Ilsun You

According to our database1, Ilsun You authored at least 293 papers between 2004 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019).
Sensors, 2021

2020
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems.
IEEE Trans. Netw. Serv. Manag., 2020

Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks.
IEEE Trans. Ind. Informatics, 2020

Efficient Resource Allocation for Backhaul-Aware Unmanned Air Vehicles-to-Everything (U2X).
Sensors, 2020

Toward Efficient Image Recognition in Sensor-Based IoT: A Weight Initialization Optimizing Method for CNN Based on RGB Influence Proportion.
Sensors, 2020

Security of 5G-V2X: Technologies, Standardization, and Research Directions.
IEEE Netw., 2020

Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process.
Mob. Inf. Syst., 2020

2020 Letter from the Editor-in-Chief.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Smart Collaborative Tracking for Ubiquitous Power IoT in Edge-Cloud Interplay Domain.
IEEE Internet Things J., 2020

QoS-aware flow scheduling for energy-efficient cloud data centre network.
Int. J. Ad Hoc Ubiquitous Comput., 2020

Human Arthritis Analysis in Fog Computing Environment Using Bayesian Network Classifier and Thread Protocol.
IEEE Consumer Electron. Mag., 2020

A Smart Collaborative Routing Protocol for Delay Sensitive Applications in Industrial IoT.
IEEE Access, 2020

A Deep Reinforcement Learning Based Approach for Energy-Efficient Channel Allocation in Satellite Internet of Things.
IEEE Access, 2020

Collaborative Cache Allocation and Transmission Scheduling for Multi-User in Edge Computing.
IEEE Access, 2020

IEEE Access Special Section Editorial: Green Communications on Wireless Networks.
IEEE Access, 2020

NetFlow Monitoring and Cyberattack Detection Using Deep Learning With Ceph.
IEEE Access, 2020

Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey.
IEEE Access, 2020

DMM-SEP: Secure and Efficient Protocol for Distributed Mobility Management Based on 5G Networks.
IEEE Access, 2020

Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?
IEEE Access, 2020

Multi-ECGNet for ECG Arrythmia Multi-Label Classification.
IEEE Access, 2020

A Predictor-Corrector Algorithm Based on Laurent Series for Biological Signals in the Internet of Medical Things.
IEEE Access, 2020

SGF-MD: Behavior Rule Specification-Based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System.
IEEE Access, 2020

2019
Secure Computation on 4G/5G Enabled Internet-of-Things.
Wirel. Commun. Mob. Comput., 2019

Trust-Based Service Management for Mobile Cloud IoT Systems.
IEEE Trans. Netw. Serv. Manag., 2019

Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks.
IEEE Trans. Ind. Informatics, 2019

A Deep Learning Approach for Maximum Activity Links in D2D Communications.
Sensors, 2019

Special Issue "Internet of Things for Smart Homes".
Sensors, 2019

Ultra-Reliable Communications for Industrial Internet of Things: Design Considerations and Channel Modeling.
IEEE Netw., 2019

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019

MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks.
J. Netw. Comput. Appl., 2019

Smart collaborative distribution for privacy enhancement in moving target defense.
Inf. Sci., 2019

DROpS: A demand response optimization scheme in SDN-enabled smart energy ecosystem.
Inf. Sci., 2019

Guest Editorial Special Issue on Intrinsic Hardware Security for Internet of Things Infrastructure.
IEEE Internet Things J., 2019

Toward efficient authentication for space-air-ground integrated Internet of things.
Int. J. Distributed Sens. Networks, 2019

AIM: Activation increment minimization strategy for preventing bad information diffusion in OSNs.
Future Gener. Comput. Syst., 2019

Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things.
Future Gener. Comput. Syst., 2019

Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover.
Future Gener. Comput. Syst., 2019

5G wireless P2MP backhaul security protocol: an adaptive approach.
EURASIP J. Wirel. Commun. Netw., 2019

An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X).
CoRR, 2019

Security of 5G-V2X: Technologies, Standardization and Research Directions.
CoRR, 2019

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey.
CoRR, 2019

Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol.
Comput. Electr. Eng., 2019

Active Data Replica Recovery for Quality-Assurance Big Data Analysis in IC-IoT.
IEEE Access, 2019

Low-Power AES Data Encryption Architecture for a LoRaWAN.
IEEE Access, 2019

A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks.
IEEE Access, 2019

BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems.
IEEE Access, 2019

Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs).
IEEE Access, 2019

Content Recommendation Algorithm for Intelligent Navigator in Fog Computing Based IoT Environment.
IEEE Access, 2019

IEEE Access Special Section: Radio Frequency Identification and Security Techniques.
IEEE Access, 2019

APPAS: A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs.
IEEE Access, 2019

Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Muscle Activity-Driven Green-Oriented Random Number Generation Mechanism to Secure WBSN Wearable Device Communications.
Wirel. Commun. Mob. Comput., 2018

A software classification scheme using binary-level characteristics for efficient software filtering.
Soft Comput., 2018

Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".
IEEE Syst. J., 2018

An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.
Sensors, 2018

Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things.
Sensors, 2018

Dissimilarity Metric Based on Local Neighboring Information and Genetic Programming for Data Dissemination in Vehicular Ad Hoc Networks (VANETs).
Sensors, 2018

Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms.
Secur. Commun. Networks, 2018

Shortest feasible paths with partial charging for battery-powered electric vehicles in smart cities.
Pervasive Mob. Comput., 2018

SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems.
IEEE Netw., 2018

Secure and efficient protocol for fast handover in 5G mobile Xhaul networks.
J. Netw. Comput. Appl., 2018

GRBC-based Network Security Functions placement scheme in SDS for 5G security.
J. Netw. Comput. Appl., 2018

Letter from the Editor-in-Chief.
J. Internet Serv. Inf. Secur., 2018

MVO-Based 2-D Path Planning Scheme for Providing Quality of Service in UAV Environment.
IEEE Internet Things J., 2018

An anonymous access authentication scheme for vehicular ad hoc networks under edge computing.
Int. J. Distributed Sens. Networks, 2018

OFFRP: optimised fruit fly based routing protocol with congestion control for UAVs guided ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Security management for backhaul-aware 5G-V2X.
CoRR, 2018

Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives.
CoRR, 2018

Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications.
CoRR, 2018

A framework for mitigating zero-day attacks in IoT.
CoRR, 2018

(<i>P</i><i>U</i>)<sup>2</sup><i>M</i><sup>2</sup>: A potentially underperforming-aware path usage management mechanism for secure MPTCP-based multipathing services.
Concurr. Comput. Pract. Exp., 2018

Resource-based mobility management for video users in 5G using catalytic computing.
Comput. Commun., 2018

Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM.
IEEE Commun. Mag., 2018

Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios.
IEEE Commun. Mag., 2018

Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices.
IEEE Consumer Electron. Mag., 2018

A smartphone-based wearable sensors for monitoring real-time physiological data.
Comput. Electr. Eng., 2018

IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things.
IEEE Access, 2018

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments.
IEEE Access, 2018

Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT).
IEEE Access, 2018

Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET.
IEEE Access, 2018

A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing.
IEEE Access, 2018

Securing Internet-of-Things Systems Through Implicit and Explicit Reputation Models.
IEEE Access, 2018

On IoT Misbehavior Detection in Cyber Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Trust as a Service for IoT Service Management in Smart Cities.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

2017
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence.
IEEE Syst. J., 2017

A Dependable Localization Algorithm for Survivable Belt-Type Sensor Networks.
Sensors, 2017

Smart Collaborative Caching for Information-Centric IoT in Fog Computing.
Sensors, 2017

Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs.
IEEE Netw., 2017

SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers.
Mob. Inf. Syst., 2017

The Social Relationship Based Adaptive Multi-Spray-and-Wait Routing Algorithm for Disruption Tolerant Network.
Mob. Inf. Syst., 2017

Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles.
J. Netw. Comput. Appl., 2017

Enabling in-network aggregation by diffusion units for urban scale M2M networks.
J. Netw. Comput. Appl., 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

A brief overview of intelligent mobility management for future wireless mobile networks.
EURASIP J. Wirel. Commun. Netw., 2017

Special Issue: Foundations and Practice of Security in Emerging ICT Applications.
Comput. Syst. Sci. Eng., 2017

Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover.
CoRR, 2017

SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks.
Comput. Networks, 2017

A DVFS Based Energy-Efficient Tasks Scheduling in a Data Center.
IEEE Access, 2017

Smart Collaborative Connection Management for Identifier-Based Network.
IEEE Access, 2017

Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks.
IEEE Access, 2017

Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing.
IEEE Access, 2017

ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT.
IEEE Access, 2017

SAT-FLOW: Multi-Strategy Flow Table Management for Software Defined Satellite Networks.
IEEE Access, 2017

A LDDoS-Aware Energy-Efficient Multipathing Scheme for Mobile Cloud Computing Systems.
IEEE Access, 2017

An SDN-Based Secure Mobility Model for UAV-Ground Communications.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework.
Proceedings of the IoT as a Service - Third International Conference, 2017

Fuzzy-Based Protocol for Secure Remote Diagnosis of IoT Devices in 5G Networks.
Proceedings of the IoT as a Service - Third International Conference, 2017

IP-based seamless handover scheme using ANDSF in an untrusted environment.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Partition ORAMS Combined with Novel Client Eviction Mechanism.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

MIST 2017: 9th International Workshop on Managing Insider Security Threats.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

A 3D encryption with shifting mapping substitution mechanism.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
Detecting and preventing selfish behaviour in mobile ad hoc network.
J. Supercomput., 2016

A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.
IEEE Trans. Ind. Electron., 2016

Special issue on natural and secure computing in modern soft computing application.
Soft Comput., 2016

Long-term location privacy protection for location-based services in mobile cloud computing.
Soft Comput., 2016

An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Secur. Commun. Networks, 2016

Designing Efficient Mobile Gateway for Impoverished Regions Based on Self-Learning Strategy.
Mob. Inf. Syst., 2016

Energy Efficient Data Dissemination in Multi-UAV Coordinated Wireless Sensor Networks.
Mob. Inf. Syst., 2016

The PMIPv6-Based Group Binding Update for IoT Devices.
Mob. Inf. Syst., 2016

New order preserving encryption model for outsourced databases in cloud environments.
J. Netw. Comput. Appl., 2016

Approaching green sensor field using queue-based optimization technique.
J. Netw. Comput. Appl., 2016

PSSRC: A Web Service Registration Cloud Based on Structured P2P and Semantics.
Int. J. Data Warehous. Min., 2016

Special issue on security and privacy techniques in mobile cloud computing.
J. Ambient Intell. Humaniz. Comput., 2016

Innovative security technologies against insider threats and data leakage.
Int. J. Comput. Math., 2016

Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.
IET Commun., 2016

Efficient Subversion of Symmetric Encryption with Random Initialization Vector.
IEICE Trans. Inf. Syst., 2016

Special Section on Advanced Technologies for Homeland and Cyber Defense.
Intell. Autom. Soft Comput., 2016

A security gateway application for End-to-End M2M communications.
Comput. Stand. Interfaces, 2016

Residence Energy Control System Based on Wireless Smart Socket and IoT.
IEEE Access, 2016

TTP Based High-Efficient Multi-Key Exchange Protocol.
IEEE Access, 2016

Random Cladding with Feedback Mechanism for encrypting mobile messages.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

MIST 2016: 8th International Workshop on Managing Insider Security Threats.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Ports Distribution Management for Privacy Protection inside Local Domain Name System.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Intelligent technologies and applications for big data analytics.
Softw. Pract. Exp., 2015

Secure ubiquitous computing.
Pervasive Mob. Comput., 2015

Innovative Mobile Internet Services and Applications.
Mob. Inf. Syst., 2015

Polymorphic Malicious JavaScript Code Detection for APT Attack Defence.
J. Univers. Comput. Sci., 2015

A secure data encryption method employing a sequential-logic style mechanism for a cloud system.
Int. J. Web Grid Serv., 2015

Modelling software fault management with runtime verification.
Int. J. Ad Hoc Ubiquitous Comput., 2015

The correlation study for parameters in four tuples.
Int. J. Ad Hoc Ubiquitous Comput., 2015

A profiling based task scheduling approach for multicore network processors.
Concurr. Comput. Pract. Exp., 2015

Providing adaptive quality of security in quantum networks.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Business Process Merging Based on Topic Cluster and Process Structure Matching.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

The untrusted handover security of the S-PMIPv6 on LTE-A.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Vulnerability Analysis on the CNG Crypto Library.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

An Enhanced Java-Based Mobile Device Theft Response System.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract.
Proceedings of the Information and Communication Technology, 2015

Removing Key Escrow from the LW-HIBE Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

MIST 2015: 7th International Workshop on Managing Insider Security Threats.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Cyber Threats to Industrial Control Systems.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

A Tutorial on Quantum Key Distribution.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Special Issue on Mobility and Intelligence Management Technologies for Wireless and Mobile Networks.
Wirel. Pers. Commun., 2014

A Lease Algorithm to Maintain Strong Mapping Cache Consistency.
Wirel. Pers. Commun., 2014

A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.
J. Supercomput., 2014

Intelligent healthcare service based on context inference using smart device.
Soft Comput., 2014

Opportunistic sharing scheme for spectrum allocation in wireless virtualization.
Soft Comput., 2014

Soft computing for security services in smart and ubiquitous environments.
Soft Comput., 2014

Advanced technologies for homeland defense and security.
J. Netw. Comput. Appl., 2014

Open Source Software Detection using Function-level Static Software Birthmark.
J. Internet Serv. Inf. Secur., 2014

Prosperity of IT security technologies in homeland defense.
J. Ambient Intell. Humaniz. Comput., 2014

Secure and distributed video surveillance via portable devices.
J. Ambient Intell. Humaniz. Comput., 2014

An Optimization-Based Scheme for Efficient Virtual Machine Placement.
Int. J. Parallel Program., 2014

Towards cost efficient mobile service and information management in ubiquitous environment with cloud resource scheduling.
Int. J. Inf. Manag., 2014

An exploration of cache collaboration in information-centric network.
Int. J. Commun. Syst., 2014

Special Section on Advances in IT Convergence Technologies.
Intell. Autom. Soft Comput., 2014

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Gener. Comput. Syst., 2014

Special Issue: Mobile Internet Technologies and Services - Editorial.
Comput. Syst. Sci. Eng., 2014

A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies.
Comput. Sci. Inf. Syst., 2014

Optimized Multilevel Threshold Selection Using Evolutionary Computing.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

A Case Study for Potential Carpooling in Beijing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Identifying Windows Installer Package Files for Detection of Pirated Software.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Thermal-Aware Task Placement with Dynamic Thermal Model in an Established Datacenter.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid.
Proceedings of the Information and Communication Technology, 2014

A Design of Web Log Integration Framework Using NoSQL.
Proceedings of the Information and Communication Technology, 2014

Design and analysis of efficient multicast sender mobility scheme for Proxy mobile IPv6.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

Survey on distributed mobility management schemes for Proxy mobile IPv6.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

A random wrapping encryption method.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

A High-Speed Network Content Filtering System.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

A Structure P2P Based Web Services Registry with Access and Control.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols.
IEEE Trans. Ind. Electron., 2013

Hierarchical DHT and proportional replication based mobility management for large-scale mobile Internet.
Math. Comput. Model., 2013

Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution.
Math. Comput. Model., 2013

Special Issue on "Advances in mobile, ubiquitous and cognitive computing".
Math. Comput. Model., 2013

Information Security.
J. Univers. Comput. Sci., 2013

Optimizing the Joint Source/Network Coding for Video Streaming over Multi-hop Wireless Networks.
KSII Trans. Internet Inf. Syst., 2013

Guest editorial: A brief overview of data leakage and insider threats.
Inf. Syst. Frontiers, 2013

Mobile and internet services in ubiquitous and pervasive computing environments.
Inf. Sci., 2013

An efficient classification approach for large-scale mobile ubiquitous computing.
Inf. Sci., 2013

Modern cognitive and ubiquitous computing.
Neurocomputing, 2013

Probabilistic spatio-temporal inference for motion event understanding.
Neurocomputing, 2013

Cognitive and secure computing in Information Management.
Int. J. Inf. Manag., 2013

The throughput critical condition study for reliable multipath transport.
Comput. Sci. Inf. Syst., 2013

A topographic-awareness and situational-perception based mobility model with artificial bee colony algorithm for tactical MANET.
Comput. Sci. Inf. Syst., 2013

HMS: A Hierarchical Mapping System for the Locator/ID Separation Network.
Comput. Informatics, 2013

Inter-cluster Topology Control: An Evolutionary Game Perspective.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Novel Approach to Joint Source-Channel Coding for Scalable Video Transmission.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation).
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

On Performance Evaluation of Various Traffic Combination Based on Network Calculus.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

A Multiple-Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Defending against insider threats and internal data leakage.
Secur. Commun. Networks, 2012

Advances in Network-based Information Systems.
Mob. Inf. Syst., 2012

A Brief Survey on Rootkit Techniques in Malicious Codes.
J. Internet Serv. Inf. Secur., 2012

Editorial: Advanced intelligent and security services in mobile and ubiquitous computing.
J. Intell. Manuf., 2012

A chain-cluster based routing algorithm for wireless sensor networks.
J. Intell. Manuf., 2012

Field architecture for traffic and mobility modelling in mobility management.
Int. J. Ad Hoc Ubiquitous Comput., 2012

Editorial.
Comput. Syst. Sci. Eng., 2012

DSSH: Digital signature based secure handover for network-based mobility management.
Comput. Syst. Sci. Eng., 2012

Editorial.
Comput. Syst. Sci. Eng., 2012

Grid transaction management and an efficient development kit.
Comput. Syst. Sci. Eng., 2012

An efficient deadlock prevention approach for service oriented transaction processing.
Comput. Math. Appl., 2012

ACSP: A novel security protocol against counting attack for UHF RFID systems.
Comput. Math. Appl., 2012

Towards context, cognitive, and secure computing.
Comput. Math. Appl., 2012

Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Exploring Urban Dynamics Based on Pervasive Sensing: Correlation Analysis of Traffic Density and Air Quality.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: A Case Study.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Performance Analysis of Reliable Transmission on Multiple Paths and Single Path.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Application-Aware Virtual Machine Placement in Data Centers.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Survey on Route Optimization Schemes for Proxy Mobile IPv6.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANET.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Secure Secondary Backup Storage with an Isolated Authentication.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Maintaining strong consistency for the identifier-to-locator mapping cache.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Improving security level of LTE authentication and key agreement procedure.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Recommendation of More Interests Based on Collaborative Filtering.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

Mobile Malware Threats and Defenses for Homeland Security.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

A Secure Distributed Video Surveillance System Based on Portable Devices.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Editorial: Special Issue on "Advances in Mobile IPv6 and Network-Based Localized Mobility Management".
Wirel. Pers. Commun., 2011

Enhancing QoS of Mobile Devices by a New Handover Process in PMIPv6 Networks.
Wirel. Pers. Commun., 2011

Next generation mobility management.
Wirel. Commun. Mob. Comput., 2011

Energy-aware weighted graph based dynamic topology control algorithm.
Simul. Model. Pract. Theory, 2011

A cross-layer protocol of spectrum mobility and handover in cognitive LTE networks.
Simul. Model. Pract. Theory, 2011

Enhancing MISP with Fast Mobile IPv6 Security.
Mob. Inf. Syst., 2011

Emerging Wireless and Mobile Technologies.
Mob. Inf. Syst., 2011

Enhancing SVO Logic for Mobile IPv6 Security Protocols.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Addressing Insider Threats and Information Leakage.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks.
J. Netw. Comput. Appl., 2011

A pipeline-based approach for long transaction processing in web service environments.
Int. J. Web Grid Serv., 2011

Towards formal analysis of wireless LAN security with MIS protocol.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Introduction to Special Section on Complex, Intelligent and Software Intensive Systems.
Comput. Informatics, 2011

A Tree-based Hierarchy Data Storage Framework in a Pervasive Space.
Comput. Informatics, 2011

Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Analysis of Optimal Query, Fairness and Replication for DHT-based Mobility Management.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Improvements on Sequential Minimal Optimization Algorithm for Support Vector Machine Based on Semi-sparse Algorithm.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

SaMob: A Social Attributes Based Mobility Model for Ad Hoc Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

An Effective Deadlock Prevention Mechanism for Distributed Transaction Management.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Trying Linear Network Coding on a Network Flow Processor.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

PPMLT: A Pipeline Based Processing Model of Long Transactions.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

IT Issues on Homeland Security and Defense.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

Extended Spatio-temporal Relations between Moving and Non-moving Objects.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Mobile and Wireless Networks.
Mob. Inf. Syst., 2010

Balanced bipartite graph based register allocation for network processors in mobile and wireless networks.
Mob. Inf. Syst., 2010

Editorial.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Safe Authentication Protocol for Secure USB Memories.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

caTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks.
Int. J. Commun. Syst., 2010

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
IEICE Trans. Inf. Syst., 2010

A Special Issue of Intelligent Automation and Soft Computing - Forthcoming Multimedia & Intelligent Services In Ubiquitous And Pervasive Computing.
Intell. Autom. Soft Comput., 2010

Context-Aware Workflow Management For Intelligent Navigation Applications In Pervasive Environments.
Intell. Autom. Soft Comput., 2010

GridTDK: A Grid Transaction Development Kit.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Network mobility support in PMIPv6 network.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

A Dynamic Host Selection Algorithm for Layered Data Storage Architecture in a Pervasive Space.
Proceedings of the CISIS 2010, 2010

Malware Obfuscation Techniques: A Brief Survey.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Comments on a One-Way Hash Chain Based Authentication for FMIPv6.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
An Enhanced Security Protocol for Fast Mobile IPv6.
IEICE Trans. Inf. Syst., 2009

A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6.
IEICE Trans. Commun., 2009

Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

The Study on Software Tamper Resistance for Securing a Game Service.
Proceedings of the 2009 International Conference on Complex, 2009

2008
An Adaptive Context-Aware Transaction Model for Mobile and Ubiquitous Computing.
Comput. Informatics, 2008

A survey of NETLMM in all-IP-based wireless networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

2007
Advanced Agent-Delegated Route Optimization Protocol for Efficient Multimedia Services at Low-Battery Devices.
Proceedings of the Advances in Multimedia Modeling, 2007

Intelligent Home Network Authentication: S/Key-Based Home Device Authentication.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Link Quality-Based (LQ-CDS) Construction in Smart Home Wireless Mesh Networks.
Proceedings of the Future Generation Communication and Networking, 2007

Design and Implementation of a Ubiquitous ECG Monitoring System Using SIP and the Zigbee Network.
Proceedings of the Future Generation Communication and Networking, 2007

A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Light Weight Authentication Protocol for Digital Home Networks.
Proceedings of the Computational Science and Its Applications, 2006

Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes.
Proceedings of the Computational Science and Its Applications, 2006

An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Comments on Yeh-Shen-Hwang's One-Time Password Authentication Scheme.
IEICE Trans. Commun., 2005

2004
Improving CAM-DH Protocol for Mobile Nodes with Constraint Computational Power.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...