Yongmin Kim

Orcid: 0000-0002-1029-8096

Affiliations:
  • Chonnam National University, Division of Culture Contents, Yeosu, Korea


According to our database1, Yongmin Kim authored at least 16 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Automated Link Tracing for Classification of Malicious Websites in Malware Distribution Networks.
J. Inf. Process. Syst., 2019

2018
A performance analysis of user's intention classification from EEG signal by a computational intelligence in BCI.
Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, 2018

2017
An energy-efficient compression scheme for wireless multimedia sensor networks.
Multim. Tools Appl., 2017

Positioning sensor nodes and smart devices for multimedia data transmission in wireless sensor and mobile P2P networks.
Multim. Tools Appl., 2017

An Improved Location Estimation with Modular Neural Fuzzy Approach using Received Signal Strength in Wireless Sensor Networks.
Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, 2017

2016
An efficient multi-task PaaS cloud infrastructure based on docker and AWS ECS for application deployment.
Clust. Comput., 2016

Cost-effective multicast routings in wireless mesh networks with multiple gateways.
Clust. Comput., 2016

2008
An Automatic Identification of a Damaged Malicious File Using HMM against Anti-Forensics.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Modeling of Network Intrusions Based on the Multiple Transition Probability.
Proceedings of the Advances in Information and Computer Security, 2006

Network Anomaly Detection Based on Clustering of Sequence Patterns.
Proceedings of the Computational Science and Its Applications, 2006

Network Intrusion Detection Using Statistical Probability Distribution.
Proceedings of the Computational Science and Its Applications, 2006

An Efficient Similarity Measure for Clustering of Categorical Sequences.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

2005
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network.
Proceedings of the Information Networking, 2004

A New Authorization Model for Workflow Management System Using the RPI-RBAC Model.
Proceedings of the Computational Science, 2004


  Loading...