Seong-Moo Yoo

Orcid: 0000-0002-2701-917X

According to our database1, Seong-Moo Yoo authored at least 87 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators.
IEEE Internet Things J., 2023

2021
Protocol misbehavior detection framework using machine learning classification in vehicular Ad Hoc networks.
Wirel. Networks, 2021

Protocol Misbehavior Analysis Using Multivariate Statistical Analysis and Machine Learning in Vehicular Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2021

2020
Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks.
J. Inf. Secur. Appl., 2020

Personality Classification Experiment by Applying k-Means Clustering.
Int. J. Emerg. Technol. Learn., 2020

Best Practices in Running IT Hackathons Based on Paragon University Dataset.
Int. J. Emerg. Technol. Learn., 2020

Secure Data Integrity in VANETs based on CS-DC Scheme.
Proceedings of the IEEE Latin-American Conference on Communications, 2020

Personality Classification by Applying k-Means Clustering.
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020

2019
A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator.
Proceedings of the National Cyber Summit, 2019

Fail-Safe Mechanism Using Entropy Based Misbehavior Classification and Detection in Vehicular Ad Hoc Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Protecting Data Integrity for Multi-Application Environment in Wireless Sensor Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Verifiable Search Meets Blockchain: A Privacy-Preserving Framework for Outsourced Encrypted Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Optimal Threshold Analysis for Triggering Fail-Safe Mechanism in Vehicular Ad Hoc Networks.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks.
Int. J. Wirel. Inf. Networks, 2018

Implementation and Evaluation of Flipped Classroom as IoT Element into Learning Process of Computer Network Education.
Int. J. Inf. Commun. Technol. Educ., 2018

Efficient data association to targets for tracking in passive wireless sensor networks.
Ad Hoc Networks, 2018

Broadcast storm mitigation from unintentional misbehavior in vehicular ad hoc networks.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Securing data forwarding against blackhole attacks in mobile ad hoc networks.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2017
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers.
IEEE Trans. Inf. Forensics Secur., 2017

Securing SCADA Applications Using OpenPLC With End-To-End Encryption.
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 2017

2016
E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs.
Wirel. Networks, 2016

A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators.
Comput. Oper. Res., 2016

Secure VPN Using Mobile IPv6 Based Moving Target Defense.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs.
KSII Trans. Internet Inf. Syst., 2015

Extended self-reproducible Discrete Event System Specification (DEVS) formalism using hidden inheritance.
Inf. Sci., 2015

2014
Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks.
KSII Trans. Internet Inf. Syst., 2014

Rule-based multiple-target tracking in acoustic wireless sensor networks.
Comput. Commun., 2014

Noise Mitigation for Multiple Target Tracking in Acoustic Wireless Sensor Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2013
A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols.
Sensors, 2013

Noise Mitigation for Target Tracking in Wireless Acoustic Sensor Networks.
KSII Trans. Internet Inf. Syst., 2013

Doppler effect on target tracking in wireless sensor networks.
Comput. Commun., 2013

An efficient reliable one-hop broadcast in mobile ad hoc networks.
Ad Hoc Networks, 2013

Maximizing Investigation Effectiveness in Digital Forensic Cases.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
The Insecurity of Wireless Networks.
IEEE Secur. Priv., 2012

Intelligent cell selection satisfying user requirements for inter-system handover in heterogeneous networks.
Comput. Commun., 2012

2011
ROB/CN: An Efficient Reliable 1-Hop Broadcast Using CSMA/CN in Mobile Ad Hoc Networks.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2010
Route Reutilization Routing in Mobile Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2010

LSM: A layer subdivision method for deformable object matching.
Inf. Sci., 2010

Fuzzy Aggregation with Artificial Color filters.
Inf. Sci., 2010

A Special Issue of Intelligent Automation and Soft Computing - Forthcoming Multimedia & Intelligent Services In Ubiquitous And Pervasive Computing.
Intell. Autom. Soft Comput., 2010

Two Distributive Key Management Schemes In Mobile Ad Hoc Networks.
Intell. Autom. Soft Comput., 2010

Quantum Three-Pass protocol: Key distribution using quantum superposition states
CoRR, 2010

A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks.
Proceedings of the Communication and Networking, 2010

Propagation modeling and analysis of network worm attack.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense.
KSII Trans. Internet Inf. Syst., 2009

Authentication Protocol Using Quantum Superposition States.
Int. J. Netw. Secur., 2009

An Approach against a Computer Worm Attack.
Int. J. Commun. Networks Inf. Secur., 2009

Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune System.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Distributive Key Management for Mobile Ad Hoc Networks.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Three-Party Quantum Authenticated Key Distribution with Partially Trusted Third Party.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Complexity accuracy tradeoffs of Lie operators in motion estimation.
Pattern Recognit. Lett., 2007

Efficient local transformation estimation using Lie operators.
Inf. Sci., 2007

2006
Two Parallel 1-d Fft Algorithms without all-to-all Communication.
Parallel Process. Lett., 2006

DIG: Degree of inter-reference gap for a dynamic buffer cache management.
Inf. Sci., 2006

Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors.
Informatica, 2006

Multi-user data multiplexing for digital multimedia broadcasting.
Comput. Commun., 2006

Recycled path routing in mobile ad hoc networks.
Comput. Commun., 2006

Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Bank Transfer over Quantum Channel with Digital Checks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Use of Artificial Color filtering to improve iris recognition and searching.
Pattern Recognit. Lett., 2005

An AES crypto chip using a high-speed parallel pipelined architecture.
Microprocess. Microsystems, 2005

An efficient VLSI implementation of IDEA encryption algorithm using VHDL.
Microprocess. Microsystems, 2005

ARM: Anticipated route maintenance scheme in location-aided mobile ad hoc networks.
J. Commun. Networks, 2005

AES crypto chip utilizing high-speed parallel pipelined architecture.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

On quantum authentication protocols.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

A quantum no-key protocol for secure data communication.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

Decreasing broadcast in route discovery using vectors in mobile ad hoc networks.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Artificial color image logic.
Inf. Sci., 2004

Fault-Free Maximal Submeshes in Faulty Torus-Connected Multicomputers.
Informatica (Slovenia), 2004

Motion estimation with integrated motion models.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004

Black hole attack in mobile Ad Hoc networks.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004

A performance simulation for route maintenance in wireless ad hoc networks.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004

2003
Efficient Location Traffic Management With Multiple Virtual Layers.
J. Inf. Sci. Eng., 2003

Computation Control of Distributed Image Decoders in Mobile Computing.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

DIG Based Block Replacement Scheme for Efficient Buffer Cache Management.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
An All-to-All Multicast Routing Decreasing Channel Overheads in Wireless Ad Hoc Networks.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

2001
An approach to remote software project management and development.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001

Maintaining maximal submeshes in torus-connected multi-computers.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001

2000
Processor Scheduling and Allocation for 3D Torus Multicomputer Systems.
IEEE Trans. Parallel Distributed Syst., 2000

On Task Relocation in Two-Dimensional Meshes.
J. Parallel Distributed Comput., 2000

Analytical approaches for modeling characterized MIN.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1999
A Task Compaction Scheme for 3D Torus Multicomputer Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1997
An Efficient Task Allocation Scheme for 2D Mesh Architectures.
IEEE Trans. Parallel Distributed Syst., 1997

1996
Dynamic Task Scheduling and Allocation for 3D Torus Multicomputer Systems.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

1995
An on-line scheduling and allocation scheme for real-time tasks in 2D meshes.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

An Efficient Task Allocation Scheme for Two-Dimensional Mesh-Connected Systems.
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995


  Loading...