Young-Gab Kim
Orcid: 0000-0001-9585-8808
According to our database1,
Young-Gab Kim
authored at least 88 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Commun. Mag., October, 2024
Security and Privacy Requirements for the Metaverse: A Metaverse Applications Perspective.
IEEE Commun. Mag., January, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
2023
IEEE Commun. Mag., September, 2023
Comput. Sci. Rev., May, 2023
Syst., February, 2023
IEEE Access, 2023
Interoperable Access Control Framework for Services Demanding High Level Security among Heterogeneous IoT Platforms.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
2022
DVS: A Drone Video Synopsis towards Storing and Analyzing Drone Surveillance Data in Smart Cities.
Syst., 2022
Sensors, 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
IEEE Internet Things J., 2022
Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy.
Int. J. Inf. Manag., 2022
IEEE Access, 2022
Security interoperability in heterogeneous IoT platforms: threat model of the interoperable OAuth 2.0 framework.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
2021
Survey and challenges of story generation models - A multimodal perspective with five steps: Data embedding, topic modeling, storyline generation, draft story generation, and story evaluation.
Inf. Fusion, 2021
Group recommender system based on genre preference focusing on reducing the clustering cost.
Expert Syst. Appl., 2021
IEEE Commun. Surv. Tutorials, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
IEEE Internet Things J., 2020
A Cache-Based Model Abstraction and Runtime Verification for the Internet-of-Things Applications.
IEEE Internet Things J., 2020
An efficient emerging network and secured hopping scheme employed over the unsecured public channels.
Int. J. Distributed Sens. Networks, 2020
AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth.
Int. J. Distributed Sens. Networks, 2020
Video on demand recommender system for internet protocol television service based on explicit information fusion.
Expert Syst. Appl., 2020
A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security.
IEEE Access, 2020
2019
An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role.
Sensors, 2019
2018
Centralized Connectivity for Multiwireless Edge Computing and Cellular Platform: A Smart Vehicle Parking System.
Wirel. Commun. Mob. Comput., 2018
Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients.
J. Sensors, 2018
RINGA: Design and verification of finite state machine for self-adaptive software at runtime.
Inf. Softw. Technol., 2018
Expert Syst. Appl., 2018
Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System.
IEEE Access, 2018
Proceedings of the TENCON 2018, 2018
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
2017
Int. J. Softw. Eng. Knowl. Eng., 2017
Personalized recommender system based on friendship strength in social network services.
Expert Syst. Appl., 2017
Runtime verification method for self-adaptive software using reachability of transition system model.
Proceedings of the Symposium on Applied Computing, 2017
2016
J. Supercomput., 2016
Sentiment Root Cause Analysis Based on Fuzzy Formal Concept Analysis and Fuzzy Cognitive Map.
J. Comput. Inf. Sci. Eng., 2016
Certificate sharing system for secure certificate distribution in mobile environment.
Expert Syst. Appl., 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the 15th IEEE International Conference on Cognitive Informatics & Cognitive Computing , 2016
2014
Ann. des Télécommunications, 2014
2012
Secur. Commun. Networks, 2012
Threat scenario-based security risk analysis using use case modeling in information systems.
Secur. Commun. Networks, 2012
2011
An energy-efficient delay reduction technique for supporting WLAN-based VoIP in SmartPhone.
J. Syst. Archit., 2011
Int. J. Softw. Eng. Knowl. Eng., 2011
EURASIP J. Wirel. Commun. Netw., 2011
Proceedings of the Advances in Systems Safety, 2011
2010
Power saving and delay reduction for supporting WLAN-based fixed-mobile convergence service in smartphone.
IEEE Trans. Consumer Electron., 2010
2009
IEEE Trans. Consumer Electron., 2009
2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the Intelligence and Security Informatics, 2008
2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
2006
J. Comput. Sci. Technol., 2006
Formal Verification of Bundle Authentication Mechanism in Osgi Service Platform: Ban Logic.
Int. J. Softw. Eng. Knowl. Eng., 2006
An Integrity Checking Mechanism of Mobile Agents under a Closed Environment with Trusted Hosts.
Int. J. Softw. Eng. Knowl. Eng., 2006
Proceedings of the Fourth International Conference on Software Engineering, 2006
Proceedings of the Information Networking, 2006
Modeling and Simulation for Security Risk Propagation in Critical Information Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
A message conversion system, XML-based metadata semantics description language and metadata repository.
J. Inf. Sci., 2005
An enterprise architecture framework based on a common information technology domain (EAFIT) for improving interoperability among heterogeneous information systems.
Proceedings of the Third ACIS International Conference on Software Engineering, 2005
Proceedings of the Information Security and Cryptology, 2005
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005
Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005
2004
Verifying a MAC-Based Service Bundle Authentication Mechanism for the OSGi Service Platform.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004
Proceedings of the Software Engineering Research, 2004
Proceedings of the Applied Parallel Computing, 2004
Proceedings of the Database Systems for Advances Applications, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004