


default search action
Tai-Hoon Kim
Person information
- affiliation: Konkuk University, Glocal Campus, Seoul, South Korea
- affiliation: Beijing Jiaotong University, School of Economics and Management, China
- affiliation (2013 - 2019): Sungshin Women's University, Seoul, South Korea
- affiliation (2012 - 2013): GVSA and UTAS, Hobart, TAS, Australia
- affiliation (PhD 2011): University of Tasmania, Hobart, TAS, Australia
- affiliation (2007 - 2012): Hannam University, Daejeon, South Korea
- affiliation (2006 - 2007): Ewha Womans University, Seoul, South Korea
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j156]Amandeep Verma, Rahul Saha
, Gulshan Kumar
, Alessandro Brighente
, Mauro Conti
, Tai-Hoon Kim
:
Exploring the Landscape of Programming Language Identification With Machine Learning Approaches. IEEE Access 13: 23556-23579 (2025) - [j155]M. Pradeep, Debnath Bhattacharyya
, Dinesh Kumar Anguraj
, Tai-Hoon Kim, Kingsley A. Ogudo, Moulana Mohammed:
Predicting cardiac infarctions with reinforcement algorithms through wavelet transform applications in healthcare. Inf. Sci. 691: 121513 (2025) - 2024
- [j154]Abdulaziz Altamimi
, Muhammad Umer
, Danial Hanif
, Shtwai Alsubai
, Tai-Hoon Kim, Imran Ashraf
:
Employing Siamese MaLSTM Model and ELMO Word Embedding for Quora Duplicate Questions Detection. IEEE Access 12: 29072-29082 (2024) - [j153]Archana Chhabra
, Rahul Saha
, Gulshan Kumar
, Tai-Hoon Kim
:
Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval. IEEE Access 12: 32089-32110 (2024) - [j152]Amandeep Verma, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks. IEEE Access 12: 48301-48320 (2024) - [j151]Arwa A. Jamjoom, Hanen Karamti, Muhammad Umer, Shtwai Alsubai
, Tai-Hoon Kim
, Imran Ashraf
:
RoBERTaNET: Enhanced RoBERTa Transformer Based Model for Cyberbullying Detection With GloVe Features. IEEE Access 12: 58950-58959 (2024) - [j150]Omar Ibrahim Aboulola
, Ebtisam Abdullah Alabdulqader
, Aisha Ahmed AlArfaj, Shtwai Alsubai
, Tai-Hoon Kim
:
An Automated Approach for Predicting Road Traffic Accident Severity Using Transformer Learning and Explainable AI Technique. IEEE Access 12: 61062-61072 (2024) - [j149]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti
, Reji Thomas, Tai-Hoon Kim:
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. Clust. Comput. 27(3): 2691-2713 (2024) - [j148]Naveed Anwer Butt
, Mian Muhammad Awais, Samra Shahzadi
, Tai-Hoon Kim, Imran Ashraf
:
Towards the development of believable agents: Adopting neural architectures and adaptive neuro-fuzzy inference system via playback of human traces. J. King Saud Univ. Comput. Inf. Sci. 36(8): 102182 (2024) - [j147]Kalaipriyan Thirugnanasambandam, Jayalakshmi Murugan
, Rajakumar Ramalingam
, Mamoon Rashid, R. S. Raghav, Tai-Hoon Kim, Gabriel Avelino R. Sampedro
, Mideth B. Abisado:
Optimizing multimodal feature selection using binary reinforced cuckoo search algorithm for improved classification performance. PeerJ Comput. Sci. 10: e1816 (2024) - [j146]Sidra Abbas, Shtwai Alsubai, Gabriel Avelino R. Sampedro, Mideth B. Abisado, Ahmad S. Almadhor, Tai-Hoon Kim:
Privacy preserved and decentralized thermal comfort prediction model for smart buildings using federated learning. PeerJ Comput. Sci. 10: e1899 (2024) - [j145]Leila Jamel
, Muhammad Umer, Oumaima Saidani, Bayan Alabduallah, Shtwai Alsubai, Farruh Ishmanov, Tai-Hoon Kim, Imran Ashraf:
Improving prediction of maternal health risks using PCA features and TreeNet model. PeerJ Comput. Sci. 10: e1982 (2024) - [j144]Sidra Abbas, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Mideth B. Abisado, Mehrez Marzougui
, Tai-Hoon Kim, Areej Alasiry:
PODE: privacy-enhanced distributed federated learning approach for origin-destination estimation. PeerJ Comput. Sci. 10: e2050 (2024) - [j143]Tai-Hoon Kim, Si-Yeong Kim:
Predictive Analysis of Breast Cancer from Full-Field Digital Mammography Images using Residual Network. Scalable Comput. Pract. Exp. 25(6) (2024) - [j142]Si-Yeong Kim, Tai-Hoon Kim:
Optimizing Hadoop Data Locality: Performance Enhancement Strategies in Heterogeneous Computing Environments. Scalable Comput. Pract. Exp. 25(6) (2024) - [j141]Mahmood Ashraf
, Lihui Chen
, Nisreen Innab
, Muhammad Umer
, Jamel Baili, Tai-Hoon Kim
, Imran Ashraf
:
Novel 3-D Deep Neural Network Architecture for Crop Classification Using Remote Sensing-Based Hyperspectral Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 12649-12665 (2024) - [j140]Geetha Anbazhagan
, M. Maragatharajan
, Tai-Hoon Kim
:
Smart Battery Management System for Mobile Consumer Electronics Based on Federal Split Learning Model. IEEE Trans. Consumer Electron. 70(3): 5878-5886 (2024) - 2023
- [j139]Sidra Abbas
, Gabriel Avelino R. Sampedro
, Mideth B. Abisado, Ahmad S. Almadhor
, Tai-Hoon Kim, Monji Mohamed Zaidi
:
A Novel Drug-Drug Indicator Dataset and Ensemble Stacking Model for Detection and Classification of Drug-Drug Interaction Indicators. IEEE Access 11: 101525-101536 (2023) - [j138]Bhanu Prakash Doppala, Debnath Bhattacharyya
, Midhun Chakkravarthy, Tai-Hoon Kim:
A hybrid machine learning approach to identify coronary diseases using feature selection mechanism on heart disease dataset. Distributed Parallel Databases 41(1-2): 1-20 (2023) - [j137]K. Sakthidasan Sankaran
, Tai-Hoon Kim
, P. N. Renjith
:
An Improved AI-Based Secure M-Trust Privacy Protocol for Medical Internet of Things in Smart Healthcare System. IEEE Internet Things J. 10(21): 18477-18485 (2023) - [j136]R. S. Raghav, Debnath Bhattacharyya
, Dinesh Kumar Anguraj
, Tai-Hoon Kim:
A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. Pers. Ubiquitous Comput. 27(3): 889-906 (2023) - [j135]R. S. Raghav, Debnath Bhattacharyya
, Dinesh Kumar Anguraj
, Tai-Hoon Kim:
Correction to: A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. Pers. Ubiquitous Comput. 27(3): 907 (2023) - [j134]Rahul Saha
, Gulshan Kumar
, Tannishtha Devgun, William J. Buchanan
, Reji Thomas
, Mamoun Alazab
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Blockchain Framework in Post-Quantum Decentralization. IEEE Trans. Serv. Comput. 16(1): 1-12 (2023) - [c165]Irfan Ahmad Rather, Gulshan Kumar, Rahul Saha, Tai-Hoon Kim:
Enhancement of Security in GFDM Using Ebola-Optimized Joint Secure Compressive Sensing Encryption and Symbol Scrambling Model. AICV 2023: 535-549 - [c164]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
An Authentication Protocol for Healthcare Application: A Case Study of a Diabetic Patient. AINA (1) 2023: 434-445 - [c163]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A Secure Emergency Framework in an IoT Based Patient Monitoring System. SECRYPT 2023: 844-849 - 2022
- [j133]PLS Jayalaxmi
, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey. IEEE Access 10: 121173-121192 (2022) - [j132]PLS Jayalaxmi, Rahul Saha
, Gulshan Kumar
, Tai-Hoon Kim:
Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things. Comput. Electr. Eng. 97: 107610 (2022) - [j131]PLS Jayalaxmi, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Tai-Hoon Kim, Reji Thomas:
DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 102: 108214 (2022) - [j130]Rahul Saha
, Gulshan Kumar
, Neeraj Kumar
, Tai-Hoon Kim
, Tannishtha Devgun, Reji Thomas
, Ahmed Barnawi
:
Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment. IEEE Internet Things J. 9(5): 3631-3641 (2022) - [j129]Rekha Goyat
, Gulshan Kumar
, Mamoun Alazab
, Mauro Conti
, Mritunjay Kumar Rai
, Reji Thomas
, Rahul Saha
, Tai-Hoon Kim
:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022) - [j128]Ashish Kumar, Rahul Saha
, Mauro Conti
, Gulshan Kumar
, William J. Buchanan, Tai-Hoon Kim:
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204: 103414 (2022) - [j127]Amandeep Verma
, Rahul Saha
, Neeraj Kumar
, Gulshan Kumar, Tai-Hoon Kim:
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development. Multim. Tools Appl. 81(14): 19879-19944 (2022) - [j126]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
:
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 18(5): 3452-3461 (2022) - [j125]Sabah Mohammed
, Tai-Hoon Kim
, Ruay-Shiung Chang
, Carlos Ramos:
Guest Editorial: Data Analytics for Public Health Care. IEEE J. Biomed. Health Informatics 26(4): 1409-1410 (2022) - [j124]Tai-Hoon Kim:
Editorial Special Issue on AI Innovations in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 23(3): 2279-2283 (2022) - [c162]Sihem Omri, Manel Abdelkader, Mohamed Hamdi, Tai-Hoon Kim:
Safety Issues Investigation in Deep Learning Based Chatbots Answers to Medical Advice Requests. ICONIP (5) 2022: 597-605 - 2021
- [j123]PLS Jayalaxmi
, Rahul Saha
, Gulshan Kumar
, Neeraj Kumar
, Tai-Hoon Kim
:
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges. IEEE Access 9: 25344-25359 (2021) - [j122]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, William J. Buchanan
, Tannishtha Devgun, Reji Thomas
:
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments. IEEE Access 9: 100972-100980 (2021) - [j121]Sabah Mohammed, Wai-Chi Fang, Aboul Ella Hassanien, Tai-Hoon Kim:
Advanced Data Mining Tools and Methods for Social Computing. Comput. J. 64(3): 281-285 (2021) - [j120]Gurjot Singh Gaba
, Gulshan Kumar
, Tai-Hoon Kim, Himanshu Monga
, Pardeep Kumar
:
Secure Device-to-Device communications for 5G enabled Internet of Things applications. Comput. Commun. 169: 114-128 (2021) - [j119]Sabah Mohammed, Tai-Hoon Kim, Wai-Chi Fang:
Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction]. IEEE Secur. Priv. 19(1): 8-10 (2021) - [j118]Sudipta Roy, Bhavya Patel, Debnath Bhattacharyya, Kushal Dhayal, Tai-Hoon Kim, Mamta Mittal:
Demographical gender prediction of Twitter users using big data analytics: an application of decision marketing. Int. J. Reason. based Intell. Syst. 13(2): 41-49 (2021) - [j117]Sabah Mohammed, Jinan Fiaidhi, Carlos Ramos
, Tai-Hoon Kim, Wai-Chi Fang, Tarek F. Abdelzaher:
Blockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of ThingsBlockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of Things. ACM Trans. Internet Techn. 21(1): 11-55 (2021) - [j116]Rahul Saha
, Gulshan Kumar
, G. Geetha
, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
, Mritunjay Kumar Rai
, Joel J. P. C. Rodrigues
:
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface. IEEE Trans. Veh. Technol. 70(8): 7495-7508 (2021) - [j115]S. NagaMallik Raj
, Debnath Bhattacharyya
, Divya Midhunchakkaravarthy, Tai-Hoon Kim:
Multi-hop in Clustering with Mobility Protocol to Save the Energy Utilization in Wireless Sensor Networks. Wirel. Pers. Commun. 117(4): 3381-3395 (2021) - [c161]Rihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim:
An Efficient and Privacy-Preserving Billing Protocol for Smart Metering. AINA (2) 2021: 691-702 - 2020
- [j114]Gurjot Singh Gaba
, Gulshan Kumar
, Himanshu Monga
, Tai-Hoon Kim
, Pardeep Kumar
:
Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments. IEEE Access 8: 69722-69733 (2020) - [j113]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, Mamoun Alazab
, William J. Buchanan
, Mritunjay Kumar Rai
, G. Geetha
, Reji Thomas
:
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access 8: 94748-94756 (2020) - [j112]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, William J. Buchanan
, Reji Thomas
, Mamoun Alazab
:
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect. IEEE Access 8: 96455-96467 (2020) - [j111]Gurjot Singh Gaba
, Gulshan Kumar
, Himanshu Monga
, Tai-Hoon Kim
, Madhusanka Liyanage
, Pardeep Kumar
:
Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0. IEEE Access 8: 132808-132824 (2020) - [j110]Tai-Hoon Kim
, Sanikommu Madhavi
:
Quantum Data Aggregation Using Secret Sharing and Genetic Algorithm. IEEE Access 8: 175765-175775 (2020) - [j109]Sabah Mohammed
, Hamid R. Arabnia
, Xiaobo Qu, Dalin Zhang
, Tai-Hoon Kim, Jiandong Zhao:
IEEE Access Special Section Editorial: Big Data Technology and Applications in Intelligent Transportation. IEEE Access 8: 201331-201344 (2020) - [j108]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, Reji Thomas
, G. Geetha
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface. IEEE Internet Things J. 7(8): 7783-7794 (2020) - [j107]Shawni Dutta
, Jyotsna Kumar Mandal
, Tai-Hoon Kim, Samir Kumar Bandyopadhyay
:
Breast Cancer Prediction Using Stacked GRU-LSTM-BRNN. Appl. Comput. Syst. 25(2): 163-171 (2020) - [j106]Lalit Mohan Goyal
, Mamta Mittal
, Ranjeeta Kaushik, Amit Verma
, Iqbaldeep Kaur
, Sudipta Roy
, Tai-Hoon Kim
:
Improved ECG Watermarking Technique Using Curvelet Transform. Sensors 20(10): 2941 (2020) - [j105]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, Reji Thomas
, Tai-Hoon Kim
:
A Lattice Signcrypted Secured Localization in Wireless Sensor Networks. IEEE Syst. J. 14(3): 3949-3956 (2020) - [j104]Tai-Hoon Kim
, Virendra Singh Solanki, Hardik J. Baraiya, Anirban Mitra, Hirav Shah, Sudipta Roy
:
A Smart, Sensible Agriculture System Using the Exponential Moving Average Model. Symmetry 12(3): 457 (2020) - [j103]Mamta Mittal
, Ranjeeta Kaushik, Amit Verma, Iqbaldeep Kaur, Lalit Mohan Goyal
, Sudipta Roy
, Tai-Hoon Kim
:
Image Watermarking in Curvelet Domain Using Edge Surface Blocks. Symmetry 12(5): 822 (2020) - [j102]Akshay Aggarwal, Aniruddha Chauhan, Deepika Kumar
, Mamta Mittal
, Sudipta Roy
, Tai-Hoon Kim
:
Video Caption Based Searching Using End-to-End Dense Captioning and Sentence Embeddings. Symmetry 12(6): 992 (2020) - [j101]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, William J. Buchanan
, Reji Thomas
, G. Geetha
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption. IEEE Trans. Veh. Technol. 69(7): 7707-7722 (2020) - [i1]Gulshan Kumar, Rahul Saha, William J. Buchanan, G. Geetha, Reji Thomas, Tai-Hoon Kim, Mamoun Alazab:
Decentralized Accessibility of e-commerce Products through Blockchain Technology. CoRR abs/2007.05265 (2020)
2010 – 2019
- 2019
- [j100]Mamta Mittal
, Amit Verma, Iqbaldeep Kaur, Bhavneet Kaur, Meenakshi Sharma, Lalit Mohan Goyal
, Sudipta Roy
, Tai-Hoon Kim
:
An Efficient Edge Detection Approach to Provide Better Edge Connectivity for Image Analysis. IEEE Access 7: 33240-33255 (2019) - [j99]Rahul Saha
, G. Geetha
, Gulshan Kumar
, Tai-Hoon Kim
, William J. Buchanan
:
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access 7: 172045-172054 (2019) - [j98]Tai-Hoon Kim
, Rekha Goyat, Mritunjay Kumar Rai
, Gulshan Kumar
, William J. Buchanan
, Rahul Saha
, Reji Thomas
:
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access 7: 184133-184144 (2019) - [j97]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim
:
Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics. IEEE Internet Things J. 6(4): 6835-6842 (2019) - [j96]Alejandra Guadalupe Silva Trujillo
, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba, Tai-Hoon Kim:
A traffic analysis attack to compute social network measures. Multim. Tools Appl. 78(21): 29731-29745 (2019) - [j95]Fernando Turrado García, Luis Javier García-Villalba, Ana Lucila Sandoval Orozco, Tai-Hoon Kim:
A comparison of learning methods over raw data: forecasting cab services market share in New York City. Multim. Tools Appl. 78(21): 29783-29804 (2019) - [j94]Fernando Turrado García, Luis Javier García-Villalba, Ana Lucila Sandoval Orozco, Francisco Damián Aranda Ruiz, Andrés Aguirre Juárez, Tai-Hoon Kim:
Locating similar names through locality sensitive hashing and graph theory. Multim. Tools Appl. 78(21): 29853-29866 (2019) - [j93]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim
, Se-Jung Lim
, Jai Sukh Paul Singh
:
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set. Sensors 19(2): 376 (2019) - [j92]Rekha Goyat, Mritunjay Kumar Rai, Gulshan Kumar
, Rahul Saha
, Tai-Hoon Kim
:
Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks. Sensors 19(16): 3603 (2019) - [c160]Emna Jaidane, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A New Trust Architecture for Smart Vehicular Systems. ICETE (1) 2019: 387-392 - [c159]Rihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim:
A novel Approach for Privacy-Preserving Data Aggregation in Smart Grid. IWCMC 2019: 1060-1066 - [c158]Rihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim:
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid. IWCMC 2019: 1067-1072 - [c157]Emna Jaidane, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A new vehicular blackbox architecture based on searchable encryption. IWCMC 2019: 1073-1078 - 2018
- [j91]Chunxue Wu
, Chong Luo
, Naixue Xiong, Wei Zhang, Tai-Hoon Kim:
A Greedy Deep Learning Method for Medical Disease Analysis. IEEE Access 6: 20021-20030 (2018) - [j90]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai, Tai-Hoon Kim
:
Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication. IEEE Access 6: 46558-46567 (2018) - [j89]Luis Javier García-Villalba
, Ana Lucila Sandoval Orozco, Antonio Lopez Vivar, Esteban Alejandro Armas Vega, Tai-Hoon Kim
:
Ransomware Automatic Data Acquisition Tool. IEEE Access 6: 55043-55052 (2018) - [j88]Jesús Antonio Puente Fernández, Luis Javier García-Villalba
, Tai-Hoon Kim
:
Software Defined Networks in Wireless Sensor Architectures. Entropy 20(4): 225 (2018) - [j87]Alberto Benito Peral, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba
, Tai-Hoon Kim
:
Distributed One Time Password Infrastructure for Linux Environments. Entropy 20(5): 319 (2018) - [j86]Rahul Saha
, G. Geetha, Gulshan Kumar
, Tai-Hoon Kim:
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Secur. Commun. Networks 2018: 9802475:1-9802475:11 (2018) - [j85]Alexandre Pinheiro
, Edna Dias Canedo
, Rafael Timóteo de Sousa Júnior
, Robson de Oliveira Albuquerque
, Luis Javier García-Villalba
, Tai-Hoon Kim
:
Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services. Sensors 18(3): 753 (2018) - [j84]Jesús Antonio Puente Fernández, Luis Javier García-Villalba
, Tai-Hoon Kim
:
Clustering and Flow Conservation Monitoring Tool for Software Defined Networks. Sensors 18(4): 1079 (2018) - [j83]Murilo Coutinho
, Robson de Oliveira Albuquerque
, Fábio Borges
, Luis Javier García-Villalba
, Tai-Hoon Kim
:
Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography. Sensors 18(5): 1306 (2018) - [j82]Marcone Pereira de Almeida
, Rafael Timóteo de Sousa Júnior
, Luis Javier García-Villalba
, Tai-Hoon Kim
:
New DoS Defense Method Based on Strong Designated Verifier Signatures. Sensors 18(9): 2813 (2018) - [j81]Jai Sukh Paul Singh
, Mritunjay Kumar Rai
, Gulshan Kumar
, Rajwinder Singh, Hye-Jin Kim
, Tai-Hoon Kim:
Advanced Multiresolution Wavelet Based Wideband Spectrum Sensing Technique for Cognitive Radio. Wirel. Commun. Mob. Comput. 2018: 1908536:1-1908536:13 (2018) - [c156]Marwa Chamekh, Mohamed Hamdi, Sadok El Asmi, Tai-Hoon Kim:
Security of RFID Based Internet of Things Applications: Requirements and Open Issues. SSD 2018: 699-703 - [c155]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system. CommNet 2018: 1-10 - [c154]Emna Jaidane, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
An infrastructurless vehicle blackbox system. IINTEC 2018: 1-5 - [c153]Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim:
Biometric-based Per-Packet Authentication Techniques in Communication Networks. IWCMC 2018: 273-278 - [c152]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area Network. IWCMC 2018: 774-779 - [c151]Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim:
A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints. WETICE 2018: 100-105 - [c150]Jaweher Zouari
, Mohamed Hamdi, Tai-Hoon Kim:
Privacy Preserving Profile Matching Protocol for Human-Centric Social Internet of Things. WETICE 2018: 181-186 - [c149]Marwa Chamekh, Mohamed Hamdi, Sadok El Asmi, Tai-Hoon Kim:
Secured Distributed IoT Based Supply Chain Architecture. WETICE 2018: 199-202 - [c148]Marwa Chamekh, Sadok El Asmi, Mohamed Hamdi, Tai-Hoon Kim:
IoT Based Tracking System For Supply Chain Management. WINCOM 2018: 1-5 - 2017
- [j80]Raj R. Parmar, Sudipta Roy
, Debnath Bhattacharyya
, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions. IEEE Access 5: 7156-7163 (2017) - [j79]Sudipta Roy
, Debnath Bhattacharyya
, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI. Comput. Methods Programs Biomed. 140: 307-320 (2017) - [j78]Sudipta Roy
, Debnath Bhattacharyya
, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction. Frontiers Comput. Sci. 11(4): 717-727 (2017) - [j77]Tai-Hoon Kim, Carlos Ramos
, Sabah Mohammed
:
Smart City and IoT. Future Gener. Comput. Syst. 76: 159-162 (2017) - [j76]Paulo Lima Machado, Rafael T. de Sousa Jr.
, Robson de Oliveira Albuquerque
, Luis Javier García-Villalba
, Tai-Hoon Kim
:
Detection of Electronic Anklet Wearers' Groupings throughout Telematics Monitoring. ISPRS Int. J. Geo Inf. 6(1): 31 (2017) - [j75]Tai-Hoon Kim, Mincong Tang:
Preface. Int. J. Syst. Assur. Eng. Manag. 8(3s): 1959-1960 (2017) - [j74]Ruben Cruz Huacarpuma, Rafael Timóteo de Sousa Júnior
, Maristela Terto de Holanda
, Robson de Oliveira Albuquerque
, Luis Javier García-Villalba
, Tai-Hoon Kim
:
Distributed Data Service for Data Management in Internet of Things Middleware. Sensors 17(5): 977 (2017) - [j73]Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba
, Tai-Hoon Kim
:
A Family of ACO Routing Protocols for Mobile Ad Hoc Networks. Sensors 17(5): 1179 (2017) - [j72]Huanhuan Li
, Jingxian Liu, Ryan Wen Liu
, Naixue Xiong
, Kefeng Wu, Tai-Hoon Kim
:
A Dimensionality Reduction-Based Multi-Step Clustering Method for Robust Vessel Trajectory Analysis. Sensors 17(8): 1792 (2017) - [j71]Ismael Amezcua Valdovinos
, Jesús Arturo Pérez Díaz
, Luis Javier García-Villalba
, Tai-Hoon Kim
:
BATCP: Bandwidth-Aggregation Transmission Control Protocol. Symmetry 9(8): 167 (2017) - [j70]Igor Forain
, Robson de Oliveira Albuquerque
, Ana Lucila Sandoval Orozco, L. Javier García-Villalba
, Tai-Hoon Kim
:
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed. Symmetry 9(9): 172 (2017) - [c147]Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim:
Adaptive Risk Management Framework for Cloud Computing. AINA 2017: 1154-1161 - [c146]Manel Medhioub, Tai-Hoon Kim, Mohamed Hamdi:
Adaptive risk treatment for cloud computing based on Markovian game. CCNC 2017: 236-241 - [c145]Rahma Gharsallaoui, Mohamed Hamdi, Tai-Hoon Kim:
Video streaming strategy based on feedback control loop theory in cloud platform. ICUFN 2017: 854-859 - [c144]Rahma Gharsallaoui, Mohamed Hamdi, Tai-Hoon Kim:
A novel privacy technique for Augmented Reality cloud gaming based on image authentication. IWCMC 2017: 252-257 - [c143]Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim:
A new biometric-based security framework for cloud storage. IWCMC 2017: 390-395 - [c142]Rahma Gharsallaoui, Mohamed Hamdi, Tai-Hoon Kim:
A novel adaptive streaming approach for cloud-based mobile video games. IWCMC 2017: 1072-1077 - [c141]Marwa Chamekh, Sadok El Asmi, Mohamed Hamdi, Tai-Hoon Kim:
Context aware middleware for RFID based pharmaceutical supply chain. IWCMC 2017: 1915-1920 - [c140]Jaweher Zouari
, Mohamed Hamdi, Tai-Hoon Kim:
A privacy-preserving homomorphic encryption scheme for the Internet of Things. IWCMC 2017: 1939-1944 - [c139]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System. SECRYPT 2017: 554-559 - [c138]Jaweher Zouari
, Mohamed Hamdi, Tai-Hoon Kim:
Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors. SCSS 2017: 63-67 - 2016
- [j69]Javier Portela
, Luis Javier García-Villalba
, Alejandra Guadalupe Silva Trujillo
, Ana Lucila Sandoval Orozco
, Tai-Hoon Kim
:
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks. Sensors 16(11): 1832 (2016) - [j68]João José Costa Gondim
, Robson de Oliveira Albuquerque
, Anderson Clayton Alves Nascimento
, Luis Javier García-Villalba
, Tai-Hoon Kim
:
A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things. Sensors 16(11): 1855 (2016) - [j67]Sabah Mohammed
, Tai-Hoon Kim:
Big data applications for healthcare: preface to special issue. J. Supercomput. 72(10): 3675-3676 (2016) - [j66]Robson de Oliveira Albuquerque
, Luis Javier García-Villalba, Ana Lucila Sandoval Orozco
, Rafael Timóteo de Sousa Júnior
, Tai-Hoon Kim:
Leveraging information security and computational trust for cybersecurity. J. Supercomput. 72(10): 3729-3763 (2016) - [j65]Javier Portela
, Luis Javier García-Villalba, Alejandra Guadalupe Silva Trujillo
, Ana Lucila Sandoval Orozco
, Tai-Hoon Kim:
Disclosing user relationships in email networks. J. Supercomput. 72(10): 3787-3800 (2016) - [c137]Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim:
Chaotic construction of cryptographic keys based on biometric data. HPCS 2016: 509-516 - [c136]Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim:
A New Authentication Scheme for Cloud-based Storage Applications. SIN 2016: 57-60 - [c135]Rahma Gharsallaoui, Mohamed Hamdi, Tai-Hoon Kim:
Image compression with optimal traversal using wavelet and percolation theories. SoftCOM 2016: 1-6 - 2015
- [j64]Tai-Hoon Kim, Sabah Mohammed
, Carlos Ramos
, Wai-Chi Fang:
Guest Editorial: Multimedia Applications for Smart device and Equipment. Multim. Tools Appl. 74(19): 8261-8266 (2015) - [j63]Julio César Rodríguez Ribón, Luis Javier García-Villalba
, Tai-Hoon Kim:
Virtual learning communities: unsolved troubles. Multim. Tools Appl. 74(19): 8505-8519 (2015) - [j62]Julio César Rodríguez Ribón, Luis Javier García-Villalba
, Tomás Pedro de Miguel Moro, Tai-Hoon Kim:
Solving technological isolation to build virtual learning communities. Multim. Tools Appl. 74(19): 8521-8539 (2015) - [j61]Weizhe Zhang, Hui He, Tai-Hoon Kim:
Xen-based virtual honeypot system for smart device. Multim. Tools Appl. 74(19): 8541-8558 (2015) - [j60]Javier Portela
, Luis Javier García-Villalba
, Alejandra Guadalupe Silva Trujillo
, Ana Lucila Sandoval Orozco
, Tai-Hoon Kim
:
Extracting Association Patterns in Network Communications. Sensors 15(2): 4052-4071 (2015) - [c134]Bhanu Prakash Battula
, Debnath Bhattacharyya
, C. V. P. R. Prasad, Tai-Hoon Kim:
A Novel Prototype Decision Tree Method Using Sampling Strategy. ICCSA (1) 2015: 90-97 - [c133]Haythem Hayouni, Mohamed Hamdi, Tai-Hoon Kim:
A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks. IWCMC 2015: 1193-1198 - 2014
- [j59]Nashwa El-Bendary
, Tai-Hoon Kim, Aboul Ella Hassanien, Mohamed Sami:
Automatic image annotation approach based on optimization of classes scores. Computing 96(5): 381-402 (2014) - [j58]Tai-Hoon Kim, Carlos Ramos
, Sabah Mohammed
:
Editorial to special issue: computer and network applications for ubiquitous computing. Computing 96(9): 775-776 (2014) - [j57]Luis Javier García-Villalba
, Ana Lucila Sandoval Orozco
, Julián García Matesanz, Tai-Hoon Kim:
E-D2HCP: enhanced distributed dynamic host configuration protocol. Computing 96(9): 777-791 (2014) - [j56]Delfín Rupérez Cañas, Luis Javier García-Villalba
, Ana Lucila Sandoval Orozco
, Tai-Hoon Kim:
Adaptive routing protocol for mobile ad hoc networks. Computing 96(9): 817-827 (2014) - [j55]Weizhe Zhang, You Zhang, Tai-Hoon Kim:
Detecting bad information in mobile wireless networks based on the wireless application protocol. Computing 96(9): 855-874 (2014) - [j54]Robson de Oliveira Albuquerque
, Luis Javier García-Villalba
, Tai-Hoon Kim:
GTrust: Group Extension for Trust Models in Distributed Systems. Int. J. Distributed Sens. Networks 10 (2014) - [j53]Fábio Buiati, Luis Javier García-Villalba
, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco
, Tai-Hoon Kim:
A Zone-Based Media Independent Information Service for IEEE 802.21 Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j52]Tai-Hoon Kim, Sabah Mohammed
, Ruay-Shiung Chang, Carlos Ramos
:
Advanced Sensor Technology and Applications in Industrial Control System 2014. Int. J. Distributed Sens. Networks 10 (2014) - [j51]Tai-Hoon Kim, Carlos Ramos
, Sabah Mohammed
:
Ubiquitous Sensor Networks and Their Application 2013. Int. J. Distributed Sens. Networks 10 (2014) - [j50]Weizhe Zhang, Hui He, Qizhen Zhang, Tai-Hoon Kim:
PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform. Int. J. Distributed Sens. Networks 10 (2014) - [j49]Tai-Hoon Kim, Ching-Hsien Hsu, Sajid Hussain:
Trends in high-performance computing and communications for ubiquitous computing. Knowl. Eng. Rev. 29(4): 407-408 (2014) - [j48]Robson de Oliveira Albuquerque
, Luis Javier García-Villalba
, Ana Lucila Sandoval Orozco
, Fábio Buiati, Tai-Hoon Kim
:
A Layered Trust Information Security Architecture. Sensors 14(12): 22754-22772 (2014) - [c132]Haeng-Kon Kim, Tai-Hoon Kim:
SOA Modeling Based on MDA. DCAI 2014: 181-194 - [e48]Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad
:
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library 70, Springer 2014, ISBN 978-3-662-43615-8 [contents] - 2013
- [j47]Daniel Servos
, Sabah Mohammed
, Jinan Fiaidhi, Tai-Hoon Kim:
Extensions to ciphertext-policy attribute-based encryption to support distributed environments. Int. J. Comput. Appl. Technol. 47(2/3): 215-226 (2013) - [j46]Tai-Hoon Kim, Ruay-Shiung Chang, Carlos Ramos
, Sabah Mohammed
:
Advanced Sensor Technology and Applications in Industrial Control System. Int. J. Distributed Sens. Networks 9 (2013) - [j45]Debnath Bhattacharyya
, Anindya Jyoti Pal, Tai-Hoon Kim:
Cell-graph coloring for cancerous tissue modelling and classification. Multim. Tools Appl. 66(2): 229-245 (2013) - [j44]Krishna Bhowal
, Debnath Bhattacharyya
, Anindya Jyoti Pal, Tai-Hoon Kim:
A GA based audio steganography with enhanced security. Telecommun. Syst. 52(4): 2197-2204 (2013) - [j43]Tai-Hoon Kim, Sabah Mohammed
:
Editorial of special section on multimedia applications and ubiquitous computing. J. Supercomput. 65(1): 1-3 (2013) - [j42]Tai-Hoon Kim, Sabah Mohammed
:
Toward designing a secure biosurveillance cloud. J. Supercomput. 65(1): 61-70 (2013) - [j41]Jung-Ho Um, Hoon Choi, Sa-Kwang Song, Sung-Pil Choi, Hwa-Mook Yoon, Hanmin Jung, Tai-Hoon Kim:
Development of a virtualized supercomputing environment for genomic analysis. J. Supercomput. 65(1): 71-85 (2013) - [j40]Seungdo Jeong
, Tai-Hoon Kim, Jungwon Cho
:
Gait recognition using description of shape synthesized by planar homography. J. Supercomput. 65(1): 122-135 (2013) - [c131]Heba F. Eid
, Aboul Ella Hassanien, Tai-Hoon Kim, Soumya Banerjee:
Linear Correlation-Based Feature Selection for Network Intrusion Detection Model. SecNet 2013: 240-248 - 2012
- [j39]Mohamed Hamdi, Nabil Tabbane, Tai-Hoon Kim, Sajid Hussain:
Web Services in Multimedia Communication. Adv. Multim. 2012: 129504:1-129504:2 (2012) - [j38]Hoon Ko, Kyung-jin An, Tai-Hoon Kim, Goreti Marreiros
, Zita A. Vale
, Jong-Myoung Choi:
A study on dynamic state information (DSI) around users for safe urban life. Comput. Math. Appl. 63(2): 554-563 (2012) - [j37]Guoliang He, Naixue Xiong, Laurence Tianruo Yang, Tai-Hoon Kim, Ching-Hsien Hsu, Yuanxiang Li, Ting Hu:
Evolvable hardware design based on a novel simulated annealing in an embedded system. Concurr. Comput. Pract. Exp. 24(4): 354-370 (2012) - [j36]Tai-Hoon Kim:
Introduction. Integr. Comput. Aided Eng. 19(1): 1 (2012) - [j35]Yujin Lim, Hak-Man Kim, Sanggil Kang, Tai-Hoon Kim:
Vehicle-to-grid communication system for electric vehicle charging. Integr. Comput. Aided Eng. 19(1): 57-65 (2012) - [j34]Luis Javier García-Villalba
, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco
, Tai-Hoon Kim:
Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j33]Luis Javier García-Villalba
, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco
, Tai-Hoon Kim:
Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j32]Tz-Heng Hsu, Tai-Hoon Kim, Chao-Chun Chen, Jyun-Sian Wu:
A Dynamic Traffic-Aware Duty Cycle Adjustment MAC Protocol for Energy Conserving in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j31]Hye-Jin Kim, Ronnie D. Caytiles, Tai-Hoon Kim:
Design of an Effective WSN-Based Interactive u-Learning Model. Int. J. Distributed Sens. Networks 8 (2012) - [j30]Tai-Hoon Kim, Wai-Chi Fang, Carlos Ramos
, Sabah Mohammed
, Osvaldo Gervasi
, Adrian Stoica
:
Ubiquitous Sensor Networks and Its Application. Int. J. Distributed Sens. Networks 8 (2012) - [j29]Ana Lucila Sandoval Orozco
, Julián García Matesanz, Luis Javier García-Villalba
, José Duván Márquez Díaz, Tai-Hoon Kim:
Security Issues in Mobile Ad Hoc Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j28]Aboul Ella Hassanien
, Tai-Hoon Kim:
Breast cancer MRI diagnosis approach using support vector machine and pulse coupled neural networks. J. Appl. Log. 10(4): 277-284 (2012) - [j27]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan
, Khaled Alghathbar, Tai-Hoon Kim, Hassan M. Elkamchouchi:
Mobile one-time passwords: two-factor authentication using mobile phones. Secur. Commun. Networks 5(5): 508-516 (2012) - [c130]Rasha Wahid, Neveen I. Ghali, Hala S. Own, Tai-Hoon Kim, Aboul Ella Hassanien
:
A Gaussian Mixture Models Approach to Human Heart Signal Verification Using Different Feature Extraction Algorithms. FGIT-MulGraB/BSBT/IUrC 2012: 16-24 - [c129]Ahmad Taher Azar
, Aboul Ella Hassanien
, Tai-Hoon Kim:
Expert System Based on Neural-Fuzzy Rules for Thyroid Diseases Diagnosis. FGIT-MulGraB/BSBT/IUrC 2012: 94-105 - [c128]Mohamed Abd Elfattah
, Mohamed Abu ElSoud, Aboul Ella Hassanien
, Tai-Hoon Kim:
Automated Classification of Galaxies Using Invariant Moments. FGIT 2012: 103-111 - [c127]Mohamed Sami, Nashwa El-Bendary
, Tai-Hoon Kim, Aboul Ella Hassanien
:
Using Particle Swarm Optimization for Image Regions Annotation. FGIT 2012: 241-250 - [c126]Jinan Fiaidhi, Osama Mohammed, Sabah Mohammed
, Simon Fong, Tai-Hoon Kim:
Mining twitterspace for information: Classifying sentiments programmatically using Java. ICDIM 2012: 303-308 - [c125]Jinan Fiaidhi, Osama Mohammed, Sabah Mohammed
, Simon Fong, Tai-Hoon Kim:
Opinion mining over twitterspace: Classifying tweets programmatically using the R approach. ICDIM 2012: 313-319 - [c124]Jinan Fiaidhi, Michael D. Rioux, Sabah Mohammed
, Tai-Hoon Kim:
Developing Casual Learning Games Using the Apache Pivot IIA Capabilities. NDT (1) 2012: 1-10 - [e47]Aboul Ella Hassanien
, Abdel-Badeeh M. Salem, Rabie A. Ramadan
, Tai-Hoon Kim:
Advanced Machine Learning Technologies and Applications - First International Conference, AMLTA 2012, Cairo, Egypt, December 8-10, 2012. Proceedings. Communications in Computer and Information Science 322, Springer 2012, ISBN 978-3-642-35325-3 [contents] - [e46]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang, Seung-Jung Shin:
Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part I. Communications in Computer and Information Science 262, Springer 2012, ISBN 978-3-642-27203-5 [contents] - [e45]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, Thanos Vasilakos, Adrian Stoica, Charalampos Z. Patrikakis, Gansen Zhao, L. Javier García-Villalba, Yang Xiao:
Communication and Networking - International Conference, FGCN 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part I. Communications in Computer and Information Science 265, Springer 2012, ISBN 978-3-642-27191-5 [contents] - [e44]Tai-Hoon Kim, Dae-Sik Ko, Thanos Vasilakos, Adrian Stoica, Jemal H. Abawajy:
Computer Applications for Communication, Networking, and Digital Contents - International Conferences, FGCN and DCA 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings. Communications in Computer and Information Science 350, Springer 2012, ISBN 978-3-642-35593-6 [contents] - [e43]Tai-Hoon Kim, Hyun Seob Cho, Osvaldo Gervasi, Stephen S. Yau:
Computer Applications for Graphics, Grid Computing, and Industrial Environment - International Conferences, GDC, IESH and CGAG 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings. Communications in Computer and Information Science 351, Springer 2012, ISBN 978-3-642-35599-8 [contents] - [e42]Tai-Hoon Kim, Jianhua Ma, Wai-Chi Fang, Yanchun Zhang, Alfredo Cuzzocrea:
Computer Applications for Database, Education, and Ubiquitous Computing - International Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings. Communications in Computer and Information Science 352, Springer 2012, ISBN 978-3-642-35602-5 [contents] - [e41]Tai-Hoon Kim, Jeong-Jin Kang, William I. Grosky, Tughrul Arslan, Niki Pissinou:
Computer Applications for Bio-technology, Multimedia, and Ubiquitous City - International Conferences MulGraB, BSBT and IUrC 2012 Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings. Communications in Computer and Information Science 353, Springer 2012, ISBN 978-3-642-35520-2 [contents] - [e40]Tai-Hoon Kim, Young-Hoon Lee, Wai-Chi Fang:
Future Generation Information Technology - 4th International Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings. Lecture Notes in Computer Science 7709, Springer 2012, ISBN 978-3-642-35584-4 [contents] - 2011
- [j26]Ruay-Shiung Chang, Tai-Hoon Kim:
Special Section: Future Generation Information Technology. Future Gener. Comput. Syst. 27(4): 370-371 (2011) - [j25]Tai-Hoon Kim, Debnath Bhattacharyya
, Samir Kumar Bandyopadhyay
:
Supervised chromosome clustering and image classification. Future Gener. Comput. Syst. 27(4): 372-376 (2011) - [j24]Naveen K. Chilamkurti, Ben Soh, Tai-Hoon Kim:
Special issue on security and privacy in wireless systems. Secur. Commun. Networks 4(7): 727-728 (2011) - [j23]Ben Townsend
, Jemal H. Abawajy, Tai-Hoon Kim:
SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors. Sensors 11(4): 4231-4243 (2011) - [j22]Seung-Jae Jang, Young-Gu Lee, Kwang-Hyung Lee, Tai-Hoon Kim, Moon-Seog Jun:
A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays. Sensors 11(9): 8227-8240 (2011) - [j21]Tai-Hoon Kim, Omer F. Rana
, Juan Touriño
, Isaac Woungang:
Special issue on "Theory and practice of high-performance computing, communications, and security". J. Supercomput. 55(2): 123-125 (2011) - [c123]Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim:
A rough k-means fragile watermarking approach for image authentication. FedCSIS 2011: 19-23 - [c122]Hossam M. Zawbaa
, Nashwa El-Bendary
, Aboul Ella Hassanien
, Tai-Hoon Kim:
Machine Learning-Based Soccer Video Summarization System. FGIT-MulGraB (2) 2011: 19-28 - [c121]Armen Bagdasaryan
, Tai-Hoon Kim:
A Model of Hierarchically Consistent Control of Nonlinear Dynamical Systems. FGIT-CA/CES3 2011: 58-64 - [c120]Armen Bagdasaryan
, Tai-Hoon Kim:
Mathematical Model and Analysis of Reliability and Safety of Large Database Systems. FGIT-DTA/BSBT 2011: 61-70 - [c119]Masitah Ahmad
, Jemal H. Abawajy, Tai-Hoon Kim:
Service Quality Assessment in Provision of Library Services. FGIT-UNESST 2011: 83-92 - [c118]Lamiaa M. El Bakrawy
, Neveen I. Ghali, Aboul Ella Hassanien
, Tai-Hoon Kim:
A Fast and Secure One-Way Hash Function. FGIT-SecTech 2011: 85-93 - [c117]Debnath Bhattacharyya
, Tai-Hoon Kim, Gang-soo Lee:
Leaf Image Analysis towards Plant Identification. FGIT-SIP 2011: 113-125 - [c116]Debnath Bhattacharyya
, Tai-Hoon Kim, Gang-soo Lee:
Watermarking Using Multiresolution Cosine Transformation: A Review. FGIT-SIP 2011: 126-139 - [c115]Debnath Bhattacharyya
, Tai-Hoon Kim, Gang-soo Lee:
Use of Artificial Neural Network in Bengali Character Recognition. FGIT-SIP 2011: 140-152 - [c114]Rajib Ghosh
, Debnath Bhattacharyya
, Tai-Hoon Kim, Gang-soo Lee:
New Algorithm for Skewing Detection of Handwritten Bangla Words. FGIT-SIP 2011: 153-159 - [c113]Heba F. Eid
, Mostafa A. Salama
, Aboul Ella Hassanien
, Tai-Hoon Kim:
Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification. FGIT-SecTech 2011: 195-203 - [c112]Nabanita Mukherjee (Ganguly), Imon Mukherjee
, Debnath Bhattacharyya
, Tai-Hoon Kim:
Context Based Speech Analysis of Bengali Language as a Part of TTS Conversion. FGIT-SIP 2011: 204-214 - [c111]Heba F. Eid
, Ashraf Darwish
, Aboul Ella Hassanien
, Tai-Hoon Kim:
Intelligent Hybrid Anomaly Network Intrusion Detection System. FGIT-FGCN (1) 2011: 209-218 - [c110]Mostafa A. Salama
, Aboul Ella Hassanien
, Aly A. Fahmy, Tai-Hoon Kim:
Heart Sound Feature Reduction Approach for Improving the Heart Valve Diseases Identification. FGIT-SIP 2011: 280-290 - [c109]Fábio Buiati, Luis Javier García-Villalba
, Delfín Rupérez Cañas, Tai-Hoon Kim:
Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service. FGIT-MulGraB (2) 2011: 290-294 - [c108]Julio César Rodríguez Ribón, Luis Javier García-Villalba
, Tomás Pedro de Miguel Moro, Tai-Hoon Kim:
Grid of Learning Resources in E-learning Communities. FGIT-MulGraB (2) 2011: 295-299 - [c107]Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco
, Luis Javier García-Villalba
, Tai-Hoon Kim:
A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks. FGIT-MulGraB (2) 2011: 300-304 - [c106]Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco
, Luis Javier García-Villalba
, Tai-Hoon Kim:
Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension. FGIT-MulGraB (2) 2011: 305-309 - [c105]Jemal H. Abawajy, Tai-Hoon Kim:
Engaging and Effective Asynchronous Online Discussion Forums. FGIT-ASEA/DRBC/EL 2011: 695-705 - [c104]Jemal H. Abawajy, Tai-Hoon Kim:
Online Learning Environment: Taxonomy of Asynchronous Online Discussion Forums. FGIT-ASEA/DRBC/EL 2011: 706-714 - [c103]Hoon Ko, Goreti Marreiros
, Kyung-jin An, Zita A. Vale
, Tai-Hoon Kim, Jong-Myoung Choi:
Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design. IMIS 2011: 65-72 - [c102]Maricel O. Balitanas, Seung-Hwan Jeon, Tai-Hoon Kim:
Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System. ISA 2011: 211-218 - [c101]Rosslin John Robles
, Tai-Hoon Kim:
Application Program Interface as Back-Up Data Source for SCADA Systems. ISA 2011: 219-226 - [c100]Rosslin John Robles
, Maricel O. Balitanas, Tai-Hoon Kim:
Security Encryption Schemes for Internet SCADA: Comparison of the Solutions. SUComS 2011: 19-27 - [c99]Maricel O. Balitanas, Rosslin John Robles
, Tai-Hoon Kim:
Retrofit to CAIN Issues for Critical Infrastructures. SUComS 2011: 114-124 - [c98]Yujin Lim, Hak-Man Kim, Sanggil Kang, Tai-Hoon Kim:
Recommendation Algorithm of the App Store by Using Semantic Relations between Apps. UCMA (2) 2011: 139-144 - [c97]Debnath Bhattacharyya
, Tai-Hoon Kim:
Similarity Checking of Handwritten Signature Using Binary Dotplot Analysis. UCMA (2) 2011: 299-306 - [c96]Debnath Bhattacharyya
, Tai-Hoon Kim:
Brain Tumor Detection Using MRI Image Analysis. UCMA (2) 2011: 307-314 - [c95]Debnath Bhattacharyya
, Tai-Hoon Kim:
Image Data Hiding Technique Using Discrete Fourier Transformation. UCMA (2) 2011: 315-323 - [e39]Tai-Hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel O. Balitanas:
Advanced Communication and Networking - Third International Conference, ACN 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings. Communications in Computer and Information Science 199, Springer 2011, ISBN 978-3-642-23311-1 [contents] - [e38]Tai-Hoon Kim, Hojjat Adeli, Adrian Stoica, Byeong Ho Kang
:
Control and Automation, and Energy System Engineering - International Conferences, CA and CES3 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 256, Springer 2011, ISBN 978-3-642-26009-4 [contents] - [e37]Tai-Hoon Kim, Hojjat Adeli, Haeng-Kon Kim, Heau-Jo Kang, Kyung Jung Kim, Kiumi Akingbehin, Byeong Ho Kang
:
Software Engineering, Business Continuity, and Education - International Conferences ASEA, DRBC and EL 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 257, Springer 2011, ISBN 978-3-642-27206-6 [contents] - [e36]Tai-Hoon Kim, Hojjat Adeli, Alfredo Cuzzocrea, Tughrul Arslan, Yanchun Zhang, Jianhua Ma, Kyo-Il Chung, Siti Mariyam Hj. Shamsuddin, Xiaofeng Song:
Database Theory and Application, Bio-Science and Bio-Technology - International Conferences, DTA and BSBT 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2001 in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 258, Springer 2011, ISBN 978-3-642-27156-4 [contents] - [e35]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, L. Javier García-Villalba, Kirk P. Arnett, Muhammad Khurram Khan
:
Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 259, Springer 2011, ISBN 978-3-642-27188-5 [contents] - [e34]Tai-Hoon Kim, Hojjat Adeli, Carlos Ramos
, Byeong Ho Kang:
Signal Processing, Image Processing and Pattern Recognition - International Conference, SIP 2011, Held as Part of the Future Generation Information Technology Conference FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 260, Springer 2011, ISBN 978-3-642-27182-3 [contents] - [e33]Tai-Hoon Kim, Hojjat Adeli, Hyun Seob Cho, Osvaldo Gervasi, Stephen S. Yau, Byeong Ho Kang
, L. Javier García-Villalba:
Grid and Distributed Computing - International Conference, GDC 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 261, Springer 2011, ISBN 978-3-642-27179-3 [contents] - [e32]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang
, Seung-Jung Shin:
Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II. Communications in Computer and Information Science 263, Springer 2011, ISBN 978-3-642-27185-4 [contents] - [e31]Tai-Hoon Kim, Hojjat Adeli, Jianhua Ma, Wai-Chi Fang, Byeong Ho Kang
, Byungjoo Park, Frode Eika Sandnes, Kun Chang Lee:
U- and E-Service, Science and Technology - International Conference, UNESST 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 264, Springer 2011, ISBN 978-3-642-27209-7 [contents] - [e30]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, Thanos Vasilakos, Adrian Stoica, Charalampos Z. Patrikakis, Gansen Zhao, L. Javier García-Villalba, Yang Xiao:
Communication and Networking - International Conference, FGCN 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II. Communications in Computer and Information Science 266, Springer 2011, ISBN 978-3-642-27200-4 [contents] - [e29]Tai-Hoon Kim, Hojjat Adeli, Dominik Slezak, Frode Eika Sandnes
, Xiaofeng Song, Kyo-Il Chung, Kirk P. Arnett:
Future Generation Information Technology - Third International Conference, FGIT 2011 in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Lecture Notes in Computer Science 7105, Springer 2011, ISBN 978-3-642-27141-0 [contents] - [e28]Tai-Hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel O. Balitanas:
Information Security and Assurance - International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings. Communications in Computer and Information Science 200, Springer 2011, ISBN 978-3-642-23140-7 [contents] - [e27]Ruay-Shiung Chang, Tai-Hoon Kim, Sheng-Lung Peng:
Security-Enriched Urban Computing and Smart Grid - Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings. Communications in Computer and Information Science 223, Springer 2011, ISBN 978-3-642-23947-2 [contents] - [e26]Tai-Hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel O. Balitanas:
Ubiquitous Computing and Multimedia Applications - Second International Conference, UCMA 2011, Daejeon, Korea, April 13-15, 2011. Proceedings, Part I. Communications in Computer and Information Science 150, 2011, ISBN 978-3-642-20974-1 [contents] - [e25]Tai-Hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel O. Balitanas:
Ubiquitous Computing and Multimedia Applications - Second International Conference, UCMA 2011, Daejeon, Korea, April 13-15, 2011. Proceedings, Part II. Communications in Computer and Information Science 151, 2011, ISBN 978-3-642-20997-0 [contents] - 2010
- [j20]Zhao Wu, Naixue Xiong, Jong Hyuk Park, Tai-Hoon Kim, Lei Yuan:
A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition. Comput. J. 53(2): 219-233 (2010) - [j19]Naixue Xiong, Jing He, Yan Yang, Yanxiang He, Tai-Hoon Kim, Chuan Lin:
A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper). J. Commun. 5(1): 31-38 (2010) - [j18]Jong Hyuk Park, Deqing Zou, Tai-Hoon Kim, Javier López, Hangbae Chang:
Editorial. J. Intell. Manuf. 21(5): 593-594 (2010) - [j17]Anjali Sardana, Ramesh C. Joshi, Tai-Hoon Kim, Sung Jang:
Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach. J. Intell. Manuf. 21(5): 623-634 (2010) - [j16]Hak-Man Kim, Tetsuo Kinoshita
, Yujin Lim, Tai-Hoon Kim:
A Bankruptcy Problem Approach to Load-shedding in Multiagent-based Microgrid Operation. Sensors 10(10): 8888-8898 (2010) - [j15]Aneel Rahim, Zeeshan Shafi Khan
, Fahad T. Bin Muhaya, Muhammad Sher, Tai-Hoon Kim:
Sensor Based Framework for Secure Multimedia Communication in VANET. Sensors 10(11): 10146-10154 (2010) - [j14]Debnath Bhattacharyya
, Tai-Hoon Kim
, Subhajit Pal:
A Comparative Study of Wireless Sensor Networks and Their Routing Protocols. Sensors 10(12): 10506-10523 (2010) - [j13]Shivali Goel, Jemal H. Abawajy, Tai-Hoon Kim:
Performance Analysis of Receive Diversity in Wireless Sensor Networks over GBSBE Models. Sensors 10(12): 11021-11037 (2010) - [c94]Debnath Bhattacharyya
, Poulami Dutta, Maricel O. Balitanas, Tai-Hoon Kim, Purnendu Das:
Hiding Data in Audio Signal. ACN 2010: 23-29 - [c93]Debnath Bhattacharyya
, Rosslin John Robles
, Tai-Hoon Kim, Samir Kumar Bandyopadhyay
:
Feature Extraction and Analysis of Breast Cancer Specimen. ACN 2010: 30-41 - [c92]Farkhod A. Alisherov, Tai-Hoon Kim:
Duplicate Address Detection Table in IPv6 Mobile Networks. ACN 2010: 109-115 - [c91]J. Isac Gnanaraj, Pitchai Calduwel Newton, L. Arockiam
, Tai-Hoon Kim:
A Hop-Sensitive Mechanism to Establish Route Optimization in Mobile Networks. ACN 2010: 116-123 - [c90]Jemal H. Abawajy, Tai-Hoon Kim:
Performance Analysis of Cyber Security Awareness Delivery Methods. FGIT-SecTech/DRBC 2010: 142-148 - [c89]Rizwan Ahmad
, Saif Ur Rehman Khan
, Aamer Nadeem
, Tai-Hoon Kim:
ISARE: An Integrated Software Architecture Reuse and Evaluation Framework. FGIT-ASEA 2010: 174-187 - [c88]Mahreen Ahmad, Aamer Nadeem
, Tai-Hoon Kim:
An Automated Approach to Testing Polymorphic Features Using Object-Z. FGIT-ASEA 2010: 195-207 - [c87]Rituparna Samaddar, Sandip Samaddar, Tai-Hoon Kim, Debnath Bhattacharyya
:
Hierarchical Data Structures for Accessing Spatial Data. FGIT-SIP/MulGraB 2010: 267-274 - [c86]Rosslin John Robles
, Haeng-Kon Kim, Tai-Hoon Kim:
Internet SCADA Utilizing API's as Data Source. FGIT-SecTech/DRBC 2010: 269-275 - [c85]Shilpi Saha, Debnath Bhattacharyya
, Tai-Hoon Kim:
OSI Layer Wise Security Analysis of Wireless Sensor Network. FGIT-SIP/MulGraB 2010: 275-282 - [c84]Maricel O. Balitanas, Tai-Hoon Kim:
Insecure Information System's Solution Using Isolation Method. FGIT-SecTech/DRBC 2010: 276-281 - [c83]Rosslin John Robles
, Tai-Hoon Kim:
Communication Security for Control Systems in Smart Grid. FGIT-SecTech/DRBC 2010: 282-289 - [c82]Prasun Chakrabarti, Jayanta Kumar Basu, Tai-Hoon Kim:
Business Planning in the Light of Neuro-fuzzy and Predictive Forecasting. FGIT-SIP/MulGraB 2010: 283-290 - [c81]Subhra Pramanik, Samir Kumar Bandyopadhyay
, Debnath Bhattacharyya
, Tai-Hoon Kim:
Identification of Plant Using Leaf Image Analysis. FGIT-SIP/MulGraB 2010: 291-303 - [c80]Maricel O. Balitanas, Tai-Hoon Kim:
Using Incentives to Reduce Active Network Privacy Threats and Vulnerabilities. FGIT-SIP/MulGraB 2010: 304-316 - [c79]Rosslin John Robles
, Tai-Hoon Kim:
Security Encryption Scheme for Communication of Web Based Control Systems. FGIT-SIP/MulGraB 2010: 317-325 - [c78]Gladys Benigni, Osvaldo Gervasi
, Francesco Luca Passeri, Tai-Hoon Kim:
USABAGILE_Web: A Web Agile Usability Approach for Web Site Design. ICCSA (2) 2010: 422-431 - [c77]Debnath Bhattacharyya
, Arup Kumar Bhaumik, Minkyu Choi, Tai-Hoon Kim:
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. AST/UCMA/ISA/ACN 2010: 61-69 - [c76]Debnath Bhattacharyya
, Arijit Chakraborty, Feruza Sattarova Yusufovna, Young-Hun Lee, Tai-Hoon Kim:
Lane Design for Speed Optimization. ISA 2010: 97-107 - [c75]Debnath Bhattacharyya
, A. Shrotri, S. C. Rethrekar, M. H. Patil, Farkhod A. Alisherov, Tai-Hoon Kim:
Biometric Authentication Using Infrared Imaging of Hand Vein Patterns. ISA 2010: 108-115 - [c74]Maricel O. Balitanas, Tai-Hoon Kim:
IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach. ISA 2010: 116-127 - [c73]Tai-Hoon Kim:
Pattern Recognition Using Artificial Neural Network: A Review. ISA 2010: 138-148 - [c72]Praveen Ranjan Srivastava, Tai-Hoon Kim:
Agent Based Approach to Regression Testing. AST/UCMA/ISA/ACN 2010: 345-355 - [c71]Tai-Hoon Kim:
Procedure of Partitioning Data Into Number of Data Sets or Data Group - A Review. SUComS 2010: 104-115 - [c70]Tai-Hoon Kim:
Processing of Handwritten Signature Image for Authentication. SUComS 2010: 116-123 - [c69]Rosslin John Robles
, Tai-Hoon Kim:
Context Aware Systems, Methods and Trends in Smart Home Technology. SUComS 2010: 149-158 - [c68]Maricel O. Balitanas, Tai-Hoon Kim:
Data Hiding a Key Management for Interoperable Urban Services. SUComS 2010: 159-166 - [c67]Shilpi Saha, Seung-Hwan Jeon, Rosslin John Robles
, Tai-Hoon Kim, Samir Kumar Bandyopadhyay
:
Model Based User's Access Requirement Analysis of E-Governance Systems. SUComS 2010: 466-471 - [c66]Subhajit Pal, Debnath Bhattacharyya
, Tai-Hoon Kim:
Chain Based Hierarchical Routing Protocol for Wireless Sensor Networks. SUComS 2010: 482-492 - [c65]Samit Biswas, Debnath Bhattacharyya
, Tai-Hoon Kim, Samir Kumar Bandyopadhyay
:
Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques. SUComS 2010: 493-503 - [c64]Debashis Ganguly, Srabonti Chakraborty, Maricel O. Balitanas, Tai-Hoon Kim:
Medical Imaging: A Review. SUComS 2010: 504-516 - [c63]Timir Maitra, Anindya Jyoti Pal, Minkyu Choi, Tai-Hoon Kim:
Hybridization of GA and ANN to Solve Graph Coloring. SUComS 2010: 517-523 - [c62]Hak-Man Kim, Tetsuo Kinoshita
, Yujin Lim, Tai-Hoon Kim:
Bankruptcy Problem Approach to Load-Shedding in Agent-Based Microgrid Operation. SUComS 2010: 621-628 - [c61]Sumana Barman, Debnath Bhattacharyya
, Seung-Whan Jeon, Tai-Hoon Kim, Haeng-Kon Kim:
A New Experiment on Bengali Character Recognition. UCMA 2010: 20-28 - [c60]F. Y. Sattarova, Tai-Hoon Kim:
Review: Security in Wireless Technologies in Business. UCMA 2010: 112-120 - [c59]Tai-Hoon Kim:
Emerging Approach of Natural Language Processing in Opinion Mining: A Review. UCMA 2010: 121-128 - [e24]Chin-Chen Chang, Thanos Vasilakos, Purnendu Das, Tai-Hoon Kim, Byeong-Ho Kang, Muhammad Khurram Khan:
Advanced Communication and Networking - Second International Conference, ACN 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 77, 2010, ISBN 978-3-642-13404-3 [contents] - [e23]Tai-Hoon Kim, Haeng-Kon Kim, Muhammad Khurram Khan, Kiumi Akingbehin, Wai-Chi Fang, Dominik Slezak:
Advances in Software Engineering - International Conference, ASEA 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 117, Springer 2010, ISBN 978-3-642-17577-0 [contents] - [e22]Tai-Hoon Kim, Alan Chin-Chen Chang, Mingchu Li, Chunming Rong, Charalampos Z. Patrikakis, Dominik Slezak:
Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I. Communications in Computer and Information Science 119, Springer 2010, ISBN 978-3-642-17586-2 [contents] - [e21]Tai-Hoon Kim, Thanos Vasilakos, Kouichi Sakurai, Yang Xiao, Gansen Zhao, Dominik Slezak:
Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II. Communications in Computer and Information Science 120, Springer 2010, ISBN 978-3-642-17603-6 [contents] - [e20]Tai-Hoon Kim, Stephen S. Yau, Osvaldo Gervasi, Byeong Ho Kang, Adrian Stoica, Dominik Slezak:
Grid and Distributed Computing, Control and Automation - International Conferences, GDC and CA 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 121, Springer 2010, ISBN 978-3-642-17624-1 [contents] - [e19]Tai-Hoon Kim, Wai-Chi Fang, Muhammad Khurram Khan
, Kirk P. Arnett, Heau-Jo Kang, Dominik Slezak:
Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 122, Springer 2010, ISBN 978-3-642-17609-8 [contents] - [e18]Tai-Hoon Kim, Sankar K. Pal, William I. Grosky, Niki Pissinou, Timothy K. Shih, Dominik Slezak:
Signal Processing and Multimedia - International Conferences, SIP and MulGraB 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 123, Springer 2010, ISBN 978-3-642-17640-1 [contents] - [e17]Tai-Hoon Kim, Jianhua Ma, Wai-Chi Fang, Byungjoo Park, Byeong Ho Kang, Dominik Slezak:
U- and E-Service, Science and Technology - International Conference UNESST 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 124, Springer 2010, ISBN 978-3-642-17643-2 [contents] - [e16]Tai-Hoon Kim, Young-Hoon Lee, Byeong Ho Kang, Dominik Slezak:
Future Generation Information Technology - Second International Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Lecture Notes in Computer Science 6485, Springer 2010, ISBN 978-3-642-17568-8 [contents] - [e15]Samir Kumar Bandyopadhyay, Wael Adi, Tai-Hoon Kim, Yang Xiao:
Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 76, Springer 2010, ISBN 978-3-642-13364-0 [contents] - [e14]Tai-Hoon Kim, Hojjat Adeli:
Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings. Lecture Notes in Computer Science 6059, Springer 2010, ISBN 978-3-642-13576-7 [contents] - [e13]Tai-Hoon Kim, Adrian Stoica, Ruay-Shiung Chang:
Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010. Proceedings. Communications in Computer and Information Science 78, Springer 2010, ISBN 978-3-642-16443-9 [contents] - [e12]G. S. Tomar, William I. Grosky, Tai-Hoon Kim, Sabah Mohammed, Sanjoy Kumar Saha:
Ubiquitous Computing and Multimedia Applications - International Conference, UCMA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 75, 2010, ISBN 978-3-642-13466-1 [contents]
2000 – 2009
- 2009
- [j12]Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen:
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems. Comput. J. 52(8): 861-870 (2009) - [j11]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Tai-Hoon Kim:
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. Comput. J. 52(8): 871-877 (2009) - [j10]Tai-Hoon Kim, Wai-Chi Fang:
Special section: Grid/distributed computing systems security. Future Gener. Comput. Syst. 25(3): 351 (2009) - [j9]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation. Int. J. Commun. Netw. Syst. Sci. 2(5): 363-370 (2009) - [j8]Chuan Lin, Naixue Xiong, Jong Hyuk Park, Tai-Hoon Kim:
Dynamic power management in new architecture of wireless sensor networks. Int. J. Commun. Syst. 22(6): 671-693 (2009) - [j7]Binod Vaidya, Tai-Hoon Kim, Jong Hyuk Park, Young Jae Lee:
Secure ubiquitous connectivity in hybrid multipath wireless ad hoc network. Int. J. Commun. Syst. 22(9): 1153-1176 (2009) - [j6]Debnath Bhattacharyya, Poulami Das, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication. J. Univers. Comput. Sci. 15(5): 1081-1089 (2009) - [j5]Tai-Hoon Kim, Andrew Kusiak, David Taniar, Daqing Zhang:
Intelligent Environments and Services. J. Univers. Comput. Sci. 15(12): 2284-2286 (2009) - [j4]Rodrigo Fernandes de Mello
, Rudinei Goularte
, Evgueni Dodonov, Laurence Tianruo Yang, Jong Hyuk Park, Tai-Hoon Kim:
On modeling and evaluating multicomputer transcoding architectures for live-video streams. Multim. Tools Appl. 43(2): 109-129 (2009) - [j3]Naixue Xiong, Laurence T. Yang, Jong Hyuk Park, Xuefeng Liang, Tai-Hoon Kim:
Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments. Wirel. Pers. Commun. 51(1): 209-220 (2009) - [c58]Debnath Bhattacharyya
, Jhuma Dutta, Poulami Das, Rathit Bandyopadhyay, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Discrete Fourier Transformation based Image Authentication technique. IEEE ICCI 2009: 196-200 - [c57]Feruza Sattarova Yusufovna, Farkhod Alisherov Alisherovich, Minkyu Choi, Eun-suk Cho, Furkhat Tadjibayev Abdurashidovich, Tai-Hoon Kim:
Research on Critical Infrastructures and Critical Information Infrastructures. BLISS 2009: 97-101 - [c56]Maricel O. Balitanas, Rosslin John Robles
, Nayoun Kim, Tai-Hoon Kim:
Crossed Crypto-Scheme in WPA PSK Mode. BLISS 2009: 102-106 - [c55]Tai-Hoon Kim, Sang-Soo Yeo
, Jong Hyuk Park, Binod Vaidya:
Performance Evaluation of Hybrid Multipath Mobile Ad Hoc Network. CCNC 2009: 1-5 - [c54]Naixue Xiong, Jing He, Jong Hyuk Park, Tai-Hoon Kim, Yanxiang He:
Decentralized Flocking Algorithms for a Swarm of Mobile Robots: Problem, Current Research and Future Directions. CCNC 2009: 1-6 - [c53]Debnath Bhattacharyya
, Poulami Das, Kheyali Mitra, Swarnendu Mukherjee, Debashis Ganguly, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Refine Crude Corpus for Opinion Mining. CICSyN 2009: 17-22 - [c52]Debnath Bhattacharyya
, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme. CICSyN 2009: 374-379 - [c51]Praveen Ranjan Srivastava
, Mahesh Prasad Ray, Julian R. Dermoudy, Byeong-Ho Kang, Tai-Hoon Kim:
Test Case Minimization and Prioritization Using CMIMX Technique. FGIT-ASEA 2009: 25-33 - [c50]Debnath Bhattacharyya
, Poulami Das, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Analysis of Handwritten Signature Image. FGIT-SecTech 2009: 43-50 - [c49]Debnath Bhattacharyya
, Poulami Das, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Grayscale Image Classification Using Supervised Chromosome Clustering. FGIT-SecTech 2009: 64-71 - [c48]Debnath Bhattacharyya
, Debasri Chakraborty, Tai-Hoon Kim:
Effective GIS Mobile Query System. FGIT 2009: 129-137 - [c47]Tae (Tom) Oh, Young B. Choi, Michael Guthrie, Kristi Harold, Daniel Copeland, Tai-Hoon Kim:
Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management. FGIT-FGCN 2009: 360-369 - [e11]Dominik Slezak, Tai-Hoon Kim, Alan Chin-Chen Chang, Thanos Vasilakos, Mingchu Li, Kouichi Sakurai:
Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 56, Springer 2009, ISBN 978-3-642-10843-3 [contents] - [e10]Dominik Slezak, Tughrul Arslan, Wai-Chi Fang, Xiaofeng Song, Tai-Hoon Kim:
Bio-Science and Bio-Technology - International Conference, BSBT 2009 Held as Part of the Future Generation Information Technology Conference, FGIT 2009 Jeju Island, Korea, December 10-12, 2009 Proceedings. Communications in Computer and Information Science 57, Springer 2009, ISBN 978-3-642-10615-6 [contents] - [e9]Dominik Slezak, Tai-Hoon Kim, Wai-Chi Fang, Kirk P. Arnett:
Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 58, Springer 2009, ISBN 978-3-642-10846-4 [contents] - [e8]Dominik Slezak, Tai-Hoon Kim, Kiumi Akingbehin, Tao Jiang, June M. Verner, Silvia Abrahão:
Advances in Software Engineering - International Conference on Advanced Software Engineering and Its Applications, ASEA 2009 Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 59, Springer 2009, ISBN 978-3-642-10618-7 [contents] - [e7]Dominik Slezak, Sankar K. Pal, Byeong Ho Kang, Junzhong Gu, Hideo Kuroda, Tai-Hoon Kim:
Signal Processing, Image Processing and Pattern Recognition - International Conference, SIP 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 61, Springer 2009, ISBN 978-3-642-10545-6 [contents] - [e6]Dominik Slezak, Tai-Hoon Kim, Stephen S. Yau, Osvaldo Gervasi, Byeong-Ho Kang:
Grid and Distributed Computing - International Conference, GDC 2009, Held as Part of the Future Generation Information Technology Conferences, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 63, Springer 2009, ISBN 978-3-642-10548-7 [contents] - [e5]Dominik Slezak, Tai-Hoon Kim, Yanchun Zhang, Jianhua Ma, Kyo-Il Chung:
Database Theory and Application - International Conference, DTA 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 64, Springer 2009, ISBN 978-3-642-10582-1 [contents] - [e4]Young-Hoon Lee, Tai-Hoon Kim, Wai-Chi Fang, Dominik Slezak:
Future Generation Information Technology, First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Lecture Notes in Computer Science 5899, Springer 2009, ISBN 978-3-642-10508-1 [contents] - [e3]Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-Hoon Kim, Sang-Soo Yeo:
Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings. Lecture Notes in Computer Science 5576, Springer 2009, ISBN 978-3-642-02616-4 [contents] - 2008
- [j2]Govardhanan Kousalya, P. Narayanasamy, Jong Hyuk Park, Tai-Hoon Kim:
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS. Comput. Commun. 31(12): 2781-2789 (2008) - [j1]Deok-Gyu Lee, Jong Hyuk Park, Tai-Hoon Kim, Laurence Tianruo Yang:
U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home. J. Supercomput. 45(1): 88-104 (2008) - [c46]Naixue Xiong, Hongyan Li, Tai-Hoon Kim, Laurence Tianruo Yang:
An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control Systems. FGCN (1) 2008: 116-121 - [c45]Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-Hoon Kim:
A Novel Approach for Infrastructure Deployment for VANET. FGCN (1) 2008: 234-238 - [c44]Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-Hoon Kim:
A Prioritized Service Protocol for Vehicular Communication. FGCN (1) 2008: 337-342 - [c43]Chowdhury Sayeed Hyder, Anindya Iqbal, Une Thoing Rosi, Tai-Hoon Kim:
Towards Automated Traffic System Using Vehicular Network with Directional Antenna. FGCN (1) 2008: 454-458 - [c42]Yuanyuan Zeng, Naixue Xiong, Tai-Hoon Kim:
Channel assignment and scheduling in multichannel wireless sensor networks. LCN 2008: 512-513 - [c41]Deqing Zou, Jong Hyuk Park, Laurence Tianruo Yang, Zhensong Liao, Tai-Hoon Kim:
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. UIC 2008: 35-45 - 2007
- [c40]Tai-Hoon Kim, Seoksoo Kim, Gilcheol Park:
Block Model Application for Decision Support Systems. BLISS 2007: 25-28 - [c39]Hak-Man Kim, Dong-Joo Kang, Tai-Hoon Kim:
Flexible Key Distribution for SCADA Network using Multi-Agent System. BLISS 2007: 29-34 - [c38]Firdous Kausar
, Sajid Hussain, Tai-Hoon Kim, Ashraf Masood:
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks. EUC Workshops 2007: 1-11 - [c37]Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen:
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. FGCN (2) 2007: 71-75 - [c36]Majid Alkaee Taleghan, Amirhosein Taherkordi, Mohsen Sharifi, Tai-Hoon Kim:
A Survey of System Software for Wireless Sensor Networks. FGCN (2) 2007: 402-407 - [c35]Chang Sun, Hongjun Wang, Hua Li, Tai-Hoon Kim:
Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264. FGCN (1) 2007: 459-463 - [c34]Jae-Dong Shin, Sang-Soo Yeo, Tai-Hoon Kim, Sung Kwon Kim:
Hybrid Tag Anti-collision Algorithms in RFID Systems. International Conference on Computational Science (4) 2007: 693-700 - [c33]Yong-Tae Kim, Gilcheol Park, Tai-Hoon Kim, Sang-Ho Lee:
Security Evaluation for Information Assurance. ICCSA Workshops 2007: 227-230 - [c32]Minseong Ju, Seoksoo Kim, Tai-Hoon Kim:
A Study on Digital Media Security by Hopfield Neural Network. ISNN (3) 2007: 140-146 - [c31]Tai-Hoon Kim, Kouichi Sakurai, Sun-Myung Hwang:
Induction and Implementation of Security Requirements in Each System Block. MMM (2) 2007: 694-701 - [e2]Adrian Stoica, Tughrul Arslan, Daniel Howard, Tai-Hoon Kim, Ahmed O. El-Rayis:
2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2007, Edinburgh, United Kingdom, 9-10 August 2007. IEEE Computer Society 2007, ISBN 0-7695-2919-4 [contents] - [e1]Marcin S. Szczuka, Daniel Howard, Dominik Slezak, Haeng-Kon Kim, Tai-Hoon Kim, Il Seok Ko, Geuk Lee, Peter M. A. Sloot:
Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4413, Springer 2007, ISBN 978-3-540-77367-2 [contents] - 2006
- [c30]Tai-Hoon Kim, Seoksoo Kim, Hee-Un Park, Myoung-sub Kim:
Analysis of Security Session Reusing in Distribution Server System. ICCSA (5) 2006: 700-707 - [c29]In-hye Seo, Heau-Jo Kang, Tai-Hoon Kim:
Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment. ICIC (1) 2006: 1062-1071 - [c28]Mingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung:
A Study on the Improvement of Military Logistics System Using RFID. ICIC (1) 2006: 1098-1102 - [c27]Geuk Lee, Il Seok Ko, Tai-Hoon Kim:
A Vulnerability Assessment Tool Based on OVAL in System Block Model. ICIC (1) 2006: 1115-1120 - [c26]Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil:
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. KES (2) 2006: 701-708 - [c25]Tai-Hoon Kim, Sun-myoung Hwang:
Intelligent Method for Building Security Countermeasures. KES (2) 2006: 745-750 - [c24]Tai-Hoon Kim:
Security Requirements for Ubiquitous Software Development Site. KES (2) 2006: 836-843 - 2005
- [c23]Sang-Yule Choi, Myong-Chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha:
Distribution Data Security System Based on Web Based Active Database. ICCSA (2) 2005: 341-352 - [c22]Jae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee
:
Interference-Free ZCD-UWB for Wireless Home Network Applications. ICCSA (2) 2005: 429-441 - [c21]Tai-Hoon Kim, Seung-youn Lee:
Design Procedure of IT Systems Security Countermeasures. ICCSA (2) 2005: 468-473 - [c20]Tai-Hoon Kim, Seung-youn Lee:
Security Evaluation Targets for Enhancement of IT Systems Assurance. ICCSA (2) 2005: 491-498 - [c19]Sang-Yule Choi, Myong-Chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha:
Distribution Data Security System Based on Web Based Active Database. ICCSA (4) 2005: 1319-1330 - [c18]Yangsun Lee, Heau-Jo Kang, Malrey Lee, Tai-Hoon Kim:
A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System. ICIC (2) 2005: 665-674 - [c17]Tai-Hoon Kim, Seung-youn Lee:
Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. KES (2) 2005: 1069-1075 - [c16]Tai-Hoon Kim, Seung-youn Lee:
A Relationship Between Products Evaluation and IT Systems Assurance. KES (1) 2005: 1125-1130 - [c15]Tai-Hoon Kim, Chang-hwa Hong, Myoung-sub Kim:
Towards New Areas of Security Engineering. RSFDGrC (2) 2005: 568-574 - 2004
- [c14]Eun-Ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung:
Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. ICCSA (1) 2004: 451-460 - [c13]Haeng-Kon Kim, Tai-Hoon Kim:
Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. ICCSA (1) 2004: 461-470 - [c12]Tai-Hoon Kim, Haeng-Kon Kim:
A Relationship between Security Engineering and Security Evaluation. ICCSA (4) 2004: 717-724 - [c11]Tai-Hoon Kim, Dong Chun Lee:
Reduction Method of Threat Phrases by Classifying Assets. ICCSA (1) 2004: 1052-1059 - [c10]Eun-Ser Lee, Tai-Hoon Kim:
Development Site Security Process of ISO/IEC TR 15504. KES 2004: 60-66 - [c9]Tai-Hoon Kim, Myong-Chul Shin, Sang-ho Kim, Jae Sang Cha:
Security Requirements for Software Development. KES 2004: 116-122 - [c8]Tai-Hoon Kim, Ho-yeol Kwon:
Applying Security Engineering to Build Security Countermeasures: An Introduction. PARA 2004: 957-963 - [c7]Seung-youn Lee, Myong-Chul Shin, Jae Sang Cha, Tai-Hoon Kim:
Threat Description for Developing Security Countermeasure. PCM (1) 2004: 548-555 - 2003
- [c6]Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee:
Threat Description for the PP by Using the Concept of the Assets Protected by TOE. International Conference on Computational Science 2003: 605-614 - [c5]Sang-ho Kim, Eun-ser Kim, Choon Seong Leem, Ho-jun Shin, Tai-Hoon Kim:
SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC. ISCIS 2003: 1069-1075 - [c4]Sang-ho Kim, Choon Seong Leem, Tai-Hoon Kim, Jae-Sung Kim:
Supplement of Security-Related Parts of ISO/IEC TR 15504. ISCIS 2003: 1084-1089 - [c3]Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim:
Reliability Assurance in Development Process for TOE on the Common Criteria. SERA 2003: 364-375 - [c2]Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim:
ECSSL Protocol Based on 3B Algorithm. SNPD 2003: 166-169 - [c1]Tai-Hoon Kim, Jae-Sung Kim, Eun-Kyoung Yi, Haeng-Kon Kim:
A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC. SNPD 2003: 170-176
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-21 01:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint