Tae Ho Cho

Orcid: 0000-0001-6222-2096

According to our database1, Tae Ho Cho authored at least 75 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks.
IEEE Access, 2022

2020
Simulation Methodology-Based Context-Aware Architecture Design for Behavior Monitoring of Systems.
Symmetry, 2020

Discrete event simulation-based energy efficient path determination scheme for probabilistic voting-based filtering scheme in sensor networks.
Int. J. Distributed Sens. Networks, 2020

2019
Multipath Selection Method for En-route Filtering in Dynamic Wireless Sensor Network.
Proceedings of the International Conference on Electronics, Information, and Communication, 2019

2018
A Fuzzy Rule-Based Key Redistribution Method for Improving Security in Wireless Sensor Networks.
IEICE Trans. Commun., 2018

PKSM: Pre-key Distribution and Sink Mobility in Commutative Cipher Based En-route Filtering to Extend the Network Lifetime in WSNs.
Ad Hoc Sens. Wirel. Networks, 2018

2017
Context-Aware Architecture for Probabilistic Voting-based Filtering Scheme in Sensor Networks.
IEEE Trans. Mob. Comput., 2017

Energy Efficient Fuzzy Adaptive Verification Node Selection-Based Path Determination in Wireless Sensor Networks.
Symmetry, 2017

A Network Density-adaptive Improved CCEF Scheme for Enhanced Network Lifetime, Energy Efficiency, and Filtering in WSNs.
Ad Hoc Sens. Wirel. Networks, 2017

2016
Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks.
Ad Hoc Networks, 2016

2015
Extending the network lifetime by pre-deterministic key distribution in CCEF in wireless sensor networks.
Wirel. Networks, 2015

A fuzzy rule-based path configuration method for LEAP in sensor networks.
Ad Hoc Networks, 2015

A Method to Select Next Hop Node for Improving Energy Efficiency in LEAP-Based WSNs.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

2014
Improvement of energy consumption and detection power for PVFS in wireless sensor networks.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

2013
Location-Based Key Management Structure for Secure Group Communication in Wireless Sensor Networks.
IEICE Trans. Commun., 2013

2012
Key Index-Based Routing for Filtering False Event Reports in Wireless Sensor Networks.
IEICE Trans. Commun., 2012

A Method for the Enhancement of the Detection Power and Energy Savings against False Data Injection Attacks in Wireless Sensor Networks.
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012

Energy Efficient Filtering Nodes Assignment Method for Sensor Networks Using Fuzzy Logic.
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012

2011
Path Renewal Method in Filtering Based Wireless Sensor Networks.
Sensors, 2011

Optimized Fuzzy Adaptive Filtering for Ubiquitous Sensor Networks.
IEICE Trans. Commun., 2011

Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Location Based Hierarchical Secure Multicast Group Building in Wireless Sensor Networks.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

Key Distribution Method for Enhancing Secure Performances in Dynamic Filtering-Based Wireless Sensor Network.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

A* Based Cutting Plan Generation for Metal Grating Production.
Proceedings of the Intelligent Information and Database Systems, 2011

2010
Environment-based Selection Method for En-route Filtering Scheme using Fuzzy Logic.
J. Networks, 2010

Simulation Modeling of SAM Fuzzy Logic Controllers.
IEICE Trans. Inf. Syst., 2010

A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks.
IEICE Trans. Commun., 2010

A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks.
Comput. Commun., 2010

Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Fuzzy Based Key Re-distribution Period Determination Method in Wireless Sensor Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

Efficient Key Dissemination Method Using Fuzzy Logic Based Dynamic En-route Filtering.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

2009
A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks.
J. Parallel Distributed Comput., 2009

A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks.
J. Inf. Sci. Eng., 2009

Fuzzy-Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks.
IEICE Trans. Inf. Syst., 2009

Energy efficient filtering method in sensor networks.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

A Coverage and Energy Aware Cluster-Head Selection Algorithm in Wireless Sensor Networks.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Energy Efficient MAC Length Determination Method for Statistical En-Route Filtering Using Fuzzy Logic.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

2008
Fuzzy Adaptive Partitioning Method for the Statistical Filtering.
IEICE Trans. Inf. Syst., 2008

A<sup>*</sup>-based key tree structure generation for group key management in wireless sensor networks.
Comput. Commun., 2008

A<sup>*</sup> -based layout design for gratings allocation.
Comput. Aided Des., 2008

Efficient selection method of message authentication codes for filtering scheme in sensor networks.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008

Selective Sensor Node Selection Method for Making Suitable Cluster in Filtering-Based Sensor Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008

2007
Fuzzy Rule-Based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks.
Int. J. Inf. Acquis., 2007

An en-Route Filtering Method in Sensor Networks Using Decision Function.
Int. J. Inf. Acquis., 2007

Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks.
IEICE Trans. Commun., 2007

A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks.
IEICE Trans. Inf. Syst., 2007

Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks.
Proceedings of the New Trends in Applied Artificial Intelligence, 2007

Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Genetic Algorithm Based Routing Method for Efficient Data Transmission in Sensor Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

A Fuzzy-Based En-Route Filtering Scheme in Sensor Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function.
Proceedings of the Computational Science and Its Applications, 2007

2006
Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

Genetic Algorithms for Improving Material Utilization in Manufacturing.
Proceedings of the Intelligent Computing, 2006

Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2006

Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2006

Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

2005
Transmission Relay Method for Balanced Energy Depletion in Wireless Sensor Networks Using Fuzzy Logic.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Application of Fuzzy Logic for Distributed Intrusion Detection.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Distributed Security Agent Modeling in the Policy-Based Networking.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Simulation-Based Security Testing for Continuity of Essential Service.
Proceedings of the Computational Science and Its Applications, 2004

Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System.
Proceedings of the Artificial Intelligence and Simulation, 2004

Modeling of Policy-Based Network with SVDB.
Proceedings of the Artificial Intelligence and Simulation, 2004

2003
Simulation Model Design of a Security System Based on a Policy-Based Framework.
Simul., 2003

An application of blackboard architecture for the coordination among the security systems.
Simul. Model. Pract. Theory, 2003

Hierarchical simulation model with animation.
Eng. Comput., 2003

Modeling and Simulation of Distributed Security Models.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
Embedding Intelligent Planning Capability to DEVS Models by Goal Regression Method.
Simul., 2002

Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Modeling and Simulation for Detecting a Distributed Denial of Service Attack.
Proceedings of the AI 2002: Advances in Artificial Intelligence, 2002

2001
Hierarchical Simulation Model with Animation for Large Network Security.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Simulation of Network Security with Collaboration among IDS Models.
Proceedings of the AI 2001: Advances in Artificial Intelligence, 2001


  Loading...