Tai-Myung Chung

According to our database1, Tai-Myung Chung
  • authored at least 116 papers between 2000 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Design and Performance Analysis of Sensor Proxy-AAA Authentication Scheme Based on Fast Handover and Forwarding Mode for IP-based Internet of Things.
ICST Trans. Mobile Communications Applications, 2017

Leveraging Software-Defined Wireless Network (SDWN) by Locator/Identifier Split Scheme for Mobility Management.
JCM, 2017

Design of the Central LISP Management System for the Software-Defined Wireless Network (SDWN).
Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, 2017

2016
Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call.
IEICE Transactions, 2016

2015
Dynamic binary analyzer for scanning vulnerabilities with taint analysis.
Multimedia Tools Appl., 2015

Study on sensitive information leakage vulnerability modeling.
Kybernetes, 2015

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology.
TIIS, 2015

HARMS-based Service Discovery Protocol using Address-DNS.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

2014
Dangerous Wi-Fi access point: attacks to benign smartphone applications.
Personal and Ubiquitous Computing, 2014

Eliminating Duplicated Paths to Reduce Computational Cost of Rule Generation by Using SDN.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

The Multi-level Security for the Android OS.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

A Study of Reducing Resource Waste for Mobile Grid with Software Defined Network.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

2013
Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols.
IEEE Trans. Industrial Electronics, 2013

Applying Different Cryptographic Algorithms for Mobile Cloud Computing.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

The Methodology for Hardening SCADA Security Using Countermeasure Ordering.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Attribute Relationship Evaluation Methodology for Big Data Security.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

The Permission-Based Malicious Behaviors Monitoring Model for the Android OS.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Implementation of Enhanced Android SPICE Protocol for Mobile Cloud.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2012
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Network-based Executable File Extraction and Analysis for Malware Detection.
Proceedings of the SECRYPT 2012, 2012

The clusterhead chaining scheme considering scalability of the wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

The Architecture of User-End Client for Mobile Clout Service.
Proceedings of the Convergence and Hybrid Information Technology, 2012

Jump Oriented Programming on Windows Platform (on the x86).
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

A study on optimization of security function for reducing vulnerabilities in SCADA.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Cyber military strategy for cyberspace superiority in cyber warfare.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance.
Wireless Communications and Mobile Computing, 2011

Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure.
IEEE Trans. Vehicular Technology, 2011

An Efficient Hash-Based Load Balancing Scheme to Support Parallel NIDS.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

A Survey on Privacy Problems and Solutions for VANET Based on Network Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
Cost analysis of IP mobility management protocols for consumer mobile devices.
IEEE Trans. Consumer Electronics, 2010

Using Correspondent Information for Route Optimization Scheme on Proxy Mobile IPv6.
JNW, 2010

Adaptive Authentication And Registration Key Management Scheme Based On AAA Architecture.
Intelligent Automation & Soft Computing, 2010

How much do we gain by introducing route optimization in Proxy Mobile IPv6 networks?
Annales des Télécommunications, 2010

A study new challenge for billing system in converged service platform.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

A Light-Weighted Misused Key Detection in Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2010

SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs.
Proceedings of the Computational Science and Its Applications, 2010

2009
Route Optimization in Nested NEMO: Classification, Evaluation, and Analysis from NEMO Fringe Stub Perspective.
IEEE Trans. Mob. Comput., 2009

A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Telecommunication Systems, 2009

Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments.
Comput. J., 2009

A Study on Access Control Model for Context-Aware Workflow.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

The Bias Routing Tree Avoiding Technique for Hierarchical Routing Protocol over 6LoWPAN.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Secure Fast Handover Scheme of Proxy Mobile IPv6.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Enhanced Light Weight Route Optimization in Proxy Mobile IPv6.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2009

Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment.
Proceedings of the Computational Science and Its Applications, 2009

A Performance Analysis on Route Optimization for Proxy Mobile IPv6.
Proceedings of IEEE International Conference on Communications, 2009

Eperfi: Design and Implementation of End-to-End Network Performance Measurement and Diagnosis System for High-Speed Networks.
Proceedings of the Communication and Networking, 2009

Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
A comparative signaling cost analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Hybrid PMIPv6 indication mechanism for interaction between MIPv6 and PMIPv6.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Performance Analysis of Route Optimization on Proxy Mobile IPv6.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

PMIPv6 Route Optimization Mechanism Using the Routing Table of MAG.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

DTPD: Data Transfer Tool Performance Diagnosis System in High Speed Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Group Key Locking Scheme in Mobile Multicast Environments with Modified MLDs.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMM.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Performance evaluation of distributed multiple home agents with HAHA protocol.
Int. Journal of Network Management, 2007

A Novel Inter-LMD Handoff Mechanism for Network-Based Localized Mobility Management.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

The Concentric-Cluster Routing Scheme Adapted to Large-scale Sensor Networks.
Proceedings of the MoMM'2007, 2007

Local Authentication Scheme Based on AAA in Mobile IPv6 Networks.
Proceedings of the Advances in Multimedia Modeling, 2007

PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Design and Implementation of Context-Aware Security Management System for Ubiquitous Computing Environment.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

MANET ID : Improvement on Group Communications and ZRP.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

A Scheme to reduce the handoff latency using mSCTP in Fast Mobile IPv6.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

An Adaptive Inter-Mobility Supports Scheme for NetLMM.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

An Optimal Access Points Allocation Scheme Based on Genetic Algorithm.
Proceedings of the Future Generation Communication and Networking, 2007

Context-Aware Security Management System for Pervasive Computing Environment.
Proceedings of the Modeling and Using Context, 2007

Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment.
Proceedings of the Managing Next Generation Networks and Services, 2007

Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
PKG-MIB: Design and Implementation of Private-mib for Package-based Linux Systems.
JCIT, 2006

An Empirical Study of Quality and Cost Based Security Engineering.
Proceedings of the Information Security Practice and Experience, 2006

Session Key Forwarding Scheme Based on AAA Architecture in Wireless Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Modeling Active Cyber Attack for Network Vulnerability Assessment.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments.
Proceedings of the Information Networking, 2006

An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment.
Proceedings of the Computational Science and Its Applications, 2006

Comparative Analysis of IPv6 VPN Transition in NEMO Environments.
Proceedings of the Computational Science and Its Applications, 2006

An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network.
Proceedings of the Computational Science and Its Applications, 2006

A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems.
Proceedings of the Computational Science and Its Applications, 2006

Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management.
Proceedings of the Computational Science and Its Applications, 2006

Context-Role Based Access Control for Context-Aware Application.
Proceedings of the High Performance Computing and Communications, 2006

2005
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label.
The Journal of Supercomputing, 2005

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation.
JIPS, 2005

A Model and Evaluation of Route Optimization in Nested NEMO Environment.
IEICE Transactions, 2005

Adaptive Bandwidth Control Using Fuzzy Inference in Policy-Based Network Management.
Proceedings of the Information Networking, 2005

Policy Based Handoff in MIPv6 Networks.
Proceedings of the Computational Science and Its Applications, 2005

New Binding Update Method using GDMHA in Hierarchical Mobile IPv6.
Proceedings of the Computational Science and Its Applications, 2005

An Analysis and Evaluation of Policy-Based Network Management Approaches.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Distributing Multiple Home Agents in MIPv6 Networks.
Proceedings of the High Performance Computing and Communications, 2005

2004
Active security management based on Secure Zone Cooperation.
Future Generation Comp. Syst., 2004

Service Negotiation Model for Response Time in Distributed Networks.
Computers and Artificial Intelligence, 2004

SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks.
Proceedings of the Information Networking, 2004

A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments.
Proceedings of the Computational Science and Its Applications, 2004

A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments.
Proceedings of the Computational Science and Its Applications, 2004

Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain.
Proceedings of the Computational Science and Its Applications, 2004

A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models.
Proceedings of the Computational Science and Its Applications, 2004

The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations.
Proceedings of the Computational Science and Its Applications, 2004

Specifying Policies for Service Negotiations of Response Time.
Proceedings of the Computational Science, 2004

2003
A Policy Propagation Model Using Mobile Agents in Large-Scale Distributed Network Environments.
Proceedings of the Service-Oriented Computing, 2003

Design of Secure Monitor in the Secure Zone Cooperation.
Proceedings of the Computational Science and Its Applications, 2003

The Design of XML-Based Internet Security Integrated System Architecture.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
Design of Network Security Control System for Cooperative Intrusion Detection.
Proceedings of the Information Networking, 2002

Interval Weighted Load Balancing Method for Multiple Application Gateway Firewalls.
Proceedings of the Computational Science - ICCS 2002, 2002

Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

2001
Generation of pseudo random processes with given marginal distribution and autocorrelation function.
Int. J. Comput. Math., 2001

Efficient Random Process Generation for Reliable Simulation of Complex Systems.
Proceedings of the Computational Science - ICCS 2001, 2001

2000
Policy-based hybrid management architecture for IP-based VPN.
Proceedings of the Networked Planet: Management Beyond 2000, 2000


  Loading...