Taeeun Kim

According to our database1, Taeeun Kim authored at least 19 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
AlphaDAPR: An AI-based Explainable Expert Support System for Art Therapy.
Proceedings of the 28th International Conference on Intelligent User Interfaces, 2023

2022
Magic Brush: An AI-based Service for Dementia Prevention focused on Intrinsic Motivation.
Proc. ACM Hum. Comput. Interact., 2022

2021
A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods.
IEICE Trans. Inf. Syst., 2021

2020
Dynamic Analysis Tool for IoT Device.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2019
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing.
Sensors, 2019

Improvement of QR Code Access Control System Based on Lamport Hash Chain.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

2018
An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices.
Symmetry, 2018

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration.
J. Inf. Process. Syst., 2018

Management platform of threats information in IoT environment.
J. Ambient Intell. Humaniz. Comput., 2018

A Survey of Automated Root Cause Analysis of Software Vulnerability.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

2017
Taking the Edge off with Espresso: Scale, Reliability and Programmability for Global Internet Peering.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

A Study on the Service Identification of Internet-Connected Devices Using Common Platform Enumeration.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

A Study on the Management Structure of Vulnerability Information in IoT Environment.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

A Design of IoT Protocol Fuzzer.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

2016

A Study on the Classification of Common Vulnerabilities and Exposures using Naïve Bayes.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
A Study on the Detection of Abnormal Behavior and Vulnerability Analysis in BYOD.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

A system for detection of abnormal behavior in BYOD based on web usage patterns.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

2014
A Study on Context Information Collection for Personal Mobile Device Identification in BYOD and Smart Work Environment.
Proceedings of the Internet of Things. IoT Infrastructures, 2014


  Loading...