
IEEE Consumer Electron. Mag., 2020
A Smart Collaborative Routing Protocol for Delay Sensitive Applications in Industrial IoT.
IEEE Access, 2020
A Deep Reinforcement Learning Based Approach for Energy-Efficient Channel Allocation in Satellite Internet of Things.
IEEE Access, 2020
Collaborative Cache Allocation and Transmission Scheduling for Multi-User in Edge Computing.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
DMM-SEP: Secure and Efficient Protocol for Distributed Mobility Management Based on 5G Networks.
IEEE Access, 2020
IEEE Access, 2020
A Predictor-Corrector Algorithm Based on Laurent Series for Biological Signals in the Internet of Medical Things.
IEEE Access, 2020
SGF-MD: Behavior Rule Specification-Based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System.
IEEE Access, 2020
Comments on "Securing implantable cardiac medical devices": Use of radio frequency energy harvesting.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
2019
Wirel. Commun. Mob. Comput., 2019
IEEE Trans. Netw. Serv. Manag., 2019
IEEE Trans. Ind. Informatics, 2019
Sensors, 2019
Ultra-Reliable Communications for Industrial Internet of Things: Design Considerations and Channel Modeling.
IEEE Netw., 2019
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019
MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks.
J. Netw. Comput. Appl., 2019
Inf. Sci., 2019
Inf. Sci., 2019
Guest Editorial Special Issue on Intrinsic Hardware Security for Internet of Things Infrastructure.
IEEE Internet Things J., 2019
Int. J. Distributed Sens. Networks, 2019
AIM: Activation increment minimization strategy for preventing bad information diffusion in OSNs.
Future Gener. Comput. Syst., 2019
Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things.
Future Gener. Comput. Syst., 2019
Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover.
Future Gener. Comput. Syst., 2019
EURASIP J. Wirel. Commun. Netw., 2019
An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X).
CoRR, 2019
CoRR, 2019
CoRR, 2019
Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol.
Comput. Electr. Eng., 2019
IEEE Access, 2019
IEEE Access, 2019
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems.
IEEE Access, 2019
Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs).
IEEE Access, 2019
Content Recommendation Algorithm for Intelligent Navigator in Fog Computing Based IoT Environment.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Muscle Activity-Driven Green-Oriented Random Number Generation Mechanism to Secure WBSN Wearable Device Communications.
Wirel. Commun. Mob. Comput., 2018
A software classification scheme using binary-level characteristics for efficient software filtering.
Soft Comput., 2018
Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".
IEEE Syst. J., 2018
An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.
Sensors, 2018
Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things.
Sensors, 2018
Dissimilarity Metric Based on Local Neighboring Information and Genetic Programming for Data Dissemination in Vehicular Ad Hoc Networks (VANETs).
Sensors, 2018
Secur. Commun. Networks, 2018
Shortest feasible paths with partial charging for battery-powered electric vehicles in smart cities.
Pervasive Mob. Comput., 2018
SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems.
IEEE Netw., 2018
J. Netw. Comput. Appl., 2018
J. Netw. Comput. Appl., 2018
MVO-Based 2-D Path Planning Scheme for Providing Quality of Service in UAV Environment.
IEEE Internet Things J., 2018
An anonymous access authentication scheme for vehicular ad hoc networks under edge computing.
Int. J. Distributed Sens. Networks, 2018
OFFRP: optimised fruit fly based routing protocol with congestion control for UAVs guided ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018
CoRR, 2018
Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications.
CoRR, 2018
(<i>P</i><i>U</i>)<sup>2</sup><i>M</i><sup>2</sup>: A potentially underperforming-aware path usage management mechanism for secure MPTCP-based multipathing services.
Concurr. Comput. Pract. Exp., 2018
Comput. Commun., 2018
IEEE Commun. Mag., 2018
IEEE Commun. Mag., 2018
Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices.
IEEE Consumer Electron. Mag., 2018
Comput. Electr. Eng., 2018
IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things.
IEEE Access, 2018
IEEE Access, 2018
Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT).
IEEE Access, 2018
Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018
2017
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence.
IEEE Syst. J., 2017
Sensors, 2017
Sensors, 2017
Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs.
IEEE Netw., 2017
Mob. Inf. Syst., 2017
The Social Relationship Based Adaptive Multi-Spray-and-Wait Routing Algorithm for Disruption Tolerant Network.
Mob. Inf. Syst., 2017
Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles.
J. Netw. Comput. Appl., 2017
J. Netw. Comput. Appl., 2017
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017
A brief overview of intelligent mobility management for future wireless mobile networks.
EURASIP J. Wirel. Commun. Netw., 2017
Special Issue: Foundations and Practice of Security in Emerging ICT Applications.
Comput. Syst. Sci. Eng., 2017
Comput. Networks, 2017
IEEE Access, 2017
Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks.
IEEE Access, 2017
Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing.
IEEE Access, 2017
ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT.
IEEE Access, 2017
SAT-FLOW: Multi-Strategy Flow Table Management for Software Defined Satellite Networks.
IEEE Access, 2017
A LDDoS-Aware Energy-Efficient Multipathing Scheme for Mobile Cloud Computing Systems.
IEEE Access, 2017
Proceedings of the Mobile Internet Security - Second International Symposium, 2017
An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework.
Proceedings of the IoT as a Service - Third International Conference, 2017
Proceedings of the IoT as a Service - Third International Conference, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
2016
J. Supercomput., 2016
IEEE Trans. Ind. Electron., 2016
Soft Comput., 2016
Long-term location privacy protection for location-based services in mobile cloud computing.
Soft Comput., 2016
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Secur. Commun. Networks, 2016
Designing Efficient Mobile Gateway for Impoverished Regions Based on Self-Learning Strategy.
Mob. Inf. Syst., 2016
Energy Efficient Data Dissemination in Multi-UAV Coordinated Wireless Sensor Networks.
Mob. Inf. Syst., 2016
New order preserving encryption model for outsourced databases in cloud environments.
J. Netw. Comput. Appl., 2016
J. Netw. Comput. Appl., 2016
Int. J. Data Warehous. Min., 2016
J. Ambient Intell. Humaniz. Comput., 2016
Int. J. Comput. Math., 2016
IET Commun., 2016
IEICE Trans. Inf. Syst., 2016
Intell. Autom. Soft Comput., 2016
Comput. Stand. Interfaces, 2016
IEEE Access, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Ports Distribution Management for Privacy Protection inside Local Domain Name System.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
2015
IEEE Trans. Computers, 2015
Softw. Pract. Exp., 2015
J. Univers. Comput. Sci., 2015
A secure data encryption method employing a sequential-logic style mechanism for a cloud system.
Int. J. Web Grid Serv., 2015
Int. J. Inf. Manag., 2015
Int. J. Ad Hoc Ubiquitous Comput., 2015
Int. J. Ad Hoc Ubiquitous Comput., 2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract.
Proceedings of the Information and Communication Technology, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
2014
Special Issue on Mobility and Intelligence Management Technologies for Wireless and Mobile Networks.
Wirel. Pers. Commun., 2014
Wirel. Pers. Commun., 2014
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.
J. Supercomput., 2014
Soft Comput., 2014
Soft Comput., 2014
Soft Comput., 2014
J. Netw. Comput. Appl., 2014
J. Internet Serv. Inf. Secur., 2014
J. Ambient Intell. Humaniz. Comput., 2014
J. Ambient Intell. Humaniz. Comput., 2014
Int. J. Parallel Program., 2014
Towards cost efficient mobile service and information management in ubiquitous environment with cloud resource scheduling.
Int. J. Inf. Manag., 2014
Int. J. Commun. Syst., 2014
Intell. Autom. Soft Comput., 2014
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Gener. Comput. Syst., 2014
Special Issue: Mobile Internet Technologies and Services - Editorial.
Comput. Syst. Sci. Eng., 2014
A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies.
Comput. Sci. Inf. Syst., 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Thermal-Aware Task Placement with Dynamic Thermal Model in an Established Datacenter.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid.
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Information and Communication Technology, 2014
Design and analysis of efficient multicast sender mobility scheme for Proxy mobile IPv6.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
IEEE Trans. Ind. Electron., 2013
Hierarchical DHT and proportional replication based mobility management for large-scale mobile Internet.
Math. Comput. Model., 2013
Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution.
Math. Comput. Model., 2013
Math. Comput. Model., 2013
Optimizing the Joint Source/Network Coding for Video Streaming over Multi-hop Wireless Networks.
KSII Trans. Internet Inf. Syst., 2013
Inf. Syst. Frontiers, 2013
Inf. Sci., 2013
Inf. Sci., 2013
Neurocomputing, 2013
Comput. Sci. Inf. Syst., 2013
A topographic-awareness and situational-perception based mobility model with artificial bee colony algorithm for tactical MANET.
Comput. Sci. Inf. Syst., 2013
Comput. Informatics, 2013
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Secur. Commun. Networks, 2012
J. Internet Serv. Inf. Secur., 2012
Editorial: Advanced intelligent and security services in mobile and ubiquitous computing.
J. Intell. Manuf., 2012
J. Intell. Manuf., 2012
Int. J. Ad Hoc Ubiquitous Comput., 2012
Editorial.
Comput. Syst. Sci. Eng., 2012
DSSH: Digital signature based secure handover for network-based mobility management.
Comput. Syst. Sci. Eng., 2012
Editorial.
Comput. Syst. Sci. Eng., 2012
Grid transaction management and an efficient development kit.
Comput. Syst. Sci. Eng., 2012
An efficient deadlock prevention approach for service oriented transaction processing.
Comput. Math. Appl., 2012
Comput. Math. Appl., 2012
Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
Exploring Urban Dynamics Based on Pervasive Sensing: Correlation Analysis of Traffic Density and Air Quality.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: A Case Study.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANET.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Editorial: Special Issue on "Advances in Mobile IPv6 and Network-Based Localized Mobility Management".
Wirel. Pers. Commun., 2011
Wirel. Pers. Commun., 2011
Simul. Model. Pract. Theory, 2011
Simul. Model. Pract. Theory, 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks.
J. Netw. Comput. Appl., 2011
A pipeline-based approach for long transaction processing in web service environments.
Int. J. Web Grid Serv., 2011
Int. J. Ad Hoc Ubiquitous Comput., 2011
Introduction to Special Section on Complex, Intelligent and Software Intensive Systems.
Comput. Informatics, 2011
Comput. Informatics, 2011
Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Analysis of Optimal Query, Fairness and Replication for DHT-based Mobility Management.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Improvements on Sequential Minimal Optimization Algorithm for Support Vector Machine Based on Semi-sparse Algorithm.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
Balanced bipartite graph based register allocation for network processors in mobile and wireless networks.
Mob. Inf. Syst., 2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
caTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks.
Int. J. Commun. Syst., 2010
IEICE Trans. Inf. Syst., 2010
A Special Issue of Intelligent Automation and Soft Computing - Forthcoming Multimedia & Intelligent Services In Ubiquitous And Pervasive Computing.
Intell. Autom. Soft Comput., 2010
Context-Aware Workflow Management For Intelligent Navigation Applications In Pervasive Environments.
Intell. Autom. Soft Comput., 2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
A Dynamic Host Selection Algorithm for Layered Data Storage Architecture in a Pervasive Space.
Proceedings of the CISIS 2010, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
IEICE Trans. Commun., 2009
Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the 2009 International Conference on Complex, 2009
2008
Comput. Informatics, 2008
Proceedings of the 5th International Conference on Mobile Technology, 2008
2007
Advanced Agent-Delegated Route Optimization Protocol for Efficient Multimedia Services at Low-Battery Devices.
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Design and Implementation of a Ubiquitous ECG Monitoring System Using SIP and the Zigbee Network.
Proceedings of the Future Generation Communication and Networking, 2007
A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2006
A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
IEICE Trans. Commun., 2005
2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
Proceedings of the Computational Science and Its Applications, 2004