Sang Guun Yoo

Orcid: 0000-0003-1376-3843

According to our database1, Sang Guun Yoo authored at least 30 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Systematic Literature Review of LoRaWAN: Sensors and Applications.
Sensors, October, 2023

A Complete One-Time Passwords (OTP) Solution Using Microservices: A Theoretical and Practical Approach.
Proceedings of the Innovations for Community Services - 23rd International Conference, 2023

A Systematic Literature Review of Blockchain Technology: Applications Fields, Platforms, and Consensus Protocols.
Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, 2023

2022
Securing End-Node to Gateway Communication in LoRaWAN With a Lightweight Security Protocol.
IEEE Access, 2022

Gaze Tracking: A Survey of Devices, Libraries and Applications.
Proceedings of the Modelling and Development of Intelligent Systems, 2022

2021
Study of the Influences of Stimuli Characteristics in the Implementation of Steady State Visual Evoked Potentials Based Brain Computer Interface Systems.
Proceedings of the Artificial Intelligence and Soft Computing, 2021

Real-Time Emotion Recognition for EEG Signals Recollected from Online Poker Game Participants.
Proceedings of the Advances in Artificial Intelligence, Software and Systems Engineering, 2021

2020
EEG-Based BCI Emotion Recognition: A Survey.
Sensors, 2020

Emotion Recognition Related to Stock Trading Using Machine Learning Algorithms With Feature Selection.
IEEE Access, 2020

A Comprehensive Study of the IoT Cybersecurity in Smart Cities.
IEEE Access, 2020

Machine Learning Analysis of EEG Measurements of Stock Trading Performance.
Proceedings of the Advances in Artificial Intelligence, Software and Systems Engineering, 2020

2019
Cognitive security: A comprehensive study of cognitive science in cybersecurity.
J. Inf. Secur. Appl., 2019

Stock Market Data Prediction Using Machine Learning Techniques.
Proceedings of the Information Technology and Systems, 2019

Enhancement to the Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

2018
Brain Computer Interface Application for People with Movement Disabilities.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Analysis of Traditional Web Security Solutions and Proposal of a Web Attacks Cognitive Patterns Classifier Architecture.
Proceedings of the Technologies and Innovation - 4th International Conference, 2018

Study of the Maturity of Information Security in Public Organizations of Ecuador.
Proceedings of the Technologies and Innovation - 4th International Conference, 2018

2017
5G-VRSec: Secure Video Reporting Service in 5G Enabled Vehicular Networks.
Wirel. Commun. Mob. Comput., 2017

Enhanced Misuse Cases for Prioritization of Security Requirements.
Proceedings of the 9th International Conference on Information Management and Engineering, Barcelona, Spain, October 09, 2017

Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Cryptanalysis of Several Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks.
Proceedings of the Fifth International Conference on Network, Communication and Computing, 2016

2014
SERA: a secure energy reliability aware data gathering for sensor networks.
Multim. Tools Appl., 2014

2013
A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

DDoS avoidance strategy for service availability.
Clust. Comput., 2013

2012
Confidential information protection system for mobile devices.
Secur. Commun. Networks, 2012

An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks.
KSII Trans. Internet Inf. Syst., 2012

A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

2011
Security Requirements Prioritization Based on Threat Modeling and Valuation Graph.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Specification-Based Intrusion Detection System for WiBro.
Proceedings of the Convergence and Hybrid Information Technology, 2011

2010
JTAG Security System Based on Credentials.
J. Electron. Test., 2010


  Loading...