Tai-Hoon Kim
Orcid: 0000-0003-0117-8102Affiliations:
- Konkuk University, Glocal Campus, Seoul, South Korea
- Beijing Jiaotong University, School of Economics and Management, China
- Sungshin Women's University, Seoul, South Korea (2013 - 2019)
- GVSA and UTAS, Hobart, TAS, Australia (2012 - 2013)
- University of Tasmania, Hobart, TAS, Australia (PhD 2011)
- Hannam University, Daejeon, South Korea (2007 - 2012)
- Ewha Womans University, Seoul, South Korea (2006 - 2007)
According to our database1,
Tai-Hoon Kim
authored at least 319 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Predicting cardiac infarctions with reinforcement algorithms through wavelet transform applications in healthcare.
Inf. Sci., 2025
2024
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things.
Clust. Comput., June, 2024
Novel 3-D Deep Neural Network Architecture for Crop Classification Using Remote Sensing-Based Hyperspectral Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
Optimizing Hadoop Data Locality: Performance Enhancement Strategies in Heterogeneous Computing Environments.
Scalable Comput. Pract. Exp., 2024
Predictive Analysis of Breast Cancer from Full-Field Digital Mammography Images using Residual Network.
Scalable Comput. Pract. Exp., 2024
Optimizing multimodal feature selection using binary reinforced cuckoo search algorithm for improved classification performance.
PeerJ Comput. Sci., 2024
PeerJ Comput. Sci., 2024
PODE: privacy-enhanced distributed federated learning approach for origin-destination estimation.
PeerJ Comput. Sci., 2024
Privacy preserved and decentralized thermal comfort prediction model for smart buildings using federated learning.
PeerJ Comput. Sci., 2024
Towards the development of believable agents: Adopting neural architectures and adaptive neuro-fuzzy inference system via playback of human traces.
J. King Saud Univ. Comput. Inf. Sci., 2024
IEEE Access, 2024
RoBERTaNET: Enhanced RoBERTa Transformer Based Model for Cyberbullying Detection With GloVe Features.
IEEE Access, 2024
IEEE Access, 2024
Employing Siamese MaLSTM Model and ELMO Word Embedding for Quora Duplicate Questions Detection.
IEEE Access, 2024
An Automated Approach for Predicting Road Traffic Accident Severity Using Transformer Learning and Explainable AI Technique.
IEEE Access, 2024
2023
A hybrid machine learning approach to identify coronary diseases using feature selection mechanism on heart disease dataset.
Distributed Parallel Databases, June, 2023
IEEE Trans. Serv. Comput., 2023
Correction to: A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks.
Pers. Ubiquitous Comput., 2023
A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks.
Pers. Ubiquitous Comput., 2023
An Improved AI-Based Secure M-Trust Privacy Protocol for Medical Internet of Things in Smart Healthcare System.
IEEE Internet Things J., 2023
A Novel Drug-Drug Indicator Dataset and Ensemble Stacking Model for Detection and Classification of Drug-Drug Interaction Indicators.
IEEE Access, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
An Authentication Protocol for Healthcare Application: A Case Study of a Diabetic Patient.
Proceedings of the Advanced Information Networking and Applications, 2023
Enhancement of Security in GFDM Using Ebola-Optimized Joint Secure Compressive Sensing Encryption and Symbol Scrambling Model.
Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE J. Biomed. Health Informatics, 2022
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
Multim. Tools Appl., 2022
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022
Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things.
Comput. Electr. Eng., 2022
DeBot: A deep learning-based model for bot detection in industrial internet-of-things.
Comput. Electr. Eng., 2022
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey.
IEEE Access, 2022
Safety Issues Investigation in Deep Learning Based Chatbots Answers to Medical Advice Requests.
Proceedings of the Neural Information Processing - 29th International Conference, 2022
2021
Multi-hop in Clustering with Mobility Protocol to Save the Energy Utilization in Wireless Sensor Networks.
Wirel. Pers. Commun., 2021
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
IEEE Trans. Veh. Technol., 2021
Blockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of ThingsBlockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of Things.
ACM Trans. Internet Techn., 2021
Demographical gender prediction of Twitter users using big data analytics: an application of decision marketing.
Int. J. Reason. based Intell. Syst., 2021
Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction].
IEEE Secur. Priv., 2021
Secure Device-to-Device communications for 5G enabled Internet of Things applications.
Comput. Commun., 2021
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments.
IEEE Access, 2021
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges.
IEEE Access, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.
IEEE Trans. Veh. Technol., 2020
Symmetry, 2020
Video Caption Based Searching Using End-to-End Dense Captioning and Sentence Embeddings.
Symmetry, 2020
IEEE Syst. J., 2020
A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface.
IEEE Internet Things J., 2020
CoRR, 2020
IEEE Access Special Section Editorial: Big Data Technology and Applications in Intelligent Transportation.
IEEE Access, 2020
IEEE Access, 2020
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020
IEEE Access, 2020
Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments.
IEEE Access, 2020
2019
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set.
Sensors, 2019
Sensors, 2019
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
A comparison of learning methods over raw data: forecasting cab services market share in New York City.
Multim. Tools Appl., 2019
Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics.
IEEE Internet Things J., 2019
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features.
IEEE Access, 2019
An Efficient Edge Detection Approach to Provide Better Edge Connectivity for Image Analysis.
IEEE Access, 2019
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks.
IEEE Access, 2019
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
Advanced Multiresolution Wavelet Based Wideband Spectrum Sensing Technique for Cognitive Radio.
Wirel. Commun. Mob. Comput., 2018
Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
Sensors, 2018
Sensors, 2018
Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.
Sensors, 2018
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
Secur. Commun. Networks, 2018
Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication.
IEEE Access, 2018
Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications, 2018
Privacy Preserving Profile Matching Protocol for Human-Centric Social Internet of Things.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the International Conference on Internet of Things, 2018
A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018
Security of RFID Based Internet of Things Applications: Requirements and Open Issues.
Proceedings of the 15th International Multi-Conference on Systems, Signals & Devices, 2018
2017
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
Symmetry, 2017
A Dimensionality Reduction-Based Multi-Step Clustering Method for Robust Vessel Trajectory Analysis.
Sensors, 2017
Sensors, 2017
ISPRS Int. J. Geo Inf., 2017
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction.
Frontiers Comput. Sci., 2017
An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI.
Comput. Methods Programs Biomed., 2017
IEEE Access, 2017
Proceedings of the SCSS 2017, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
A novel privacy technique for Augmented Reality cloud gaming based on image authentication.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
J. Supercomput., 2016
J. Supercomput., 2016
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Sensors, 2016
A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
Sensors, 2016
Proceedings of the 24th International Conference on Software, 2016
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the International Conference on High Performance Computing & Simulation, 2016
2015
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015
2014
Knowl. Eng. Rev., 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Detecting bad information in mobile wireless networks based on the wireless application protocol.
Computing, 2014
Editorial to special issue: computer and network applications for ubiquitous computing.
Computing, 2014
Computing, 2014
Proceedings of the Distributed Computing and Artificial Intelligence, 2014
2013
J. Supercomput., 2013
J. Supercomput., 2013
J. Supercomput., 2013
Multim. Tools Appl., 2013
Int. J. Distributed Sens. Networks, 2013
Extensions to ciphertext-policy attribute-based encryption to support distributed environments.
Int. J. Comput. Appl. Technol., 2013
Proceedings of the Advances in Security of Information and Communication Networks, 2013
2012
Secur. Commun. Networks, 2012
Breast cancer MRI diagnosis approach using support vector machine and pulse coupled neural networks.
J. Appl. Log., 2012
Int. J. Distributed Sens. Networks, 2012
Int. J. Distributed Sens. Networks, 2012
A Dynamic Traffic-Aware Duty Cycle Adjustment MAC Protocol for Energy Conserving in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012
Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012
Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012
Integr. Comput. Aided Eng., 2012
Evolvable hardware design based on a novel simulated annealing in an embedded system.
Concurr. Comput. Pract. Exp., 2012
Comput. Math. Appl., 2012
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012
Opinion mining over twitterspace: Classifying tweets programmatically using the R approach.
Proceedings of the Seventh International Conference on Digital Information Management, 2012
Mining twitterspace for information: Classifying sentiments programmatically using Java.
Proceedings of the Seventh International Conference on Digital Information Management, 2012
A Gaussian Mixture Models Approach to Human Heart Signal Verification Using Different Feature Extraction Algorithms.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012
2011
Special issue on "Theory and practice of high-performance computing, communications, and security".
J. Supercomput., 2011
SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors.
Sensors, 2011
A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays.
Sensors, 2011
Secur. Commun. Networks, 2011
Future Gener. Comput. Syst., 2011
Future Gener. Comput. Syst., 2011
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011
Proceedings of the Information Security and Assurance - International Conference, 2011
Proceedings of the Information Security and Assurance - International Conference, 2011
Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
Heart Sound Feature Reduction Approach for Improving the Heart Valve Diseases Identification.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011
Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification.
Proceedings of the Security Technology, 2011
Proceedings of the Communication and Networking, 2011
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011
Proceedings of the Security Technology, 2011
Proceedings of the Database Theory and Application, Bio-Science and Bio-Technology, 2011
Proceedings of the Control and Automation, and Energy System Engineering, 2011
Proceedings of the U- and E-Service, Science and Technology, 2011
Proceedings of the Software Engineering, Business Continuity, and Education, 2011
Proceedings of the Software Engineering, Business Continuity, and Education, 2011
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011
2010
A Bankruptcy Problem Approach to Load-shedding in Multiagent-based Microgrid Operation.
Sensors, 2010
Performance Analysis of Receive Diversity in Wireless Sensor Networks over GBSBE Models.
Sensors, 2010
Sensors, 2010
Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach.
J. Intell. Manuf., 2010
A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper).
J. Commun., 2010
Comput. J., 2010
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Proceedings of the Computational Science and Its Applications, 2010
Proceedings of the Signal Processing and Multimedia, 2010
Proceedings of the Signal Processing and Multimedia, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Signal Processing and Multimedia, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Signal Processing and Multimedia, 2010
Proceedings of the Signal Processing and Multimedia, 2010
Proceedings of the Signal Processing and Multimedia, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Advances in Software Engineering, 2010
Proceedings of the Advances in Software Engineering, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010
2009
Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments.
Wirel. Pers. Commun., 2009
On modeling and evaluating multicomputer transcoding architectures for live-video streams.
Multim. Tools Appl., 2009
J. Univers. Comput. Sci., 2009
Int. J. Commun. Syst., 2009
Int. J. Commun. Syst., 2009
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation.
Int. J. Commun. Netw. Syst. Sci., 2009
Future Gener. Comput. Syst., 2009
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile.
Comput. J., 2009
Proceedings of the Advances in Software Engineering, 2009
Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management.
Proceedings of the Communication and Networking, 2009
Proceedings of the Security Technology, 2009
Proceedings of the Security Technology, 2009
Proceedings of the Future Generation Information Technology, 2009
Proceedings of the First International Conference on Computational Intelligence, 2009
Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme.
Proceedings of the First International Conference on Computational Intelligence, 2009
Decentralized Flocking Algorithms for a Swarm of Mobile Robots: Problem, Current Research and Future Directions.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009
2008
U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home.
J. Supercomput., 2008
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS.
Comput. Commun., 2008
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the LCN 2008, 2008
An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control Systems.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
2007
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the Advances in Neural Networks, 2007
Proceedings of the Selected Papers of the Fifth International Conference on, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007
2006
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment.
Proceedings of the Intelligent Computing, 2006
Proceedings of the Intelligent Computing, 2006
Proceedings of the Intelligent Computing, 2006
Proceedings of the Computational Science and Its Applications, 2006
2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System.
Proceedings of the Advances in Intelligent Computing, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
2004
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004
Proceedings of the Applied Parallel Computing, 2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504.
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Design on Mobile Secure Electronic Transaction Protocol with Component Based Development.
Proceedings of the Computational Science and Its Applications, 2004
2003
A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003
ECSSL Protocol Based on 3B Algorithm.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003
Proceedings of the Software Engineering Research and Applications, 2003
Proceedings of the Computer and Information Sciences, 2003
Proceedings of the Computer and Information Sciences, 2003
Proceedings of the Computational Science - ICCS 2003, 2003