Kyung-Soo Lim

Orcid: 0000-0003-4132-1284

According to our database1, Kyung-Soo Lim authored at least 17 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-channel transmission method for improving TCP reliability and transmission efficiency in UNIWAY.
J. Ambient Intell. Humaniz. Comput., February, 2024

2019
Study on peak misdetection recovery of key exchange protocol using heartbeat.
J. Supercomput., 2019

2018
Compact deep learned feature-based face recognition for Visual Internet of Things.
J. Supercomput., 2018

Deep feature learning for person re-identification in a large-scale crowdsourced environment.
J. Supercomput., 2018

Secure mobile device structure for trust IoT.
J. Supercomput., 2018

Indoor positioning method using BITON and linear Kalman filter.
Soft Comput., 2018

Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing.
Proceedings of the Parallel and Distributed Computing, 2018

A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2017
An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment.
Symmetry, 2017

Development of Unidirectional Security Gateway Satisfying Security Functional Requirements.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

2014
Test-driven forensic analysis of satellite automotive navigation systems.
J. Intell. Manuf., 2014

2013
A framework for unified digital evidence management in security convergence.
Electron. Commer. Res., 2013

2012
On-the-spot digital investigation by means of LDFS: Live Data Forensic System.
Math. Comput. Model., 2012

2011
A new proposal for a digital evidence container for security convergence.
Proceedings of the 2011 IEEE International Conference on Control System, 2011

2009
A Stepwise Methodology for Tracing Computer Usage.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2008
Methodologies for Detecting Covert Database.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Methodology for Forensic Analysis of Embedded Systems.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...