Kibom Kim

According to our database1, Kibom Kim authored at least 13 papers between 1997 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Deep Audio Steganalysis in Time Domain.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Feature Aggregation Networks for Image Steganalysis.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

2016
Robust bootstrapping memory analysis against anti-forensics.
Digit. Investig., 2016

Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

2009
Lessons learned from the construction of a Korean software reference data set for digital forensics.
Digit. Investig., 2009

2006
A Model for Security Vulnerability Pattern.
Proceedings of the Computational Science and Its Applications, 2006

2002
An Efficient Coordinated Checkpointing Scheme Based on PWD Model.
Proceedings of the Information Networking, 2002

2000
Causal Message Logging Protocol Considering In-Transit Messages.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
Movement Locality-Based Location Tracking Strategy Reducing Location Management Cost in Mobile Computing Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Low-Overhead Fault-Tolerance for Java Parallel Applications on Heterogeneous Networked Computers.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Tracking Mobile Users Using User Locality in Mobile Computing Systems.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

A Location Tracking Scheme Using Call Locality in PCN.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

1997
Hybrid checkpointing protocol based on selective-sender-based message logging.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997


  Loading...