Jae-Deok Lim

According to our database1, Jae-Deok Lim authored at least 20 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An IoT Device-trusted Remote Attestation Framework.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2020
Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey.
IEEE Access, 2020

Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2018
Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications.
CoRR, 2018

2017
SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers.
Mob. Inf. Syst., 2017

Detection of metamorphic malicious mobile code on android-based smartphones.
Int. J. Adv. Media Commun., 2017

2016
Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.
IET Commun., 2016

Secure user authentication based on the trusted platform for mobile devices.
EURASIP J. Wirel. Commun. Netw., 2016

2015
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization.
Int. J. Distributed Sens. Networks, 2015

Technology trends of access control in IoT and requirements analysis.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

RF interference evaluation of flexible flat cables for high-speed data transmission in mobile devices.
Proceedings of the 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits, 2015

2014
Improving performance of X-rated video classification with the optimized repeated curve-like spectrum feature and the skip-and-analysis processing.
Multim. Tools Appl., 2014

Protection method from APP repackaging attack on mobile device with separated domain.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

2013
DroidVulMon - Android Based Mobile Device Vulnerability Analysis and Monitoring System.
Proceedings of the Seventh International Conference on Next Generation Mobile Apps, 2013

2012
Audio-based automatic detection of objectionable contents in noisy conditions using normalized segmental two-dimesional MFCC.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Automatic Classification of X-rated Videos using Obscene Sound Analysis based on a Repeated Curve-like Spectrum Feature
CoRR, 2011

Software-Based Instrumentation for Localization of Faults Caused by Electrostatic Discharge.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

2007
Implementation of LSM-Based RBAC Module for Embedded System.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

2003
A study of the method of providing secure network channel among secure OSs.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

2002
ICFS: Integrated Crypto-FileSystem into Vnode Layer using Access Control.
Proceedings of the Internet and Multimedia Systems and Applications, 2002


  Loading...