Kuinam J. Kim
According to our database1,
Kuinam J. Kim
authored at least 63 papers
between 2003 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Improvement of malware detection and classification using API call sequence alignment and visualization.
Clust. Comput., 2019
Design of network threat detection and classification based on machine learning on cloud computing.
Clust. Comput., 2019
Clust. Comput., 2019
Clust. Comput., 2019
2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Secure Route Optimization Scheme for Network Mobility Support in Heterogeneous Mobile Networks.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Object Tracking and Recognition Based on Reliability Assessment of Learning in Mobile Environments.
Wirel. Pers. Commun., 2017
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service.
Wirel. Pers. Commun., 2017
A scheme of AR-based personalized interactive broadcasting service in terrestrial digital broadcasting system.
Clust. Comput., 2017
Clust. Comput., 2017
Proceedings of the Information Science and Applications 2017, 2017
2016
A feature selection approach to find optimal feature subsets for the network intrusion detection system.
Clust. Comput., 2016
Clust. Comput., 2016
Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes.
Clust. Comput., 2016
Proceedings of the 6th International Conference on IT Convergence and Security, 2016
2015
Advanced feature point transformation of corner points for mobile object recognition.
Multim. Tools Appl., 2015
NAND flash memory system based on the Harvard buffer architecture for multimedia applications.
Multim. Tools Appl., 2015
A polymorphic service management scheme based on virtual object for ubiquitous computing environment.
Multim. Tools Appl., 2015
2014
Performance analysis of LTE downlink system using relay-based selective transmission.
Pers. Ubiquitous Comput., 2014
Implementation of a cost-effective home lighting control system on embedded Linux with OpenWrt.
Pers. Ubiquitous Comput., 2014
Pers. Ubiquitous Comput., 2014
PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions.
Multim. Tools Appl., 2014
Multim. Tools Appl., 2014
Categorization for grouping associative items using data mining in item-based collaborative filtering.
Multim. Tools Appl., 2014
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014
2013
Special Issue on "Recent Trends on Convergence Personal Wireless System" - Selected Topics from the ICITCS Conference on December 5-7 2012 in Pyeongchang, Korea.
Wirel. Pers. Commun., 2013
A Study on Convergence Security System for Preventing Leakage of Internal Information.
Wirel. Pers. Commun., 2013
Clust. Comput., 2013
A Study on Improvement Measures of Remote Diligence / Laziness Management Applying NFC.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
A Study on Improvement Measures of Unmanned Security System against Security Threats.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
The Efficient Security Management Measures Using K2-SMS in Case of Security Transport.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
2012
Clust. Comput., 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
2007
Proceedings of the Computational Science and Its Applications, 2007
Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique.
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Selected Papers of the Fifth International Conference on, 2007
2006
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2004
Proceedings of the Computational Science, 2004
2003
Improved Structure Management of Gateway Firewall Systems for Effective Networks Security.
Proceedings of the Computer and Information Sciences, 2003
Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database.
Proceedings of the Computer and Information Sciences, 2003
Proceedings of the Computational Science and Its Applications, 2003
Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks.
Proceedings of the Computational Science - ICCS 2003, 2003
Proceedings of the Computational Science - ICCS 2003, 2003