Seong-Moo Yoo
Orcid: 0000-0002-2701-917X
According to our database1,
Seong-Moo Yoo
authored at least 87 papers
between 1995 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IEEE Internet Things J., 2023
2021
Protocol misbehavior detection framework using machine learning classification in vehicular Ad Hoc networks.
Wirel. Networks, 2021
Protocol Misbehavior Analysis Using Multivariate Statistical Analysis and Machine Learning in Vehicular Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2021
2020
Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks.
J. Inf. Secur. Appl., 2020
Int. J. Emerg. Technol. Learn., 2020
Int. J. Emerg. Technol. Learn., 2020
Proceedings of the IEEE Latin-American Conference on Communications, 2020
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020
2019
A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator.
Proceedings of the National Cyber Summit, 2019
Fail-Safe Mechanism Using Entropy Based Misbehavior Classification and Detection in Vehicular Ad Hoc Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Protecting Data Integrity for Multi-Application Environment in Wireless Sensor Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Verifiable Search Meets Blockchain: A Privacy-Preserving Framework for Outsourced Encrypted Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Optimal Threshold Analysis for Triggering Fail-Safe Mechanism in Vehicular Ad Hoc Networks.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
2018
Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks.
Int. J. Wirel. Inf. Networks, 2018
Implementation and Evaluation of Flipped Classroom as IoT Element into Learning Process of Computer Network Education.
Int. J. Inf. Commun. Technol. Educ., 2018
Efficient data association to targets for tracking in passive wireless sensor networks.
Ad Hoc Networks, 2018
Broadcast storm mitigation from unintentional misbehavior in vehicular ad hoc networks.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 2017
2016
E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs.
Wirel. Networks, 2016
A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators.
Comput. Oper. Res., 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016
2015
KSII Trans. Internet Inf. Syst., 2015
Extended self-reproducible Discrete Event System Specification (DEVS) formalism using hidden inheritance.
Inf. Sci., 2015
2014
KSII Trans. Internet Inf. Syst., 2014
Comput. Commun., 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
2013
A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols.
Sensors, 2013
KSII Trans. Internet Inf. Syst., 2013
Ad Hoc Networks, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
2012
Intelligent cell selection satisfying user requirements for inter-system handover in heterogeneous networks.
Comput. Commun., 2012
2011
ROB/CN: An Efficient Reliable 1-Hop Broadcast Using CSMA/CN in Mobile Ad Hoc Networks.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011
2010
KSII Trans. Internet Inf. Syst., 2010
A Special Issue of Intelligent Automation and Soft Computing - Forthcoming Multimedia & Intelligent Services In Ubiquitous And Pervasive Computing.
Intell. Autom. Soft Comput., 2010
Intell. Autom. Soft Comput., 2010
CoRR, 2010
Proceedings of the Communication and Networking, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
KSII Trans. Internet Inf. Syst., 2009
Int. J. Netw. Secur., 2009
Int. J. Commun. Networks Inf. Secur., 2009
Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune System.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Three-Party Quantum Authenticated Key Distribution with Partially Trusted Third Party.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Pattern Recognit. Lett., 2007
2006
Parallel Process. Lett., 2006
Inf. Sci., 2006
Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors.
Informatica, 2006
Comput. Commun., 2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Pattern Recognit. Lett., 2005
Microprocess. Microsystems, 2005
Microprocess. Microsystems, 2005
J. Commun. Networks, 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
2004
Fault-Free Maximal Submeshes in Faulty Torus-Connected Multicomputers.
Informatica (Slovenia), 2004
Proceedings of the 42nd Annual Southeast Regional Conference, 2004
Proceedings of the 42nd Annual Southeast Regional Conference, 2004
Proceedings of the 42nd Annual Southeast Regional Conference, 2004
2003
J. Inf. Sci. Eng., 2003
Computation Control of Distributed Image Decoders in Mobile Computing.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003
DIG Based Block Replacement Scheme for Efficient Buffer Cache Management.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003
2002
An All-to-All Multicast Routing Decreasing Channel Overheads in Wireless Ad Hoc Networks.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002
2001
An approach to remote software project management and development.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001
Maintaining maximal submeshes in torus-connected multi-computers.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001
2000
IEEE Trans. Parallel Distributed Syst., 2000
Analytical approaches for modeling characterized MIN.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000
1999
A Task Compaction Scheme for 3D Torus Multicomputer Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
1997
IEEE Trans. Parallel Distributed Syst., 1997
1996
Proceedings of the 1996 International Conference on Parallel Processing, 1996
1995
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995