Tai-Hoon Kim

Orcid: 0000-0003-0117-8102

Affiliations:
  • Konkuk University, Glocal Campus, Seoul, South Korea
  • Beijing Jiaotong University, School of Economics and Management, China
  • Sungshin Women's University, Seoul, South Korea (2013 - 2019)
  • GVSA and UTAS, Hobart, TAS, Australia (2012 - 2013)
  • University of Tasmania, Hobart, TAS, Australia (PhD 2011)
  • Hannam University, Daejeon, South Korea (2007 - 2012)
  • Ewha Womans University, Seoul, South Korea (2006 - 2007)


According to our database1, Tai-Hoon Kim authored at least 319 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Predicting cardiac infarctions with reinforcement algorithms through wavelet transform applications in healthcare.
Inf. Sci., 2025

2024
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things.
Clust. Comput., June, 2024

Novel 3-D Deep Neural Network Architecture for Crop Classification Using Remote Sensing-Based Hyperspectral Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Optimizing Hadoop Data Locality: Performance Enhancement Strategies in Heterogeneous Computing Environments.
Scalable Comput. Pract. Exp., 2024

Predictive Analysis of Breast Cancer from Full-Field Digital Mammography Images using Residual Network.
Scalable Comput. Pract. Exp., 2024

Optimizing multimodal feature selection using binary reinforced cuckoo search algorithm for improved classification performance.
PeerJ Comput. Sci., 2024

Improving prediction of maternal health risks using PCA features and TreeNet model.
PeerJ Comput. Sci., 2024

PODE: privacy-enhanced distributed federated learning approach for origin-destination estimation.
PeerJ Comput. Sci., 2024

Privacy preserved and decentralized thermal comfort prediction model for smart buildings using federated learning.
PeerJ Comput. Sci., 2024

Towards the development of believable agents: Adopting neural architectures and adaptive neuro-fuzzy inference system via playback of human traces.
J. King Saud Univ. Comput. Inf. Sci., 2024

PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks.
IEEE Access, 2024

RoBERTaNET: Enhanced RoBERTa Transformer Based Model for Cyberbullying Detection With GloVe Features.
IEEE Access, 2024

Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval.
IEEE Access, 2024

Employing Siamese MaLSTM Model and ELMO Word Embedding for Quora Duplicate Questions Detection.
IEEE Access, 2024

An Automated Approach for Predicting Road Traffic Accident Severity Using Transformer Learning and Explainable AI Technique.
IEEE Access, 2024

2023
A hybrid machine learning approach to identify coronary diseases using feature selection mechanism on heart disease dataset.
Distributed Parallel Databases, June, 2023

A Blockchain Framework in Post-Quantum Decentralization.
IEEE Trans. Serv. Comput., 2023

Correction to: A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks.
Pers. Ubiquitous Comput., 2023

A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks.
Pers. Ubiquitous Comput., 2023

An Improved AI-Based Secure M-Trust Privacy Protocol for Medical Internet of Things in Smart Healthcare System.
IEEE Internet Things J., 2023

A Novel Drug-Drug Indicator Dataset and Ensemble Stacking Model for Detection and Classification of Drug-Drug Interaction Indicators.
IEEE Access, 2023

A Secure Emergency Framework in an IoT Based Patient Monitoring System.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

An Authentication Protocol for Healthcare Application: A Case Study of a Diabetic Patient.
Proceedings of the Advanced Information Networking and Applications, 2023

Enhancement of Security in GFDM Using Ebola-Optimized Joint Secure Compressive Sensing Encryption and Symbol Scrambling Model.
Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision, 2023

2022
Editorial Special Issue on AI Innovations in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2022

Guest Editorial: Data Analytics for Public Health Care.
IEEE J. Biomed. Health Informatics, 2022

DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022

A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
Multim. Tools Appl., 2022

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022

Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment.
IEEE Internet Things J., 2022

Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things.
IEEE Internet Things J., 2022

Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things.
Comput. Electr. Eng., 2022

DeBot: A deep learning-based model for bot detection in industrial internet-of-things.
Comput. Electr. Eng., 2022

Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey.
IEEE Access, 2022

Safety Issues Investigation in Deep Learning Based Chatbots Answers to Medical Advice Requests.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

2021
Multi-hop in Clustering with Mobility Protocol to Save the Energy Utilization in Wireless Sensor Networks.
Wirel. Pers. Commun., 2021

The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
IEEE Trans. Veh. Technol., 2021

Blockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of ThingsBlockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of Things.
ACM Trans. Internet Techn., 2021

Demographical gender prediction of Twitter users using big data analytics: an application of decision marketing.
Int. J. Reason. based Intell. Syst., 2021

Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction].
IEEE Secur. Priv., 2021

Secure Device-to-Device communications for 5G enabled Internet of Things applications.
Comput. Commun., 2021

Advanced Data Mining Tools and Methods for Social Computing.
Comput. J., 2021

LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments.
IEEE Access, 2021

A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges.
IEEE Access, 2021

An Efficient and Privacy-Preserving Billing Protocol for Smart Metering.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.
IEEE Trans. Veh. Technol., 2020

Image Watermarking in Curvelet Domain Using Edge Surface Blocks.
Symmetry, 2020

A Smart, Sensible Agriculture System Using the Exponential Moving Average Model.
Symmetry, 2020

Video Caption Based Searching Using End-to-End Dense Captioning and Sentence Embeddings.
Symmetry, 2020

A Lattice Signcrypted Secured Localization in Wireless Sensor Networks.
IEEE Syst. J., 2020

Improved ECG Watermarking Technique Using Curvelet Transform.
Sensors, 2020

Breast Cancer Prediction Using Stacked GRU-LSTM-BRNN.
Appl. Comput. Syst., 2020

A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface.
IEEE Internet Things J., 2020

Decentralized Accessibility of e-commerce Products through Blockchain Technology.
CoRR, 2020

IEEE Access Special Section Editorial: Big Data Technology and Applications in Intelligent Transportation.
IEEE Access, 2020

Quantum Data Aggregation Using Secret Sharing and Genetic Algorithm.
IEEE Access, 2020

A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020

Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0.
IEEE Access, 2020

Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments.
IEEE Access, 2020

2019
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set.
Sensors, 2019

Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks.
Sensors, 2019

A traffic analysis attack to compute social network measures.
Multim. Tools Appl., 2019

Locating similar names through locality sensitive hashing and graph theory.
Multim. Tools Appl., 2019

A comparison of learning methods over raw data: forecasting cab services market share in New York City.
Multim. Tools Appl., 2019

Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics.
IEEE Internet Things J., 2019

MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features.
IEEE Access, 2019

An Efficient Edge Detection Approach to Provide Better Edge Connectivity for Image Analysis.
IEEE Access, 2019

A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks.
IEEE Access, 2019

At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A novel Approach for Privacy-Preserving Data Aggregation in Smart Grid.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A new vehicular blackbox architecture based on searchable encryption.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A New Trust Architecture for Smart Vehicular Systems.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Advanced Multiresolution Wavelet Based Wideband Spectrum Sensing Technique for Cognitive Radio.
Wirel. Commun. Mob. Comput., 2018

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
Sensors, 2018

Clustering and Flow Conservation Monitoring Tool for Software Defined Networks.
Sensors, 2018

Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.
Sensors, 2018

New DoS Defense Method Based on Strong Designated Verifier Signatures.
Sensors, 2018

RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
Secur. Commun. Networks, 2018

Distributed One Time Password Infrastructure for Linux Environments.
Entropy, 2018

Software Defined Networks in Wireless Sensor Architectures.
Entropy, 2018

A Greedy Deep Learning Method for Medical Disease Analysis.
IEEE Access, 2018

Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication.
IEEE Access, 2018

Ransomware Automatic Data Acquisition Tool.
IEEE Access, 2018

IoT Based Tracking System For Supply Chain Management.
Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications, 2018

Privacy Preserving Profile Matching Protocol for Human-Centric Social Internet of Things.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Secured Distributed IoT Based Supply Chain Architecture.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Biometric-based Per-Packet Authentication Techniques in Communication Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area Network.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

An infrastructurless vehicle blackbox system.
Proceedings of the International Conference on Internet of Things, 2018

A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

Security of RFID Based Internet of Things Applications: Requirements and Open Issues.
Proceedings of the 15th International Multi-Conference on Systems, Signals & Devices, 2018

2017
BATCP: Bandwidth-Aggregation Transmission Control Protocol.
Symmetry, 2017

Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
Symmetry, 2017

A Dimensionality Reduction-Based Multi-Step Clustering Method for Robust Vessel Trajectory Analysis.
Sensors, 2017

Distributed Data Service for Data Management in Internet of Things Middleware.
Sensors, 2017

A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Sensors, 2017

Preface.
Int. J. Syst. Assur. Eng. Manag., 2017

Detection of Electronic Anklet Wearers' Groupings throughout Telematics Monitoring.
ISPRS Int. J. Geo Inf., 2017

Smart City and IoT.
Future Gener. Comput. Syst., 2017

An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction.
Frontiers Comput. Sci., 2017

An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI.
Comput. Methods Programs Biomed., 2017

Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions.
IEEE Access, 2017

Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors.
Proceedings of the SCSS 2017, 2017

Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A privacy-preserving homomorphic encryption scheme for the Internet of Things.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A new biometric-based security framework for cloud storage.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A novel adaptive streaming approach for cloud-based mobile video games.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A novel privacy technique for Augmented Reality cloud gaming based on image authentication.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Context aware middleware for RFID based pharmaceutical supply chain.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Video streaming strategy based on feedback control loop theory in cloud platform.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Adaptive risk treatment for cloud computing based on Markovian game.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Adaptive Risk Management Framework for Cloud Computing.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Disclosing user relationships in email networks.
J. Supercomput., 2016

Big data applications for healthcare: preface to special issue.
J. Supercomput., 2016

Leveraging information security and computational trust for cybersecurity.
J. Supercomput., 2016

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Sensors, 2016

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
Sensors, 2016

Image compression with optimal traversal using wavelet and percolation theories.
Proceedings of the 24th International Conference on Software, 2016

A New Authentication Scheme for Cloud-based Storage Applications.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Chaotic construction of cryptographic keys based on biometric data.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

2015
Extracting Association Patterns in Network Communications.
Sensors, 2015

Xen-based virtual honeypot system for smart device.
Multim. Tools Appl., 2015

Solving technological isolation to build virtual learning communities.
Multim. Tools Appl., 2015

Virtual learning communities: unsolved troubles.
Multim. Tools Appl., 2015

Guest Editorial: Multimedia Applications for Smart device and Equipment.
Multim. Tools Appl., 2015

A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A Novel Prototype Decision Tree Method Using Sampling Strategy.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

2014
A Layered Trust Information Security Architecture.
Sensors, 2014

Trends in high-performance computing and communications for ubiquitous computing.
Knowl. Eng. Rev., 2014

PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform.
Int. J. Distributed Sens. Networks, 2014

Ubiquitous Sensor Networks and Their Application 2013.
Int. J. Distributed Sens. Networks, 2014

Advanced Sensor Technology and Applications in Industrial Control System 2014.
Int. J. Distributed Sens. Networks, 2014

A Zone-Based Media Independent Information Service for IEEE 802.21 Networks.
Int. J. Distributed Sens. Networks, 2014

GTrust: Group Extension for Trust Models in Distributed Systems.
Int. J. Distributed Sens. Networks, 2014

Detecting bad information in mobile wireless networks based on the wireless application protocol.
Computing, 2014

Editorial to special issue: computer and network applications for ubiquitous computing.
Computing, 2014

E-D2HCP: enhanced distributed dynamic host configuration protocol.
Computing, 2014

Automatic image annotation approach based on optimization of classes scores.
Computing, 2014

Adaptive routing protocol for mobile ad hoc networks.
Computing, 2014

SOA Modeling Based on MDA.
Proceedings of the Distributed Computing and Artificial Intelligence, 2014

2013
Development of a virtualized supercomputing environment for genomic analysis.
J. Supercomput., 2013

Toward designing a secure biosurveillance cloud.
J. Supercomput., 2013

Editorial of special section on multimedia applications and ubiquitous computing.
J. Supercomput., 2013

Gait recognition using description of shape synthesized by planar homography.
J. Supercomput., 2013

A GA based audio steganography with enhanced security.
Telecommun. Syst., 2013

Cell-graph coloring for cancerous tissue modelling and classification.
Multim. Tools Appl., 2013

Advanced Sensor Technology and Applications in Industrial Control System.
Int. J. Distributed Sens. Networks, 2013

Extensions to ciphertext-policy attribute-based encryption to support distributed environments.
Int. J. Comput. Appl. Technol., 2013

Linear Correlation-Based Feature Selection for Network Intrusion Detection Model.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

2012
Mobile one-time passwords: two-factor authentication using mobile phones.
Secur. Commun. Networks, 2012

Breast cancer MRI diagnosis approach using support vector machine and pulse coupled neural networks.
J. Appl. Log., 2012

Security Issues in Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012

Ubiquitous Sensor Networks and Its Application.
Int. J. Distributed Sens. Networks, 2012

Design of an Effective WSN-Based Interactive u-Learning Model.
Int. J. Distributed Sens. Networks, 2012

A Dynamic Traffic-Aware Duty Cycle Adjustment MAC Protocol for Energy Conserving in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012

Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012

Vehicle-to-grid communication system for electric vehicle charging.
Integr. Comput. Aided Eng., 2012

Introduction.
Integr. Comput. Aided Eng., 2012

Evolvable hardware design based on a novel simulated annealing in an embedded system.
Concurr. Comput. Pract. Exp., 2012

A study on dynamic state information (DSI) around users for safe urban life.
Comput. Math. Appl., 2012

Web Services in Multimedia Communication.
Adv. Multim., 2012

Developing Casual Learning Games Using the Apache Pivot IIA Capabilities.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Opinion mining over twitterspace: Classifying tweets programmatically using the R approach.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Mining twitterspace for information: Classifying sentiments programmatically using Java.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

A Gaussian Mixture Models Approach to Human Heart Signal Verification Using Different Feature Extraction Algorithms.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

Using Particle Swarm Optimization for Image Regions Annotation.
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012

Automated Classification of Galaxies Using Invariant Moments.
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012

Expert System Based on Neural-Fuzzy Rules for Thyroid Diseases Diagnosis.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

2011
Special issue on "Theory and practice of high-performance computing, communications, and security".
J. Supercomput., 2011

SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors.
Sensors, 2011

A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays.
Sensors, 2011

Special issue on security and privacy in wireless systems.
Secur. Commun. Networks, 2011

Supervised chromosome clustering and image classification.
Future Gener. Comput. Syst., 2011

Special Section: Future Generation Information Technology.
Future Gener. Comput. Syst., 2011

Recommendation Algorithm of the App Store by Using Semantic Relations between Apps.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Image Data Hiding Technique Using Discrete Fourier Transformation.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Brain Tumor Detection Using MRI Image Analysis.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Similarity Checking of Handwritten Signature Using Binary Dotplot Analysis.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Security Encryption Schemes for Internet SCADA: Comparison of the Solutions.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011

Retrofit to CAIN Issues for Critical Infrastructures.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011

Application Program Interface as Back-Up Data Source for SCADA Systems.
Proceedings of the Information Security and Assurance - International Conference, 2011

Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System.
Proceedings of the Information Security and Assurance - International Conference, 2011

Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Machine Learning-Based Soccer Video Summarization System.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Heart Sound Feature Reduction Approach for Improving the Heart Valve Diseases Identification.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Grid of Learning Resources in E-learning Communities.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Context Based Speech Analysis of Bengali Language as a Part of TTS Conversion.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification.
Proceedings of the Security Technology, 2011

Intelligent Hybrid Anomaly Network Intrusion Detection System.
Proceedings of the Communication and Networking, 2011

New Algorithm for Skewing Detection of Handwritten Bangla Words.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Use of Artificial Neural Network in Bengali Character Recognition.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Watermarking Using Multiresolution Cosine Transformation: A Review.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Leaf Image Analysis towards Plant Identification.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

A Fast and Secure One-Way Hash Function.
Proceedings of the Security Technology, 2011

Mathematical Model and Analysis of Reliability and Safety of Large Database Systems.
Proceedings of the Database Theory and Application, Bio-Science and Bio-Technology, 2011

A Model of Hierarchically Consistent Control of Nonlinear Dynamical Systems.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

Service Quality Assessment in Provision of Library Services.
Proceedings of the U- and E-Service, Science and Technology, 2011

Online Learning Environment: Taxonomy of Asynchronous Online Discussion Forums.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

Engaging and Effective Asynchronous Online Discussion Forums.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

A rough k-means fragile watermarking approach for image authentication.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

2010
Sensor Based Framework for Secure Multimedia Communication in VANET.
Sensors, 2010

A Bankruptcy Problem Approach to Load-shedding in Multiagent-based Microgrid Operation.
Sensors, 2010

Performance Analysis of Receive Diversity in Wireless Sensor Networks over GBSBE Models.
Sensors, 2010

A Comparative Study of Wireless Sensor Networks and Their Routing Protocols.
Sensors, 2010

Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach.
J. Intell. Manuf., 2010

Editorial.
J. Intell. Manuf., 2010

A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper).
J. Commun., 2010

A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition.
Comput. J., 2010

Review: Security in Wireless Technologies in Business.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

Emerging Approach of Natural Language Processing in Opinion Mining: A Review.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

A New Experiment on Bengali Character Recognition.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

Model Based User's Access Requirement Analysis of E-Governance Systems.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Context Aware Systems, Methods and Trends in Smart Home Technology.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Chain Based Hierarchical Routing Protocol for Wireless Sensor Networks.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Hybridization of GA and ANN to Solve Graph Coloring.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Bankruptcy Problem Approach to Load-Shedding in Agent-Based Microgrid Operation.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Processing of Handwritten Signature Image for Authentication.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Procedure of Partitioning Data Into Number of Data Sets or Data Group - A Review.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Medical Imaging: A Review.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Data Hiding a Key Management for Interoperable Urban Services.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Agent Based Approach to Regression Testing.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Pattern Recognition Using Artificial Neural Network: A Review.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Biometric Authentication Using Infrared Imaging of Hand Vein Patterns.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Lane Design for Speed Optimization.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Directed Graph Pattern Synthesis in LSB Technique on Video Steganography.
Proceedings of the Advances in Computer Science and Information Technology, 2010

IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

USABAGILE_Web: A Web Agile Usability Approach for Web Site Design.
Proceedings of the Computational Science and Its Applications, 2010

Hierarchical Data Structures for Accessing Spatial Data.
Proceedings of the Signal Processing and Multimedia, 2010

OSI Layer Wise Security Analysis of Wireless Sensor Network.
Proceedings of the Signal Processing and Multimedia, 2010

Internet SCADA Utilizing API's as Data Source.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Security Encryption Scheme for Communication of Web Based Control Systems.
Proceedings of the Signal Processing and Multimedia, 2010

Communication Security for Control Systems in Smart Grid.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Identification of Plant Using Leaf Image Analysis.
Proceedings of the Signal Processing and Multimedia, 2010

Business Planning in the Light of Neuro-fuzzy and Predictive Forecasting.
Proceedings of the Signal Processing and Multimedia, 2010

Using Incentives to Reduce Active Network Privacy Threats and Vulnerabilities.
Proceedings of the Signal Processing and Multimedia, 2010

Insecure Information System's Solution Using Isolation Method.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

An Automated Approach to Testing Polymorphic Features Using Object-Z.
Proceedings of the Advances in Software Engineering, 2010

ISARE: An Integrated Software Architecture Reuse and Evaluation Framework.
Proceedings of the Advances in Software Engineering, 2010

Performance Analysis of Cyber Security Awareness Delivery Methods.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

A Hop-Sensitive Mechanism to Establish Route Optimization in Mobile Networks.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

Feature Extraction and Analysis of Breast Cancer Specimen.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

Hiding Data in Audio Signal.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

Duplicate Address Detection Table in IPv6 Mobile Networks.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

2009
Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments.
Wirel. Pers. Commun., 2009

On modeling and evaluating multicomputer transcoding architectures for live-video streams.
Multim. Tools Appl., 2009

Intelligent Environments and Services.
J. Univers. Comput. Sci., 2009

Vascular Pattern Analysis towards Pervasive Palm Vein Authentication.
J. Univers. Comput. Sci., 2009

Secure ubiquitous connectivity in hybrid multipath wireless <i>ad hoc</i> network.
Int. J. Commun. Syst., 2009

Dynamic power management in new architecture of wireless sensor networks.
Int. J. Commun. Syst., 2009

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation.
Int. J. Commun. Netw. Syst. Sci., 2009

Special section: Grid/distributed computing systems security.
Future Gener. Comput. Syst., 2009

SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009

Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile.
Comput. J., 2009

Test Case Minimization and Prioritization Using CMIMX Technique.
Proceedings of the Advances in Software Engineering, 2009

Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management.
Proceedings of the Communication and Networking, 2009

Grayscale Image Classification Using Supervised Chromosome Clustering.
Proceedings of the Security Technology, 2009

Analysis of Handwritten Signature Image.
Proceedings of the Security Technology, 2009

Effective GIS Mobile Query System.
Proceedings of the Future Generation Information Technology, 2009

Refine Crude Corpus for Opinion Mining.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme.
Proceedings of the First International Conference on Computational Intelligence, 2009

Decentralized Flocking Algorithms for a Swarm of Mobile Robots: Problem, Current Research and Future Directions.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Performance Evaluation of Hybrid Multipath Mobile Ad Hoc Network.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Research on Critical Infrastructures and Critical Information Infrastructures.
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009

Crossed Crypto-Scheme in WPA PSK Mode.
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009

Discrete Fourier Transformation based Image Authentication technique.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2008
U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home.
J. Supercomput., 2008

Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS.
Comput. Commun., 2008

A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Channel assignment and scheduling in multichannel wireless sensor networks.
Proceedings of the LCN 2008, 2008

An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control Systems.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Prioritized Service Protocol for Vehicular Communication.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Novel Approach for Infrastructure Deployment for VANET.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Towards Automated Traffic System Using Vehicular Network with Directional Antenna.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

2007
Induction and Implementation of Security Requirements in Each System Block.
Proceedings of the Advances in Multimedia Modeling, 2007

A Study on Digital Media Security by Hopfield Neural Network.
Proceedings of the Advances in Neural Networks, 2007

Security Evaluation for Information Assurance.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

Hybrid Tag Anti-collision Algorithms in RFID Systems.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007

A Survey of System Software for Wireless Sensor Networks.
Proceedings of the Future Generation Communication and Networking, 2007

Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264.
Proceedings of the Future Generation Communication and Networking, 2007

Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Block Model Application for Decision Support Systems.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

Flexible Key Distribution for SCADA Network using Multi-Agent System.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

2006
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Intelligent Method for Building Security Countermeasures.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Security Requirements for Ubiquitous Software Development Site.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment.
Proceedings of the Intelligent Computing, 2006

A Vulnerability Assessment Tool Based on OVAL in System Block Model.
Proceedings of the Intelligent Computing, 2006

A Study on the Improvement of Military Logistics System Using RFID.
Proceedings of the Intelligent Computing, 2006

Analysis of Security Session Reusing in Distribution Server System.
Proceedings of the Computational Science and Its Applications, 2006

2005
Towards New Areas of Security Engineering.
Proceedings of the Rough Sets, 2005

A Relationship Between Products Evaluation and IT Systems Assurance.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System.
Proceedings of the Advances in Intelligent Computing, 2005

Security Evaluation Targets for Enhancement of IT Systems Assurance.
Proceedings of the Computational Science and Its Applications, 2005

Design Procedure of IT Systems Security Countermeasures.
Proceedings of the Computational Science and Its Applications, 2005

Distribution Data Security System Based on Web Based Active Database.
Proceedings of the Computational Science and Its Applications, 2005

Interference-Free ZCD-UWB for Wireless Home Network Applications.
Proceedings of the Computational Science and Its Applications, 2005

2004
Threat Description for Developing Security Countermeasure.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Applying Security Engineering to Build Security Countermeasures: An Introduction.
Proceedings of the Applied Parallel Computing, 2004

Development Site Security Process of ISO/IEC TR 15504.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Security Requirements for Software Development.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504.
Proceedings of the Computational Science and Its Applications, 2004

Reduction Method of Threat Phrases by Classifying Assets.
Proceedings of the Computational Science and Its Applications, 2004

A Relationship between Security Engineering and Security Evaluation.
Proceedings of the Computational Science and Its Applications, 2004

Design on Mobile Secure Electronic Transaction Protocol with Component Based Development.
Proceedings of the Computational Science and Its Applications, 2004

2003
A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003

ECSSL Protocol Based on 3B Algorithm.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003

Reliability Assurance in Development Process for TOE on the Common Criteria.
Proceedings of the Software Engineering Research and Applications, 2003

Supplement of Security-Related Parts of ISO/IEC TR 15504.
Proceedings of the Computer and Information Sciences, 2003

SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC.
Proceedings of the Computer and Information Sciences, 2003

Threat Description for the PP by Using the Concept of the Assets Protected by TOE.
Proceedings of the Computational Science - ICCS 2003, 2003


  Loading...