Kuinam J. Kim

According to our database1, Kuinam J. Kim authored at least 63 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A survey of deep learning-based network anomaly detection.
Clust. Comput., 2019

Improvement of malware detection and classification using API call sequence alignment and visualization.
Clust. Comput., 2019

Design of network threat detection and classification based on machine learning on cloud computing.
Clust. Comput., 2019

Optimized state update for mobile games in cloud networks.
Clust. Comput., 2019

Providing profiling information for OpenGL ES application programs.
Clust. Comput., 2019

Prototype implementation of the OpenGL ES 2.0 shading language offline compiler.
Clust. Comput., 2019

Design and implementation of OpenGL SC 2.0 rendering pipeline.
Clust. Comput., 2019

2017
A Novel Image Identifier Generation Method Using Luminance and Location.
Wirel. Pers. Commun., 2017

Cloud System for User-Customized Mobile Interface Sharing in Wireless Environment.
Wirel. Pers. Commun., 2017

Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks.
Wirel. Pers. Commun., 2017

Improved Authentication of Binding Update Protocol in Mobile IPv6 Networks.
Wirel. Pers. Commun., 2017

Secure Route Optimization Scheme for Network Mobility Support in Heterogeneous Mobile Networks.
Wirel. Pers. Commun., 2017

A Study on the Markov Chain Based Malicious Code Threat Estimation Model.
Wirel. Pers. Commun., 2017

A Study of Integrity on the Security Patches System Using PM-FTS.
Wirel. Pers. Commun., 2017

Object Tracking and Recognition Based on Reliability Assessment of Learning in Mobile Environments.
Wirel. Pers. Commun., 2017

A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service.
Wirel. Pers. Commun., 2017

A scheme of AR-based personalized interactive broadcasting service in terrestrial digital broadcasting system.
Clust. Comput., 2017

CBR-based network performance management with multi-agent approach.
Clust. Comput., 2017

Geometric primitive extraction from LiDAR-scanned point clouds.
Clust. Comput., 2017

An artifact detection scheme with CUDA-based image operations.
Clust. Comput., 2017

Research on Design of End Site Architecture to Connect LHCONE in KREONET.
Proceedings of the Information Science and Applications 2017, 2017

2016
A continuous playing scheme on RESTful web service.
Clust. Comput., 2016

A feature selection approach to find optimal feature subsets for the network intrusion detection system.
Clust. Comput., 2016

Detecting for high speed flying object using image processing on target place.
Clust. Comput., 2016

Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes.
Clust. Comput., 2016

Hierarchical Cluster Network for Wellness Sports Industry.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

2015
Advanced feature point transformation of corner points for mobile object recognition.
Multim. Tools Appl., 2015

NAND flash memory system based on the Harvard buffer architecture for multimedia applications.
Multim. Tools Appl., 2015

A polymorphic service management scheme based on virtual object for ubiquitous computing environment.
Multim. Tools Appl., 2015

2014
Performance analysis of LTE downlink system using relay-based selective transmission.
Pers. Ubiquitous Comput., 2014

Implementation of a cost-effective home lighting control system on embedded Linux with OpenWrt.
Pers. Ubiquitous Comput., 2014

Recent trends on mobile computing and future networks.
Pers. Ubiquitous Comput., 2014

PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions.
Multim. Tools Appl., 2014

A study on malicious codes pattern advanced analysis using visualization.
Multim. Tools Appl., 2014

Categorization for grouping associative items using data mining in item-based collaborative filtering.
Multim. Tools Appl., 2014

Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 Networks.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

2013
Special Issue on "Recent Trends on Convergence Personal Wireless System" - Selected Topics from the ICITCS Conference on December 5-7 2012 in Pyeongchang, Korea.
Wirel. Pers. Commun., 2013

A Study on Convergence Security System for Preventing Leakage of Internal Information.
Wirel. Pers. Commun., 2013

A study on abnormal event correlation analysis for convergence security monitor.
Clust. Comput., 2013

A Study on Improvement Measures of Remote Diligence / Laziness Management Applying NFC.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

A Study on Improvement Measures of Unmanned Security System against Security Threats.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

The Efficient Security Management Measures Using K2-SMS in Case of Security Transport.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

A Study on Modeling to Predict Security Threat of Smart Phones.
Proceedings of the International Conference on Information Science and Applications, 2013

A Study on the NFC-Based Mobile Parking Management System.
Proceedings of the International Conference on Information Science and Applications, 2013

2012
Enabling Lego robots to communicate via infrared routing.
Telecommun. Syst., 2012

Improving web cache server performance through arbitral thread and delayed caching.
Clust. Comput., 2012

Flexible authorization in home network environments.
Clust. Comput., 2012

A Study on the Real-Time Location Tracking Systems Using Passive RFID.
Proceedings of the International Conference on IT Convergence and Security, 2012

Erratum to: IT Convergence and Security 2012.
Proceedings of the International Conference on IT Convergence and Security, 2012

2007
Simulation Based Nodal Analysis for Effects Based Operations.
Proceedings of the Computational Science and Its Applications, 2007

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique.
Proceedings of the Computational Science and Its Applications, 2007

A Stable Evidence Collection Procedure of a Volatile Data in Research.
Proceedings of the Computational Science and Its Applications, 2007

Design and Implementation of Security Structure for Interactive Web Environment.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

2006
A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks.
Proceedings of the Computational Science and Its Applications, 2006

HOIDS-Based Detection Method of Vicious Event in Large Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2004
Multi-level Protection Building for Virus Protection Infrastructure.
Proceedings of the Computational Science, 2004

2003
Improved Structure Management of Gateway Firewall Systems for Effective Networks Security.
Proceedings of the Computer and Information Sciences, 2003

Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database.
Proceedings of the Computer and Information Sciences, 2003

Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks.
Proceedings of the Computational Science and Its Applications, 2003

Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks.
Proceedings of the Computational Science - ICCS 2003, 2003

Efficient Migration Algorithm for Mobile Agents in Wired/Wireless Internets.
Proceedings of the Computational Science - ICCS 2003, 2003


  Loading...