Hoon Ko

According to our database1, Hoon Ko authored at least 46 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


A Study on User Recognition Using 2D ECG Image Based on Ensemble Networks for Intelligent Vehicles.
Wireless Communications and Mobile Computing, 2019

Human-machine interaction: A case study on fake news detection using a backtracking based on a cognitive system.
Cognitive Systems Research, 2019

ECG-Based Advanced Personal Identification Study With Adjusted (Qi * Si).
IEEE Access, 2019

A Study on Context-Relationship with Context-Attributes for a Smart Service Generation in Smart City.
J. UCS, 2018

A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing.
IJCAC, 2018

A smart service model in greenhouse environment using event-based security based on wireless sensor network.
Concurrency and Computation: Practice and Experience, 2018

Generalized distributed compressive sensing with security challenges for linearly correlated information sources.
Concurrency and Computation: Practice and Experience, 2018

Bio-inspired and cognitive approaches in cryptography and security applications.
Concurrency and Computation: Practice and Experience, 2018

Cognitive systems and operations research in big data and cloud computing.
Annals OR, 2018

Experimental comparisons with respect to the usage of the promising relations in EDA-based causal discovery.
Annals OR, 2018

Analysis an identification with ECG base in augmented-reality.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

EKRUCAmI Architecture - Applications in Healthcare Domain.
Proceedings of the State of the Art in AI Applied to Ambient Intelligence, 2017

TARD: Temporary Access Rights Delegation for guest network devices.
J. Comput. Syst. Sci., 2017

A Pilot Study on Hip Bone Mineral Densities Estimation from Forearm CBCT images.
TIIS, 2017

Security challenges with network functions virtualization.
Future Generation Comp. Syst., 2017

A flexible architecture for orchestrating network security functions to support high-level security policies.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Similarity recognition using context-based pattern for cyber-society.
Soft Comput., 2016

A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.
J. Medical Systems, 2016

Intelligent Healthcare Service Using Health Lifelog Analysis.
J. Medical Systems, 2016

Multiple switching light sources based motion artifacts reduction in reflectance photoplethysmography.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

Design on the BPEL Engine Generator for Adding New Functions.
Proceedings of the HCI in Business - Second International Conference, 2015

A Study on the Security Algorithm for Contexts in Smart Cities.
IJDSN, 2014

Advance in Safe and Useful Social Network Services with Context-Sensitive Data in Cyber-Physical System.
IJDSN, 2014

A Smart Service Robot Middleware on Ubiquitous Network Environments.
Intelligent Automation & Soft Computing, 2014

Analysis on Smart Warning System for Home Network in Smart Grid.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Context-Enriched and Location-Aware Services.
Journal Comp. Netw. and Communic., 2012

Intelligent supervisory control system for home devices using a cyber physical approach.
Integrated Computer-Aided Engineering, 2012

Towards context, cognitive, and secure computing.
Computers & Mathematics with Applications, 2012

A study on dynamic state information (DSI) around users for safe urban life.
Computers & Mathematics with Applications, 2012

Horizontal Search Method for Wikipedia Category Grouping.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Secure Contents Design and Implement of Smart Home Management System in OISCS.
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012

Environmental Impact Assessment (EIA) and Photo-Manipulation Techniques.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

A Privacy Technique for Providing Anonymity to Sensor Nodes in a Sensor Network.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Study on Context Services Model with Location Privacy.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

A Survey of Context Classfication for Intelligent Systems Research for Ambient Intelligence.
Proceedings of the CISIS 2010, 2010

A Study on Users Authentication Method for Safety Group Decision System in Dynamic Small Group.
JCIT, 2009

Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate.
Proceedings of the Advances in Information Security and Assurance, 2009

A study on Security Status Matrix (SSM) in Urban Computing.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Issues for Applying Instant Messaging to Smart Home Systems.
Proceedings of the Computational Science and Its Applications, 2009

A Study on Secure Contents Using in Urban Computing.
Proceedings of the Security Technology, 2009

A Design of Authentication Protocol for Multi-key RFID Tag.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Safe Authentication Method for Security Communication in Ubiquitous.
Proceedings of the Computational Science and Its Applications, 2005

A Study on Secure Group Transmission in Group Environment.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005