Hangbae Chang

According to our database1, Hangbae Chang authored at least 63 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Performance evaluation framework design for smart sensor business.
The Journal of Supercomputing, 2018

Video Retrieval System for Meniscal Surgery to Improve Health Care Services.
J. Sensors, 2018

An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea.
Future Generation Comp. Syst., 2018

Improving collaboration between large and small-medium enterprises in automobile production.
Enterprise IS, 2018

Mathematical model-based security management framework for future ICT outsourcing project.
Discrete Applied Mathematics, 2018

2017
A Study on Designing Public Safety Service for Internet of Things Environment.
Wireless Personal Communications, 2017

Accurate and efficient shape matching approach using vocabularies of multi-feature space representations.
J. Real-Time Image Processing, 2017

2016
Intelligent secure patching service for enhancing infrastructure control system performance.
The Journal of Supercomputing, 2016

Security experts' capability design for future internet of things platform.
The Journal of Supercomputing, 2016

Trust model at service layer of cloud computing for educational institutes.
The Journal of Supercomputing, 2016

An Efficient Multidimensional Big Data Fusion Approach in Machine-to-Machine Communication.
ACM Trans. Embedded Comput. Syst., 2016

Concept indexing and expansion for social multimedia websites based on semantic processing and graph analysis.
The New Review of Hypermedia and Multimedia, 2016

An exploratory research on advanced smart media security design for sustainable intelligence information system.
Multimedia Tools Appl., 2016

A gap analysis study between multimedia security research and education by meta data analysis.
Multimedia Tools Appl., 2016

Information security research classification for future multimedia environment.
Multimedia Tools Appl., 2016

Smart cyber society: Integration of capillary devices with high usability based on Cyber-Physical System.
Future Generation Comp. Syst., 2016

An empirical study on security expert ecosystem in the future IoT service environment.
Computers & Electrical Engineering, 2016

Securing Target Consumers and Markets through Developing Mission Statements: An Analysis of Company Mission Statements.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
ICT use level and performance evaluation on the social network environment: Korea case study.
The Journal of Supercomputing, 2015

On the security of a certificateless online/offline signcryption for Internet of Things.
Peer-to-Peer Networking and Applications, 2015

An efficient peer-to-peer and distributed scheduling for cloud and grid computing.
Peer-to-Peer Networking and Applications, 2015

A study on performance evaluation of intelligent collaboration system.
Multimedia Tools Appl., 2015

A Study on Industrial Security Experts Demanding Forecasting in Intelligent Sensor Network.
IJDSN, 2015

An Exploratory Research on Future ICT Convergence Research Design in Smart Sensor Environment.
IJDSN, 2015

Smart IT Management Evaluation in Intelligent Environment Computing.
IJDSN, 2015

Advanced Service Technology and Application in Smart Sensor Networks.
IJDSN, 2015

A Case Study on ICT Collaboration Performance in Automobile Business.
Proceedings of the 17th International Conference on Electronic Commerce 2015, 2015

An Analysis Study on Security Activity Changes by Security Accident.
Proceedings of the 17th International Conference on Electronic Commerce 2015, 2015

2014
A study on security strategy in ICT convergence environment.
The Journal of Supercomputing, 2014

Human centric security policy and management design for small and medium business.
Security and Communication Networks, 2014

Human-centric security service and its application in smart space.
Security and Communication Networks, 2014

The industrial security management model for SMBs in smart work.
J. Intelligent Manufacturing, 2014

IT convergence security.
J. Intelligent Manufacturing, 2014

Introduction to the thematic issue on Ambient and Smart Component Technologies for Human Centric Computing.
JAISE, 2014

Public IT service strategy for social information security in the intelligence all-things environment.
Electronic Commerce Research, 2014

2013
A Study on Project Selection Framework for Future ICT Technologies.
Wireless Personal Communications, 2013

The study on a convergence security service for manufacturing industries.
Telecommunication Systems, 2013

Social relation-based dynamic team organization by context-aware matchmaking.
Personal and Ubiquitous Computing, 2013

A u-IT collaboration evaluation model for value networks.
Personal and Ubiquitous Computing, 2013

Financial IT and Security.
Mathematical and Computer Modelling, 2013

Is ISMS for financial organizations effective on their business?
Mathematical and Computer Modelling, 2013

The IT convergence framework design in the internet of things environment.
EURASIP J. Wireless Comm. and Networking, 2013

The security service rating design for IT convergence services.
Electronic Commerce Research, 2013

The design of leakage prevention service for industry databases.
Computers & Mathematics with Applications, 2013

2012
The study on content based multimedia data retrieval system.
Multimedia Tools Appl., 2012

The Study for the User Oriented Service Design for Inter-organizational Collaboration.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
The study on end-to-end security for ubiquitous commerce.
The Journal of Supercomputing, 2011

A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets.
EURASIP J. Wireless Comm. and Networking, 2011

A Case Study on Intelligent Service Design in Ubiquitous Computing.
Computing and Informatics, 2011

A Study on Design of FMT Framework for Flex Quality Assurance.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2010
Editorial.
J. Intelligent Manufacturing, 2010

Novel Approaches to Enhance Mobile WiMAX Security.
EURASIP J. Wireless Comm. and Networking, 2010

2009
Intra domain route optimization for ubiquitous network.
Personal and Ubiquitous Computing, 2009

A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services.
Proceedings of the Advances in Information Security and Assurance, 2009

The Study on Software Tamper Resistance for Securing a Game Service.
Proceedings of the 2009 International Conference on Complex, 2009

2008
A robust and secure time-domain ICI canceller for OFDM based ubiquitous systems in time-varying multipath channels.
The Journal of Supercomputing, 2008

The Security System Design in Online Game for u Entertainment.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
The Research of Keyboard Security for u Trading.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

The Research of Security System for Sharing Engineering Drawings.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

The Case Study of Information Security System for International Airports.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
The Design and Development of a Secure Keystroke System for u Business.
Proceedings of the Computational Science and Its Applications, 2006

Information Security Management System for SMB in Ubiquitous Computing.
Proceedings of the Computational Science and Its Applications, 2006

2005
Design of Inside Information Leakage Prevention System in Ubiquitous Computing Environment.
Proceedings of the Computational Science and Its Applications, 2005


  Loading...