Jeong-Nyeo Kim
Orcid: 0000-0002-7134-0622
According to our database1,
Jeong-Nyeo Kim
authored at least 61 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.
Sensors, March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
2022
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022
2021
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
Sensors, 2021
2020
TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things.
Comput. Networks, 2020
Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
2019
IEEE Access, 2019
2018
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications.
J. Supercomput., 2018
Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications.
CoRR, 2018
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
2017
Wirel. Networks, 2017
Mob. Inf. Syst., 2017
Int. J. Adv. Media Commun., 2017
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017
2016
J. Supercomput., 2016
IET Commun., 2016
EURASIP J. Wirel. Commun. Netw., 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
2015
IEEE Trans. Consumer Electron., 2015
Mob. Inf. Syst., 2015
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization.
Int. J. Distributed Sens. Networks, 2015
Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device.
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
A method based on platform integrity verification for activating a mobile trusted module.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
Proceedings of the Second International Conference on Computer Science, 2015
2014
Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence.
J. Supercomput., 2014
Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment.
Multim. Tools Appl., 2014
Improving performance of X-rated video classification with the optimized repeated curve-like spectrum feature and the skip-and-analysis processing.
Multim. Tools Appl., 2014
J. Netw. Comput. Appl., 2014
J. Intell. Manuf., 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Protection method from APP repackaging attack on mobile device with separated domain.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
User-defined privilege restriction mechanism for secure execution environments on Android.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Proceedings of the IEEE International Conference on Consumer Electronics, 2014
Smart Network Services Using Ticket Issuance in the TSM (Trusted Software Monitor) System.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
Proceedings of the International Conference on Electronics, Information and Communications, 2014
2013
Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks.
J. Supercomput., 2013
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery.
Informatica, 2013
DroidVulMon - Android Based Mobile Device Vulnerability Analysis and Monitoring System.
Proceedings of the Seventh International Conference on Next Generation Mobile Apps, 2013
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
2012
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2010
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram.
Proceedings of the Information Security Applications - 11th International Workshop, 2010
2008
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008
2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
2005
Design and Implementation of a Gigabit Router using Network Processor.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005
Design of Packet Filtering on Network Processor.
Proceedings of The 2005 International Conference on Security and Management, 2005
2004
IEICE Trans. Inf. Syst., 2004
Fault/Attack Tolerant Recovery Mechanism Under SRLG Constraint in the Next Generation Optical VPN.
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004
An Efficient Divider Architecture over GF(2<sup>m</sup>) for Elliptic Curve Cryptography.
Proceedings of the International Conference on Embedded Systems and Applications, 2004
2003
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003
Design of Policy-Based Security Management for Intrusion Detection.
Proceedings of the International Conference on Security and Management, 2003
Improve Network Security with Kernel-Level Intrusion Detection Sensor.
Proceedings of the International Conference on Security and Management, 2003
2002
ICFS: Integrated Crypto-FileSystem into Vnode Layer using Access Control.
Proceedings of the Internet and Multimedia Systems and Applications, 2002