Tai-Hoon Kim

According to our database1, Tai-Hoon Kim authored at least 223 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Advanced Multiresolution Wavelet Based Wideband Spectrum Sensing Technique for Cognitive Radio.
Wireless Communications and Mobile Computing, 2018

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
Sensors, 2018

Clustering and Flow Conservation Monitoring Tool for Software Defined Networks.
Sensors, 2018

Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.
Sensors, 2018

New DoS Defense Method Based on Strong Designated Verifier Signatures.
Sensors, 2018

RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
Security and Communication Networks, 2018

Distributed One Time Password Infrastructure for Linux Environments.
Entropy, 2018

Software Defined Networks in Wireless Sensor Architectures.
Entropy, 2018

A Greedy Deep Learning Method for Medical Disease Analysis.
IEEE Access, 2018

Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication.
IEEE Access, 2018

Ransomware Automatic Data Acquisition Tool.
IEEE Access, 2018

Privacy Preserving Profile Matching Protocol for Human-Centric Social Internet of Things.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Secured Distributed IoT Based Supply Chain Architecture.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Biometric-based Per-Packet Authentication Techniques in Communication Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area Network.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

2017
BATCP: Bandwidth-Aggregation Transmission Control Protocol.
Symmetry, 2017

Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
Symmetry, 2017

A Dimensionality Reduction-Based Multi-Step Clustering Method for Robust Vessel Trajectory Analysis.
Sensors, 2017

Distributed Data Service for Data Management in Internet of Things Middleware.
Sensors, 2017

A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Sensors, 2017

Detection of Electronic Anklet Wearers' Groupings throughout Telematics Monitoring.
ISPRS Int. J. Geo-Information, 2017

Smart City and IoT.
Future Generation Comp. Syst., 2017

An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction.
Frontiers Comput. Sci., 2017

An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI.
Computer Methods and Programs in Biomedicine, 2017

Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions.
IEEE Access, 2017

Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors.
Proceedings of the SCSS 2017, 2017

Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A privacy-preserving homomorphic encryption scheme for the Internet of Things.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A new biometric-based security framework for cloud storage.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A novel adaptive streaming approach for cloud-based mobile video games.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A novel privacy technique for Augmented Reality cloud gaming based on image authentication.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Context aware middleware for RFID based pharmaceutical supply chain.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Video streaming strategy based on feedback control loop theory in cloud platform.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Adaptive risk treatment for cloud computing based on Markovian game.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Adaptive Risk Management Framework for Cloud Computing.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Disclosing user relationships in email networks.
The Journal of Supercomputing, 2016

Big data applications for healthcare: preface to special issue.
The Journal of Supercomputing, 2016

Leveraging information security and computational trust for cybersecurity.
The Journal of Supercomputing, 2016

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Sensors, 2016

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
Sensors, 2016

Image compression with optimal traversal using wavelet and percolation theories.
Proceedings of the 24th International Conference on Software, 2016

A New Authentication Scheme for Cloud-based Storage Applications.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Chaotic construction of cryptographic keys based on biometric data.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

2015
Extracting Association Patterns in Network Communications.
Sensors, 2015

Xen-based virtual honeypot system for smart device.
Multimedia Tools Appl., 2015

Solving technological isolation to build virtual learning communities.
Multimedia Tools Appl., 2015

Virtual learning communities: unsolved troubles.
Multimedia Tools Appl., 2015

Guest Editorial: Multimedia Applications for Smart device and Equipment.
Multimedia Tools Appl., 2015

A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A Novel Prototype Decision Tree Method Using Sampling Strategy.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

2014
A Layered Trust Information Security Architecture.
Sensors, 2014

Trends in high-performance computing and communications for ubiquitous computing.
Knowledge Eng. Review, 2014

PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform.
IJDSN, 2014

Ubiquitous Sensor Networks and Their Application 2013.
IJDSN, 2014

Advanced Sensor Technology and Applications in Industrial Control System 2014.
IJDSN, 2014

A Zone-Based Media Independent Information Service for IEEE 802.21 Networks.
IJDSN, 2014

GTrust: Group Extension for Trust Models in Distributed Systems.
IJDSN, 2014

Detecting bad information in mobile wireless networks based on the wireless application protocol.
Computing, 2014

Editorial to special issue: computer and network applications for ubiquitous computing.
Computing, 2014

E-D2HCP: enhanced distributed dynamic host configuration protocol.
Computing, 2014

Automatic image annotation approach based on optimization of classes scores.
Computing, 2014

Adaptive routing protocol for mobile ad hoc networks.
Computing, 2014

SOA Modeling Based on MDA.
Proceedings of the Distributed Computing and Artificial Intelligence, 2014

2013
Development of a virtualized supercomputing environment for genomic analysis.
The Journal of Supercomputing, 2013

Toward designing a secure biosurveillance cloud.
The Journal of Supercomputing, 2013

Editorial of special section on multimedia applications and ubiquitous computing.
The Journal of Supercomputing, 2013

Gait recognition using description of shape synthesized by planar homography.
The Journal of Supercomputing, 2013

A GA based audio steganography with enhanced security.
Telecommunication Systems, 2013

Cell-graph coloring for cancerous tissue modelling and classification.
Multimedia Tools Appl., 2013

Advanced Sensor Technology and Applications in Industrial Control System.
IJDSN, 2013

Extensions to ciphertext-policy attribute-based encryption to support distributed environments.
IJCAT, 2013

2012
Mobile one-time passwords: two-factor authentication using mobile phones.
Security and Communication Networks, 2012

Breast cancer MRI diagnosis approach using support vector machine and pulse coupled neural networks.
J. Applied Logic, 2012

Security Issues in Mobile Ad Hoc Networks.
IJDSN, 2012

Ubiquitous Sensor Networks and Its Application.
IJDSN, 2012

Design of an Effective WSN-Based Interactive u-Learning Model.
IJDSN, 2012

A Dynamic Traffic-Aware Duty Cycle Adjustment MAC Protocol for Energy Conserving in Wireless Sensor Networks.
IJDSN, 2012

Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
IJDSN, 2012

Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
IJDSN, 2012

Vehicle-to-grid communication system for electric vehicle charging.
Integrated Computer-Aided Engineering, 2012

Introduction.
Integrated Computer-Aided Engineering, 2012

Evolvable hardware design based on a novel simulated annealing in an embedded system.
Concurrency and Computation: Practice and Experience, 2012

A study on dynamic state information (DSI) around users for safe urban life.
Computers & Mathematics with Applications, 2012

Web Services in Multimedia Communication.
Adv. in MM, 2012

Developing Casual Learning Games Using the Apache Pivot IIA Capabilities.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Opinion mining over twitterspace: Classifying tweets programmatically using the R approach.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Mining twitterspace for information: Classifying sentiments programmatically using Java.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

A Gaussian Mixture Models Approach to Human Heart Signal Verification Using Different Feature Extraction Algorithms.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

Using Particle Swarm Optimization for Image Regions Annotation.
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012

Automated Classification of Galaxies Using Invariant Moments.
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012

Expert System Based on Neural-Fuzzy Rules for Thyroid Diseases Diagnosis.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

2011
Special issue on "Theory and practice of high-performance computing, communications, and security".
The Journal of Supercomputing, 2011

SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors.
Sensors, 2011

A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays.
Sensors, 2011

Special issue on security and privacy in wireless systems.
Security and Communication Networks, 2011

Supervised chromosome clustering and image classification.
Future Generation Comp. Syst., 2011

Special Section: Future Generation Information Technology.
Future Generation Comp. Syst., 2011

Recommendation Algorithm of the App Store by Using Semantic Relations between Apps.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Image Data Hiding Technique Using Discrete Fourier Transformation.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Brain Tumor Detection Using MRI Image Analysis.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Similarity Checking of Handwritten Signature Using Binary Dotplot Analysis.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Application Program Interface as Back-Up Data Source for SCADA Systems.
Proceedings of the Information Security and Assurance - International Conference, 2011

Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System.
Proceedings of the Information Security and Assurance - International Conference, 2011

Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Machine Learning-Based Soccer Video Summarization System.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Heart Sound Feature Reduction Approach for Improving the Heart Valve Diseases Identification.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Grid of Learning Resources in E-learning Communities.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Context Based Speech Analysis of Bengali Language as a Part of TTS Conversion.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification.
Proceedings of the Security Technology, 2011

Intelligent Hybrid Anomaly Network Intrusion Detection System.
Proceedings of the Communication and Networking, 2011

New Algorithm for Skewing Detection of Handwritten Bangla Words.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Use of Artificial Neural Network in Bengali Character Recognition.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Watermarking Using Multiresolution Cosine Transformation: A Review.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Leaf Image Analysis towards Plant Identification.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

A Fast and Secure One-Way Hash Function.
Proceedings of the Security Technology, 2011

Mathematical Model and Analysis of Reliability and Safety of Large Database Systems.
Proceedings of the Database Theory and Application, Bio-Science and Bio-Technology, 2011

A Model of Hierarchically Consistent Control of Nonlinear Dynamical Systems.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

Service Quality Assessment in Provision of Library Services.
Proceedings of the U- and E-Service, Science and Technology, 2011

Online Learning Environment: Taxonomy of Asynchronous Online Discussion Forums.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

Engaging and Effective Asynchronous Online Discussion Forums.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

A rough k-means fragile watermarking approach for image authentication.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

2010
Sensor Based Framework for Secure Multimedia Communication in VANET.
Sensors, 2010

A Bankruptcy Problem Approach to Load-shedding in Multiagent-based Microgrid Operation.
Sensors, 2010

Performance Analysis of Receive Diversity in Wireless Sensor Networks over GBSBE Models.
Sensors, 2010

A Comparative Study of Wireless Sensor Networks and Their Routing Protocols.
Sensors, 2010

Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach.
J. Intelligent Manufacturing, 2010

Editorial.
J. Intelligent Manufacturing, 2010

A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper).
JCM, 2010

A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition.
Comput. J., 2010

Review: Security in Wireless Technologies in Business.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

Emerging Approach of Natural Language Processing in Opinion Mining: A Review.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

A New Experiment on Bengali Character Recognition.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

Agent Based Approach to Regression Testing.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Pattern Recognition Using Artificial Neural Network: A Review.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Biometric Authentication Using Infrared Imaging of Hand Vein Patterns.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Lane Design for Speed Optimization.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Directed Graph Pattern Synthesis in LSB Technique on Video Steganography.
Proceedings of the Advances in Computer Science and Information Technology, 2010

IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

USABAGILE_Web: A Web Agile Usability Approach for Web Site Design.
Proceedings of the Computational Science and Its Applications, 2010

Hierarchical Data Structures for Accessing Spatial Data.
Proceedings of the Signal Processing and Multimedia, 2010

OSI Layer Wise Security Analysis of Wireless Sensor Network.
Proceedings of the Signal Processing and Multimedia, 2010

Internet SCADA Utilizing API's as Data Source.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Security Encryption Scheme for Communication of Web Based Control Systems.
Proceedings of the Signal Processing and Multimedia, 2010

Communication Security for Control Systems in Smart Grid.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Identification of Plant Using Leaf Image Analysis.
Proceedings of the Signal Processing and Multimedia, 2010

Business Planning in the Light of Neuro-fuzzy and Predictive Forecasting.
Proceedings of the Signal Processing and Multimedia, 2010

Using Incentives to Reduce Active Network Privacy Threats and Vulnerabilities.
Proceedings of the Signal Processing and Multimedia, 2010

Insecure Information System's Solution Using Isolation Method.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

An Automated Approach to Testing Polymorphic Features Using Object-Z.
Proceedings of the Advances in Software Engineering, 2010

ISARE: An Integrated Software Architecture Reuse and Evaluation Framework.
Proceedings of the Advances in Software Engineering, 2010

Performance Analysis of Cyber Security Awareness Delivery Methods.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

2009
Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments.
Wireless Personal Communications, 2009

On modeling and evaluating multicomputer transcoding architectures for live-video streams.
Multimedia Tools Appl., 2009

Intelligent Environments and Services.
J. UCS, 2009

Vascular Pattern Analysis towards Pervasive Palm Vein Authentication.
J. UCS, 2009

Secure ubiquitous connectivity in hybrid multipath wireless ad hoc network.
Int. J. Communication Systems, 2009

Dynamic power management in new architecture of wireless sensor networks.
Int. J. Communication Systems, 2009

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation.
IJCNS, 2009

Special section: Grid/distributed computing systems security.
Future Generation Comp. Syst., 2009

SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009

Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile.
Comput. J., 2009

Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management.
Proceedings of the Communication and Networking, 2009

Grayscale Image Classification Using Supervised Chromosome Clustering.
Proceedings of the Security Technology, 2009

Analysis of Handwritten Signature Image.
Proceedings of the Security Technology, 2009

Effective GIS Mobile Query System.
Proceedings of the Future Generation Information Technology, 2009

Refine Crude Corpus for Opinion Mining.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme.
Proceedings of the First International Conference on Computational Intelligence, 2009

Research on Critical Infrastructures and Critical Information Infrastructures.
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009

Crossed Crypto-Scheme in WPA PSK Mode.
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009

Discrete Fourier Transformation based Image Authentication technique.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2008
U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home.
The Journal of Supercomputing, 2008

Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS.
Computer Communications, 2008

A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Channel assignment and scheduling in multichannel wireless sensor networks.
Proceedings of the LCN 2008, 2008

An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control Systems.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Prioritized Service Protocol for Vehicular Communication.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Novel Approach for Infrastructure Deployment for VANET.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Towards Automated Traffic System Using Vehicular Network with Directional Antenna.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

2007
Induction and Implementation of Security Requirements in Each System Block.
Proceedings of the Advances in Multimedia Modeling, 2007

A Study on Digital Media Security by Hopfield Neural Network.
Proceedings of the Advances in Neural Networks, 2007

Security Evaluation for Information Assurance.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

Hybrid Tag Anti-collision Algorithms in RFID Systems.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007

A Survey of System Software for Wireless Sensor Networks.
Proceedings of the Future Generation Communication and Networking, 2007

Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264.
Proceedings of the Future Generation Communication and Networking, 2007

Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Block Model Application for Decision Support Systems.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

Flexible Key Distribution for SCADA Network using Multi-Agent System.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

2006
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Intelligent Method for Building Security Countermeasures.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Security Requirements for Ubiquitous Software Development Site.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment.
Proceedings of the Intelligent Computing, 2006

A Vulnerability Assessment Tool Based on OVAL in System Block Model.
Proceedings of the Intelligent Computing, 2006

A Study on the Improvement of Military Logistics System Using RFID.
Proceedings of the Intelligent Computing, 2006

Analysis of Security Session Reusing in Distribution Server System.
Proceedings of the Computational Science and Its Applications, 2006

2005
Towards New Areas of Security Engineering.
Proceedings of the Rough Sets, 2005

A Relationship Between Products Evaluation and IT Systems Assurance.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System.
Proceedings of the Advances in Intelligent Computing, 2005

Security Evaluation Targets for Enhancement of IT Systems Assurance.
Proceedings of the Computational Science and Its Applications, 2005

Design Procedure of IT Systems Security Countermeasures.
Proceedings of the Computational Science and Its Applications, 2005

Distribution Data Security System Based on Web Based Active Database.
Proceedings of the Computational Science and Its Applications, 2005

Distribution Data Security System Based on Web Based Active Database.
Proceedings of the Computational Science and Its Applications, 2005

Interference-Free ZCD-UWB for Wireless Home Network Applications.
Proceedings of the Computational Science and Its Applications, 2005

2004
Threat Description for Developing Security Countermeasure.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Applying Security Engineering to Build Security Countermeasures: An Introduction.
Proceedings of the Applied Parallel Computing, 2004

Development Site Security Process of ISO/IEC TR 15504.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Security Requirements for Software Development.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504.
Proceedings of the Computational Science and Its Applications, 2004

Reduction Method of Threat Phrases by Classifying Assets.
Proceedings of the Computational Science and Its Applications, 2004

A Relationship between Security Engineering and Security Evaluation.
Proceedings of the Computational Science and Its Applications, 2004

Design on Mobile Secure Electronic Transaction Protocol with Component Based Development.
Proceedings of the Computational Science and Its Applications, 2004

2003
A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003

ECSSL Protocol Based on 3B Algorithm.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003

Reliability Assurance in Development Process for TOE on the Common Criteria.
Proceedings of the Software Engineering Research and Applications, 2003

Supplement of Security-Related Parts of ISO/IEC TR 15504.
Proceedings of the Computer and Information Sciences, 2003

SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC.
Proceedings of the Computer and Information Sciences, 2003

Threat Description for the PP by Using the Concept of the Assets Protected by TOE.
Proceedings of the Computational Science - ICCS 2003, 2003


  Loading...