Yoohwan Kim

Orcid: 0000-0002-7321-9527

According to our database1, Yoohwan Kim authored at least 91 papers between 1996 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Secure Access Service Edge: A Zero Trust Based Framework For Accessing Data Securely.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Evil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious Purposes.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

MPTCP Performance Simulation in Multiple LEO Satellite Environment.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

A Survey on Mobile Malware Detection Methods using Machine Learning.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

DER Communication Networks and Their Security Issues.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

An Overview on Detection and Prevention of Application Layer DDoS Attacks.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

BBR Congestion Control Analysis with Multipath TCP (MPTCP) and Asymmetrical Latency Subflow.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Bountychain: Toward Decentralizing a Bug Bounty Program with Blockchain and IPFS.
Int. J. Networked Distributed Comput., 2021

A Survey on Securing IoT Ecosystems and Adaptive Network Vision.
Int. J. Networked Distributed Comput., 2021

A Secure Communication Method for CANBus.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

A Survey on Security Attacks and Solutions in the IoT Network.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

A Divide and Conquer method with Semi-Global Failover for Software Defined Networks.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

CoviReader: Using IOTA and QR Code Technology to Control Epidemic Diseases across the US.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

Security and Privacy Issues with Virtual Private Voice Assistants.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

Survey of the Development of Quantum Cryptography and Its Applications.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

Performance and Cost Analysis of Sia, a Blockchain-Based Storage Platform.
Proceedings of the 6th IEEE/ACIS International Conference on Big Data, 2021

2020
Advanced Self-heating Model and Methodology for Layout Proximity Effect in FinFET Technology.
Proceedings of the 2020 IEEE International Reliability Physics Symposium, 2020

Proportional Fair Secondary Receiver Selection Algorithm for Full-duplex WLAN.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Secure IoT Data Management in a Private Ethereum Blockchain.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

A Framework for Decentralized Private Random State Generation and Maintenance for Multiplayer Gaming Over Blockchain.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Decentralized Security Bounty Management on Blockchain and IPFS.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
Hadoop Performance Analysis Model with Deep Data Locality.
Inf., 2019

Understanding the Effects of TCP Tunneling on Approaching High Performance HAIPE-Encrypted Satellite Communication Systems.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Aging-Aware Design Verification Methods Under Real Product Operating Conditions.
Proceedings of the IEEE International Reliability Physics Symposium, 2019

AutoEncoded Domains with Mean Activation for DGA Botnet Detection.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Implementation of a Blockchain-Based Event Reselling System.
Proceedings of the 6th International Conference on Computational Science/Intelligence and Applied Informatics, 2019

UAS-based object tracking via Deep Learning.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Survey of Data Locality in Apache Hadoop.
Proceedings of the 2019 IEEE International Conference on Big Data, 2019

2018
Investigation of BTI characteristics and its behavior on 10 nm SRAM with high-k/metal gate FinFET technology having multi-V<sub>T</sub> gate stack.
Microelectron. Reliab., 2018

Dynamically Adjusting the Mining Capacity in Cryptocurrency with Binary Blockchain.
Int. J. Networked Distributed Comput., 2018

Gaussian Highpass Filters-based Convolutional Neural Network for Pulmonary Nodules Detection in CT Images.
Proceedings of the ISICDM 2018: The 2nd International Symposium on Image Computing and Digital Medicine 2018, 2018

Level Set Framework of Multi Labels Fusion for Multiple Sclerosis Lesion Segmentation.
Proceedings of the ISICDM 2018: The 2nd International Symposium on Image Computing and Digital Medicine 2018, 2018

Automatic Rib Detection and Segmentation Based on Spatial Distance Constraints Particle Filter Method.
Proceedings of the 2018 International Conference on Image and Graphics Processing, 2018

TCP-GEN Framework to Achieve High Performance for HAIPE-Encrypted TCP Traffic in a Satellite Communication Environment.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Key based Deep Data Locality on Hadoop.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

A survey on IoT communication and computation frameworks: An industrial perspective.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

Implementation and Comparison of M2M Protocols for Internet of Things.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

2016
Big Data Analysis with Hadoop on Personalized Incentive Model with Statistical Hotel Customer Data.
Int. J. Softw. Innov., 2016

Vulnerability Analysis of Iframe Attacks on Websites.
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, 2016

Vertebrae Detection Algorithm in CT Scout Images.
Proceedings of the Advances in Image and Graphics Technologies - 11th Chinese Conference, 2016

Performance Improvement of MapReduce Process by Promoting Deep Data Locality.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

Text mining for security threat detection discovering hidden information in unstructured log messages.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Restful Web Service and Web-Based Data Visualization for Environmental Monitoring.
Int. J. Softw. Innov., 2015

Healthcare Privacy: How Secure Are the VOIP/Video-Conferencing Tools for PHI Data?
Proceedings of the 12th International Conference on Information Technology, 2015

Design of Low-Cost On-board Auto-tracking Antenna for Small UAS.
Proceedings of the 12th International Conference on Information Technology, 2015

Safeguarding Web Surfing with URL Blacklisting.
Proceedings of the 12th International Conference on Information Technology, 2015

Systematical study of 14nm FinFET reliability: From device level stress to product HTOL.
Proceedings of the IEEE International Reliability Physics Symposium, 2015

Method for secure RESTful web service.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

Utilizing NFC to secure identification.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
Performance testing of web-based data visualization.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Mindmetrics: Identifying users without their login IDs.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Application of NTRU Cryptographic Algorithm for SCADA Security.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Effective SBML Protocol for Tolerating Concurrent Failures Based on Broadcast Networks.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

A Framework for Environmental Monitoring with Arduino-Based Sensors Using Restful Web Service.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
New power saving algorithm considering associated STAs and consecutive traffics in WLAN AP.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

2012
Preface to KOCSEA Special Issue.
J. Comput. Sci. Eng., 2012

The energy saving strategy using the network coding in the wireless mesh network.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
A Secure Credit Card Transaction Method Based on Kerberos.
J. Comput. Sci. Eng., 2011

Anomaly detection in multiple scale for insider threat analysis.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

SignatureCheck: a protocol to detect man-in-the-middle attack in SSL.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Coverage And Connectivity Problems Under Border Effects In Wireless Sensor Networks.
Intell. Autom. Soft Comput., 2010

2009
EECCR: An Energy-Efficient -Coverage and -Connectivity Routing Algorithm Under Border Effects in Heterogeneous Sensor Networks.
IEEE Trans. Veh. Technol., 2009

HTSMA: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme in Heterogeneous Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Energy Efficient Non-uniform Clustering Division Scheme in Wireless Sensor Networks.
Wirel. Pers. Commun., 2008

Baseline Profile Stability for Network Anomaly Detection.
Int. J. Netw. Secur., 2008

ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks.
Comput. Commun., 2008

EEMC: An energy-efficient multi-level clustering algorithm for large-scale wireless sensor networks.
Comput. Networks, 2008

EECCP: an energy-efficient coverage- and connectivity preserving algorithm under border effects in wireless sensor networks.
Proceedings of the Wireless Telecommunications Symposium, 2008

2007
IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Performance Analysis of Error Control Codes for Wireless Sensor Networks.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography.
Proceedings of IEEE International Conference on Communications, 2007

An Improved Multi-Layered Architecture and its Rotational Scheme for Large-Scale Wireless Sensor Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks.
IEEE Trans. Dependable Secur. Comput., 2006

An Efficient Defense against Distributed Denial-of-Service Attacks using Congestion Path Marking.
Proceedings of IEEE International Conference on Communications, 2006

2005
A hybrid evolutionary analogue module placement algorithm for integrated circuit layout designs.
Int. J. Circuit Theory Appl., 2005

Macro-cell placement for analog physical designs using a hybrid genetic algorithm with simulated annealing.
Integr. Comput. Aided Eng., 2005

Coordinated Robust Routing by Dual Cluster Heads in Layered Wireless Sensor Networks.
Proceedings of the 8th International Symposium on Parallel Architectures, 2005

2004
Hash-based Internet Traffic Load Balancing.
Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004

PacketScore: Statistical-based overload control against Distributed Denial-of-Service Attacks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Transient performance of PacketScore for blocking DDoS attacks.
Proceedings of IEEE International Conference on Communications, 2004

2003
High-speed router filter for blocking TCP flooding under DDoS attack.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Performance of exhaustive matching for input-queued switches.
Proceedings of IEEE International Conference on Communications, 2003

Defeating distributed denial-of-service attack with deterministic bit marking.
Proceedings of the Global Telecommunications Conference, 2003

2000
Design lessons for building agile manufacturing systems.
IEEE Trans. Robotics Autom., 2000

1997
Advances in agile manufacturing.
Proceedings of the 1997 IEEE International Conference on Robotics and Automation, 1997

A flexible software architecture for agile manufacturing.
Proceedings of the 1997 IEEE International Conference on Robotics and Automation, 1997

Virtual testing of agile manufacturing software using 3D graphical simulation.
Proceedings of the 1997 IEEE International Conference on Robotics and Automation, 1997

A New Role of Graphical Simulation: Software Testing.
Proceedings of the Proceedings 30st Annual Simulation Symposium (SS '97), April 7-9, 1997, 1997

1996
Design of an agile manufacturing workcell for light mechanical applications.
Proceedings of the 1996 IEEE International Conference on Robotics and Automation, 1996


  Loading...