Jong Hyuk Park
#123,014
Most Influential Person Now
Researcher
Jong Hyuk Park's AcademicInfluence.com Rankings
Jong Hyuk Parkcomputer-science Degrees
Computer Science
#5029
World Rank
#5314
Historical Rank
Data Science
#74
World Rank
#76
Historical Rank
Computational Linguistics
#605
World Rank
#617
Historical Rank
Machine Learning
#1182
World Rank
#1202
Historical Rank

Download Badge
Computer Science
Jong Hyuk Park's Degrees
- PhD Computer Science Seoul National University
- Masters Computer Science Seoul National University
- Bachelors Computer Science Seoul National University
Similar Degrees You Can Earn
Why Is Jong Hyuk Park Influential?
(Suggest an Edit or Addition)Jong Hyuk Park's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT (2018) (487)
- A survey on cloud computing security: Issues, threats, and solutions (2016) (354)
- Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City (2017) (323)
- DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks (2017) (306)
- Blockchain based hybrid network architecture for the smart city (2018) (255)
- Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions (2017) (232)
- BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence (2020) (226)
- Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions (2017) (204)
- Semi-supervised learning based distributed attack detection framework for IoT (2018) (186)
- Social network security: Issues, challenges, threats, and solutions (2017) (166)
- An improved ant colony optimization-based approach with mobile sink for wireless sensor networks (2018) (163)
- Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks (2017) (157)
- BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network (2019) (143)
- Blockchain-Based Distributed Framework for Automotive Industry in a Smart City (2019) (127)
- Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities (2018) (112)
- An enhanced security framework for home appliances in smart home (2017) (111)
- Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data (2016) (106)
- A deep learning-based IoT-oriented infrastructure for secure smart City (2020) (97)
- DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks (2017) (96)
- A genetic algorithm for energy-efficient based multicast routing on MANETs (2008) (95)
- Robust one-time password authentication scheme using smart card for home network environment (2011) (91)
- Using Multi-Modal Semantic Association Rules to fuse keywords and visual features automatically for Web image retrieval (2011) (88)
- Distributed denial of service attacks and its defenses in IoT: a survey (2019) (83)
- Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors (2010) (83)
- ALCA: agent learning–based clustering algorithm in vehicular ad hoc networks (2013) (83)
- Dynamic power management in new architecture of wireless sensor networks (2009) (78)
- Intelligent model design of cluster supply chain with horizontal cooperation (2012) (77)
- A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions (2019) (72)
- Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments (2010) (71)
- Connectivity and coverage maintenance in wireless sensor networks (2010) (70)
- User authentication schemes with pseudonymity for ubiquitous sensor network in NGN (2010) (68)
- XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs (2017) (63)
- SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook (2017) (61)
- Energy efficient virtual MIMO communication for wireless sensor networks (2009) (60)
- Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment (2010) (58)
- A blockchain-based decentralized efficient investigation framework for IoT digital forensics (2019) (58)
- Privacy-preserving max/min query in two-tiered wireless sensor networks (2013) (58)
- Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model (2020) (57)
- A Lightweight Hash-Based Blockchain Architecture for Industrial IoT (2019) (57)
- Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks (2007) (56)
- Mobile cloud computing framework for a pervasive and ubiquitous environment (2013) (53)
- BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT Network (2019) (53)
- Adaptive data rate control in low power wide area networks for long range IoT services (2017) (53)
- Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography (2019) (52)
- CloudRPS: a cloud analysis based enhanced ransomware prevention system (2017) (51)
- S-Detector: an enhanced security model for detecting Smishing attack for mobile computing (2017) (50)
- Spatial Network RNN Queries in GIS (2011) (50)
- DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network (2018) (50)
- Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers (2006) (49)
- An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring (2010) (49)
- Hybrid security protocol for wireless body area networks (2011) (48)
- Intelligent video surveillance system: 3-tier context-aware surveillance system with metadata (2012) (48)
- Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data (2011) (48)
- Blockchain Technology Toward Green IoT: Opportunities and Challenges (2020) (46)
- Future Information Technology (2011) (46)
- DoS attacks exploiting signaling in UMTS and IMS (2011) (44)
- iMuseum: A scalable context-aware intelligent museum system (2008) (43)
- SoftEdgeNet: SDN Based Energy-Efficient Distributed Network Architecture for Edge Computing (2018) (42)
- Block5GIntell: Blockchain for AI-Enabled 5G Networks (2020) (42)
- k-Cliques mining in dynamic social networks based on triadic formal concept analysis (2016) (40)
- EH-HL: Effective Communication Model by Integrated EH-WSN and Hybrid LiFi/WiFi for IoT (2018) (39)
- Adaptive Body Posture Analysis Using Collaborative Multi-Sensors for Elderly Falling Detection (2010) (38)
- Blockchain and federated learning-based distributed computing defence framework for sustainable society (2020) (37)
- An efficient authentication system of smart device using multi factors in mobile cloud service architecture (2015) (36)
- A Comprehensive Analyses of Intrusion Detection System for IoT Environment (2020) (36)
- Ubiquitous Information Technologies and Applications (2013) (36)
- Future Information Technology, Application, and Service (2012) (36)
- FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing (2016) (35)
- DFA-AD: a distributed framework architecture for the detection of advanced persistent threats (2017) (34)
- The QoS-based MCDM system for SaaS ERP applications with Social Network (2013) (34)
- Privacy and fair information practices in ubiquitous environments: Research challenges and future directions (2009) (34)
- Runtime Verification in Distributed Computing (2011) (34)
- Blockchain-empowered cloud architecture based on secret sharing for smart city (2021) (33)
- A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing (2018) (33)
- Exploring the relationship between cognitive effort exertion and regret in online vs. offline shopping (2015) (33)
- A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions (2018) (33)
- Waiting Time Minimized Charging and Discharging Strategy Based on Mobile Edge Computing Supported by Software-Defined Network (2020) (32)
- Large-scale clinical validation of biomarkers for pancreatic cancer using a mass spectrometry-based proteomics approach (2017) (32)
- Machine Learning-Based Network Sub-Slicing Framework in a Sustainable 5G Environment (2020) (32)
- A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems (2021) (29)
- Real-time smartphone sensing and recommendations towards context-awareness shopping (2015) (29)
- Packet Scheduling with QoS and Fairness for Downlink Traffic in WiMAX Networks (2011) (29)
- Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks (2019) (28)
- An Efficient Localization Scheme with Ring Overlapping by Utilizing Mobile Anchors in Wireless Sensor Networks (2010) (28)
- MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats (2014) (27)
- Design and implementation of a framework for building distributed smart object systems (2010) (27)
- Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications (2009) (27)
- Alleviating reader collision problem in mobile RFID networks (2009) (27)
- Security Considerations for Smart Phone Smishing Attacks (2014) (26)
- SHSec: SDN based Secure Smart Home Network Architecture for Internet of Things (2018) (26)
- Personlized English reading sequencing based on learning portfolio analysis (2014) (25)
- Discovery of gastric cancer specific biomarkers by the application of serum proteomics (2017) (25)
- Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT (2021) (25)
- SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home (2017) (25)
- DeepCachNet: A Proactive Caching Framework Based on Deep Learning in Cellular Networks (2019) (25)
- CF-CloudOrch: container fog node-based cloud orchestration for IoT networks (2018) (25)
- VPNFilter Malware Analysis on Cyber Threat in Smart Home Network (2019) (25)
- Investigating Wireless Sensor Network Lifetime Using a Realistic Radio Communication Model (2008) (24)
- IoT and Smart City Technology: Challenges, Opportunities, and Solutions (2019) (24)
- Blockchain-Based Secure Device Management Framework for an Internet of Things Network in a Smart City (2019) (24)
- OpCloudSec: Open cloud software defined wireless network security for the Internet of Things (2018) (23)
- An effective handling of secure data stream in IoT (2017) (23)
- s-ITSF: a service based intelligent transportation system framework for smart accident management (2015) (22)
- Multilevel learning based modeling for link prediction and users' consumption preference in Online Social Networks (2017) (22)
- Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures (2019) (22)
- Advances in Computer Science and Ubiquitous Computing - CSA/CUTE 2016, Bangkok, Thailand, 19-21 December (2016) (22)
- Monitoring user activities in smart home environments (2009) (22)
- IoT application protection against power analysis attack (2018) (22)
- A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions (2021) (22)
- Human-centric storage resource mechanism for big data on cloud service architecture (2016) (22)
- Energy-Efficient Distributed Topology Control Algorithm for Low-Power IoT Communication Networks (2016) (21)
- An improved recommendation algorithm for big data cloud service based on the trust in sociology (2017) (21)
- A sensing policy based on the statistical property of licensed channel in cognitive network (2010) (21)
- SNS Big Data Analysis Framework for COVID-19 Outbreak Prediction in Smart Healthy City (2021) (21)
- Cloud computing-based jam management for a manufacturing system in a Green IT environment (2014) (21)
- Embedded and Multimedia Computing Technology and Service (2012) (21)
- Traffic management in the mobile edge cloud to improve the quality of experience of mobile video (2017) (20)
- Predictive control for vehicular sensor networks based on round-trip time-delay prediction (2010) (20)
- Novel Approaches to Enhance Mobile WiMAX Security (2010) (20)
- Advanced algorithms and applications based on IoT for the smart devices (2018) (20)
- An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring (2010) (20)
- On improving resource utilization and system throughput of master slave job scheduling in heterogeneous systems (2008) (19)
- Remote Software Update in Trusted Connection of Long Range IoT Networking Integrated With Mobile Edge Cloud (2018) (19)
- Signaling-Oriented DoS Attacks in UMTS Networks (2009) (19)
- Energy Efficient Distributed Face Recognition in Wireless Sensor Network (2011) (19)
- Data center selection based on neuro-fuzzy inference systems in cloud computing environments (2013) (19)
- Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments (2016) (19)
- Design and implementation of a wireless sensor network architecture using smart mobile devices (2013) (19)
- A secure smart-work service model based OpenStack for Cloud computing (2014) (19)
- An Environmental-Adaptive Fall Detection System on Mobile Device (2011) (19)
- Advances in Future Internet and the Industrial Internet of Things (2019) (18)
- VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing (2015) (18)
- Scenario-Based Digital Forensics Challenges in Cloud Computing (2016) (18)
- A smart assistant toward product-awareness shopping (2014) (18)
- A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication (2011) (18)
- Adaptive Multi-channel Utilization Scheme for Coexistence of IEEE802.15.4 LR-WPAN with Other Interfering Systems (2009) (17)
- DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments (2014) (17)
- Malware classification algorithm using advanced Word2vec-based Bi-LSTM for ground control stations (2020) (17)
- Exploring the role of justification and cognitive effort exertion on post-purchase regret in online shopping (2018) (17)
- Efficiency Sustainability Resource Visual Simulator for Clustered Desktop Virtualization Based on Cloud Infrastructure (2014) (17)
- A strengthening plan for enterprise information security based on cloud computing (2014) (17)
- Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems (2011) (16)
- Efficient Resource Management Scheme for Storage Processing in Cloud Infrastructure with Internet of Things (2016) (16)
- A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security (2009) (16)
- Crowdsensing Multimedia Data: Security and Privacy Issues (2017) (16)
- Policy-Based Scheduling and Resource Allocation for Multimedia Communication on Grid Computing Environment (2011) (16)
- A secure-coding and vulnerability check system based on smart-fuzzing and exploit (2017) (15)
- Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks (2010) (15)
- BIIoVT: Blockchain-Based Secure Storage Architecture for Intelligent Internet of Vehicular Things (2021) (15)
- A combined network control approach for the edge cloud and LPWAN‐based IoT services (2020) (15)
- An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory (2013) (15)
- Quantum entanglement and non-locality based secure computation for future communication (2011) (15)
- Key Establishment Scheme for Sensor Networks with Low Communication Cost (2007) (15)
- Ubiquitous software controller to prevent deadlocks for automated guided vehicle systems in a container port terminal environment (2009) (15)
- An integrated clinical and genomic information system for cancer precision medicine (2018) (14)
- An interference-aware multichannel media access control protocol for wireless sensor networks (2012) (14)
- An Optimal Path Computation Architecture for the Cloud-Network on Software-Defined Networking (2015) (14)
- Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing (2020) (14)
- Design and Analysis of a MST-Based Topology Control Scheme with PSO for Wireless Sensor Networks (2011) (14)
- Advances in Computer Science and Ubiquitous Computing (2015) (14)
- Spatial parameters for audio coding: MDCT domain analysis and synthesis (2010) (14)
- Machine learning based distributed big data analysis framework for next generation web in IoT (2021) (13)
- MSNS: mobile sensor network simulator for area coverage and obstacle avoidance based on GML (2012) (13)
- A shortest path planning algorithm for cloud computing environment based on multi-access point topology analysis for complex indoor spaces (2017) (13)
- Performance Optimization with Efficient Polling Mechanism in IEEE 802.16 Networks with Cross-Layer Consideration (2009) (13)
- Ubiquitous Computing Application and Wireless Sensor (2015) (13)
- The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone (2012) (13)
- Development of A Textile Capacitive Proximity Sensor and Gait Monitoring System for Smart Healthcare (2018) (13)
- An Efficient Cloud Storage Model for Cloud Computing Environment (2012) (13)
- A RF4CE-based remote controller with interactive graphical user interface applied to home automation system (2013) (13)
- An Efficient Dynamic Integration Middleware for Cyber-Physical Systems in Mobile Environments (2013) (12)
- Efficient sensor node authentication in third generation-wireless sensor networks integrated networks (2011) (12)
- A novel framework for internet of knowledge protection in social networking services (2017) (12)
- Evaluation of nutrient bioextraction by seaweed and shellfish aquaculture in Korea (2021) (12)
- Wearable Computing for Defence Automation: Opportunities and Challenges in 5G Network (2020) (12)
- A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing (2017) (12)
- Deep Learning Enabled Secure IoT Handover Authentication for Blockchain Networks (2021) (12)
- Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor Networks (2009) (12)
- Visual Scheme Monitoring of Sensors for Fault Tolerance on Wireless Body Area Networks with Cloud Service Infrastructure (2014) (12)
- An enhanced smartphone security model based on information security management system (ISMS) (2014) (12)
- Structure-free message aggregation and routing in traffic information system (SMART) (2013) (11)
- G-Cloud Monitor: A Cloud Monitoring System for Factory Automation for Sustainable Green Computing (2014) (11)
- Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks (2011) (11)
- Mobile, Ubiquitous, and Intelligent Computing - MUSIC 2013, FTRA 4th International Conference on Mobile, Ubiquitous, and Intelligent Computing, September 4-6, 2013, Gwangju, Korea (2014) (11)
- Supervised Machine-Learning Predictive Analytics for National Quality of Life Scoring (2019) (11)
- Intelligent Multimedia Service System Based on Context Awareness in Smart Home (2005) (11)
- Adaptive job allocation scheduler based on usage pattern for computing offloading of IoT (2019) (11)
- Research trends in cloud, cluster and grid computing (2013) (11)
- An authentication protocol offering service anonymity of mobile device in ubiquitous environment (2012) (11)
- Graph-based motor primitive generation framework (2015) (11)
- Multimedia contents adaptation by modality conversion with user preference in wireless network (2014) (11)
- Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network (2011) (11)
- Security, Privacy, and Efficiency of Sustainable Computing for Future Smart Cities (2020) (11)
- Concurrent multipath transmission with forward error correction mechanism to overcome burst packet losses for delay-sensitive video streaming in wireless home networks (2013) (11)
- An efficient approach to understanding social evolution of location-focused online communities in location-based services (2018) (10)
- The incentive secure mechanism based on quality of service in P2P network (2010) (10)
- Perceptual quality based error control for scalable on-demand streaming in next-generation wireless networks (2013) (10)
- RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks (2016) (10)
- Improving Performance through REST Open API Grouping for Wireless Sensor Network (2013) (10)
- PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment (2007) (10)
- Secure and efficient public key management in next generation mobile networks (2012) (10)
- The Cloud Storage Model for Manufacturing System in Global Factory Automation (2014) (10)
- Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device (2014) (10)
- High availability and efficient energy consumption for cloud computing service with grid infrastructure (2013) (10)
- Beacon Distance Measurement Method in Indoor Ubiquitous Computing Environment (2016) (10)
- A proposal for automating investigations in live forensics (2010) (10)
- Design and analysis of a self-tuning feedback controller for the Internet (2009) (10)
- Blockchain-Based Secure Digital Twin Framework for Smart Healthy City (2020) (10)
- A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment (2012) (10)
- Intelligent Decision-Making System with Green Pervasive Computing for Renewable Energy Business in Electricity Markets on Smart Grid (2009) (10)
- Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, Auckland, New Zealand, January 13-16, 2014 (2016) (10)
- Subscriber authentication technology of AAA mechanism for mobile IPTV service offer (2010) (10)
- A portable UPnP-based high performance content sharing system for supporting multimedia devices (2011) (10)
- Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing (2016) (9)
- An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing (2014) (9)
- On Prolonging the Lifetime for Wireless Video Sensor Networks (2010) (9)
- Device Authentication In Wireless And Pervasive Environments (2010) (9)
- A Web Image Retrieval Re-ranking Scheme with Cross-Modal Association Rules (2008) (9)
- Future Trends of IoT, 5G Mobile Networks, and AI: Challenges, Opportunities, and Solutions (2020) (9)
- Relative weight evaluation of the factors inducing social media service use (2015) (9)
- Emerging ICT UAV applications and services: Design of surveillance UAVs (2019) (9)
- A service composition model based on user experience in Ubi-cloud comp (2016) (9)
- A Study on the Performance of Wireless Localization System Based on AoA in WSN Environment (2011) (9)
- Efficient Sustainable Operation Mechanism of Distributed Desktop Integration Storage Based on Virtualization with Ubiquitous Computing (2015) (9)
- Design and implementation of light-weight mobile multicast for fast MIPv6 (2009) (9)
- Radio resource management for data transmission in low power wide area networks integrated with large scale cyber physical systems (2017) (9)
- Inference topology of distributed camera networks with multiple cameras (2013) (9)
- EH-GC: An Efficient and Secure Architecture of Energy Harvesting Green Cloud Infrastructure (2017) (9)
- Information Technology Convergence - Security, Robotics, Automations and Communication, 5th International Conference on Information Technology Convergence and Services, ITCS 2013, Fukuoka, Japan, July 8-10, 2013 (2013) (8)
- Fair incentive mechanism with pyramidal structure for peer-to-peer networks (2010) (8)
- Test-driven forensic analysis of satellite automotive navigation systems (2014) (8)
- Effective session key distribution for secure fast handover in mobile networks (2010) (8)
- SPHINX: a scheduling middleware for data intensive applications on a grid (2006) (8)
- Authentication and ID-Based Key Management Protocol in Pervasive Environment (2010) (8)
- Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012, Gwangju, Korea, September 6-8, 2012 (2012) (8)
- Advances in Computer Science and its Applications (2020) (8)
- Bayesian Probability-Based Motion Estimation Method in Ubiquitous Computing Environments (2015) (8)
- A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform (2016) (8)
- Social Media Services and Technologies Towards Web 3.0 (2015) (8)
- A Unified Framework for Behaviour Monitoring and Abnormality Detection for Smart Home (2019) (8)
- DSS-SL: Dynamic Signage System Based on SDN with LiFi Communication for Smart Buildings (2017) (7)
- Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks (2021) (7)
- Energy-Efficient Meter Data Aggregation Protocol for (AMR) Automatic Meter Reading Networks (2009) (7)
- Adaptive resource management using many-core processing for fault tolerance based on cyber-physical cloud systems (2017) (7)
- Intelligent systems and smart homes (2009) (7)
- Security Challenges in Recent Internet Threats and Enhanced Security Service Model for Future IT Environments (2016) (7)
- Location based authentication scheme using BLE for high performance digital content management system (2016) (7)
- DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops (2017) (7)
- Monitoring user activities in smart home environments (2009) (7)
- Artificial Intelligence for the Fourth Industrial Revolution (2018) (7)
- Motion estimation framework and authoring tools based on MYOs and Bayesian probability (2016) (7)
- Authentications for Internet of Things Security: Threats, Challenges and Studies (2018) (7)
- A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition (2010) (7)
- Adaptive video-on-demand broadcasting in ubiquitous computing environment (2009) (7)
- Feasibility and Performance Analysis of RDMA Transfer through PCI Express (2017) (7)
- Blockchain-based delegated Quantum Cloud architecture for medical big data security (2022) (7)
- Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices (2014) (7)
- Special issue of computer communications on information and future communication security (2011) (6)
- Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key (2015) (6)
- Beacon-based active media control interface in indoor ubiquitous computing environment (2016) (6)
- Job Allocation Mechanism for Battery Consumption Minimization of Cyber-Physical-Social Big Data Processing Based on Mobile Cloud Computing (2018) (6)
- Practical Approaches Based on Deep Learning and Social Computing (2018) (6)
- Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network (2016) (6)
- Iceberg Clique queries in large graphs (2017) (6)
- Post-Quantum Blockchain for a Scalable Smart City (2020) (6)
- Resilient Security Mechanism for Wireless Ad hoc Network (2011) (6)
- Novel assessment method for accessing private data in social network security services (2017) (6)
- Digital evidence discovery of networked multimedia smart devices based on social networking activities (2014) (6)
- A scalable and adaptive video streaming framework over multiple paths (2010) (6)
- A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services (2008) (6)
- U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home (2009) (6)
- Advances in Parallel and Distributed Computing and Ubiquitous Services (2016) (6)
- Intelligent Monitoring Using Wireless Sensor Networks (2007) (6)
- Maximizing Network Lifetime of Directional Sensor Networks Considering Coverage Reliability (2013) (6)
- A Secure and Robust Connectivity Architecture for Smart Devices and Applications (2011) (6)
- The effect and strategy research of the secure E-commerce by the application of P2P (2011) (6)
- MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis (2012) (6)
- A cache-based search algorithm in unstructured P2P networks (2012) (6)
- Fast and efficient formation flocking for a group of autonomous mobile robots (2008) (6)
- Computer Science and Convergence (2012) (6)
- Computer Science and its Applications: Ubiquitous Information Technologies (2014) (6)
- A novel and efficient source-path discovery and maintenance method for application layer multicast (2013) (6)
- Advanced Multimedia and Ubiquitous Engineering (2016) (5)
- Chain‐to‐chain inventory transshipment model and robust switch control in CSC networks (2012) (5)
- Study on the common criteria methodology for secure ubiquitous environment construction (2012) (5)
- Differential Fault Analysis on the Block Cipher HIGHT (2012) (5)
- M-MUSICS: an intelligent mobile music retrieval system (2011) (5)
- A portable toolkit for supporting end-user personalization and control in context-aware applications (2010) (5)
- HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet (2016) (5)
- A hybrid layered architecture for detection and analysis of network based Zero-day attack (2017) (5)
- Data Transmission Direction Based Routing Algorithm for Improving Network Performance of IoT Systems (2020) (5)
- Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments (2016) (5)
- Secure multi-mode systems and their applications for pervasive computing (2008) (5)
- Application for Mobile Cloud Learning (2013) (5)
- Human-intelligence workflow management for the big data of augmented reality on cloud infrastructure (2017) (5)
- Decentralized Flocking Algorithms for a Swarm of Mobile Robots: Problem, Current Research and Future Directions (2009) (5)
- A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions (2007) (5)
- An effective simulation method for search strategy in unstructured P2P network (2010) (5)
- Differential display, subtractive hybridization, and application of methodology to search for point mutations to identify genetic defects responsible for progression in MCF10AT model of human breast disease (1999) (5)
- Advances in Information Security and Its Application (2009) (5)
- CCTV-Based Multi-Factor Authentication System (2019) (5)
- Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks (2011) (5)
- Visual Trustworthy Monitoring System (v-TMS) for Behavior of Trusted Computing (2010) (5)
- Ubiquitous computing for communications and broadcasting (2012) (5)
- IEEE 802.11 handoff latency improvement using Fuzzy Logic (2008) (5)
- Digital Trails Discovering of a GPS Embedded Smart Phone - Take Nokia N78 Running Symbian S60 Ver 3.2 for Example (2011) (5)
- A Rhythm-Based Authentication Scheme for Smart Media Devices (2014) (5)
- A blockchain-based trusted security zone architecture (2019) (5)
- Emerging ICT applications and services—Big data, IoT, and cloud computing (2020) (5)
- Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC (2015) (4)
- Relay OFDMA System for Wireless Multimedia Services in Home Area Networks (2007) (4)
- Visualization of dynamic fault tolerance rerouting for data traffic in wireless sensor network (2014) (4)
- Network-Aware Multiway Join for MapReduce (2013) (4)
- A parallel team formation approach using crowd intelligence from social network (2019) (4)
- User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home (2005) (4)
- Ubiquitous Computing Application and Wireless Sensor: UCAWSN-14 (2015) (4)
- User tailored cloud-learning system using SNS and learning resources (2015) (4)
- Advanced Big Data Analysis, Artificial Intelligence & Communication Systems (2019) (4)
- An effective locking scheme of smart multimedia devices with convenience and enhanced security (2016) (4)
- The Study on Data of Smart Home System as Digital Evidence (2017) (4)
- User Experience and Quality-of-Service in Internet of Things: Practice and Trends (2016) (4)
- Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home (2007) (4)
- Efficient scheme of verifying integrity of application binaries in embedded operating systems (2012) (4)
- ODSA: Chord-Based Object Discovery Service Architecture for the Internet of Things (2013) (4)
- Enhanced Machine Learning Algorithms: Deep Learning, Reinforcement learning and Q-learning (2020) (4)
- Ramsonware: Holding your Data Hostage (2017) (4)
- Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments (2009) (4)
- A High-Capacity CDMA Watermarking Scheme Based on Orthogonal Pseudorandom Sequence Subspace Projection (2011) (4)
- Ubiquitous Mobile Computing on Cloud Infrastructure (2014) (4)
- Sustainable Load-Balancing Scheme for Inter-Sensor Convergence Processing of Routing Cooperation Topology (2016) (4)
- Learning Algorithms in AI System and Services (2019) (4)
- Relative weight comparison between virtual key factors of cloud computing with analytic network process (2016) (4)
- USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework (2009) (4)
- Posted price model based on GRS and its optimization for improving grid resource sharing efficiency (2014) (4)
- Symmetry-Adapted Machine Learning for Information Security (2020) (4)
- Advanced IT-Based Future Sustainable Computing (2017) (4)
- Effects of extraction methods for a new source of biostimulant from Sargassum horneri on the growth of economically important red algae, Neopyropia yezoensis (2022) (4)
- Bilingualism and Attention in Typically Developing Children and Children With Developmental Language Disorder. (2019) (4)
- Introduction to the thematic issue on Ambient and Smart Component Technologies for Human Centric Computing (2014) (4)
- Advances in Communication and Networking (2009) (4)
- A secure model for controlling the hubs in P2P wireless network based on trust value (2010) (4)
- Analysis of a Third-Party Application for Mobile Forensic Investigation (2018) (4)
- Multimedia and Ubiquitous Engineering (2014) (4)
- An efficient route scheduling mechanism for WiMAX network (2014) (4)
- Extraction of enhanced evoked potentials using wavelet filtering (2013) (4)
- Blockchain-Based Secure Mist Computing Network Architecture for Intelligent Transportation Systems (2020) (4)
- Video transcoding scheme of multimedia data-hiding for multiform resources based on intra-cloud (2019) (4)
- Fusion algorithms and high-performance applications for vehicular cloud computing (2018) (4)
- CMMI Security Model for Cloud Manufacturing System's Network (2013) (4)
- Security Considerations in Cloud Computing Virtualization Environment (2013) (4)
- Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device (2010) (4)
- Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network (2020) (4)
- Modeling user-generated contents: an intelligent state machine for user-centric search support (2013) (4)
- Multi-frame Beacon Management for constructing interference-avoided LR-WPAN (2010) (4)
- All-in-focus and multi-focus color image reconstruction from a database of color and depth image pairs (2016) (3)
- Future Trends of Blockchain and Crypto Currency: Challenges, Opportunities, and Solutions (2019) (3)
- Adaptive power management system for mobile multimedia device (2012) (3)
- An efficient character input scheme with a gyro sensor of smartphone on ubiquitous cluster computing (2015) (3)
- A Fog Computing-Based Automotive Data Overload Protection System with Real-Time Analysis (2018) (3)
- High Attack Cost: Hash Based RFID Tag Mutual Authentication Protocol (2012) (3)
- MTD-Spamguard: a moving target defense-based spammer detection system in social network (2018) (3)
- Special issue on “Intelligent systems and services for ubiquitous computing” (2009) (3)
- IRoA 2011 welcome message from workshop organizers ITCS 2011 (2011) (3)
- Information fusion in future generation communication environments (2011) (3)
- Group-Aware Social Trust Management for a Movie Recommender System (2011) (3)
- Future Trends of AI-based Smart Systems and Services: Challenges, Opportunities, and Solutions (2019) (3)
- DRBAC Model Using a WSNM for Services in i-Home (2006) (3)
- The weighted shortest path search based on multi-agents in mobile GIS management services (2012) (3)
- Editorial : Intelligent manufacturing system and security and assurance () (2010) (3)
- Security analysis of mCrypton proper to low‐cost ubiquitous computing devices and applications (2009) (3)
- Pervasive Sensing Technologies and Emerging Trends (2014) (3)
- Advances in Big Data Analytics (2015) (3)
- Advances in Algorithm, Multimedia, and Network for Future IT (2017) (3)
- HOTP-Based User Authentication Scheme in Home Networks (2009) (3)
- Revisiting reorder buffer architecture for next generation high performance computing (2013) (3)
- An Interactive IPTV System With Community Participation in Cloud Computing Environments (2014) (3)
- Reliable Transmission Mechanism for safety-critical information in vehicular wireless networks (2010) (3)
- Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 2019 (2016) (3)
- Secure ubiquitous connectivity in hybrid multipath wireless ad hoc network (2009) (3)
- Top-k entities query processing on uncertainly fused multi-sensory data (2013) (3)
- Parallel Processing Simulator for Separate Sensor of WSN Simulator with GPU (2015) (3)
- Achieving reliable system performance by fast recovery of branch miss prediction (2012) (3)
- A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home (2006) (3)
- Cognitive Science-Based Security Framework in Consumer Electronics (2020) (3)
- Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database (2010) (3)
- A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home (2006) (3)
- Navigation-based self-optimization handover mechanism for mobile relay stations in WiMAX networks (2014) (3)
- A QoS Model for a RFID Enabled Application with Next-Generation Sensors for Manufacturing Systems (2013) (3)
- A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks (2007) (3)
- Distributed Video Coding: an overview of basics, research issues and solutions (2012) (3)
- Secure clouds forensic investigative architecture for social network cloud (2016) (3)
- Context-aware service roaming for heterogeneous embedded devices over cloud (2013) (3)
- Intelligent Home Network Authentication: Home Device Authentication Using Device Certification (2007) (3)
- Live Mobile Distance Learning System for Smart Devices (2015) (3)
- Editorial: Special Issue on “Information Security and Data Protection in Future Generation Communication and Networking” (2009) (3)
- Advanced Multimedia and Ubiquitous Engineering: Future Information Technology - Volume 2 (2015) (3)
- Decrepit Building Monitoring Solution for Zero Energy Building Management Using PLC and Android Application (2020) (2)
- Multimedia and Ubiquitous Engineering: MUE 2013 (2013) (2)
- Mobile, Ubiquitous, and Intelligent Computing: MUSIC 2013 (2013) (2)
- Computer Science and its Applications (2012) (2)
- Grid and Pervasive Computing (2013) (2)
- Proceedings of the International Conference on Human-centric Computing 2011 and Embedded and Multimedia Computing 2011 (2011) (2)
- A Ring and Clustering Routing Scheme Based on Data Field in Sensor Network (2012) (2)
- Future Information Technology, Application, and Service: FutureTech 2012 Volume 1 (2012) (2)
- A presentation scheduling scheme for multimedia databases (1996) (2)
- Effects of the ultraviolet filter oxybenzone on physiological responses in a red macroalga, Gracilaria vermiculophylla (2022) (2)
- Estimating Face Direction via Facial Triangle (2004) (2)
- Inheritance of Multimedia Class having Temporal-Spatial Structures (1997) (2)
- RHDP-Scheme for RFID’s Efficiency Improvement on the Ubiquitous Computing (2006) (2)
- CIMS: A Context-Based Intelligent Multimedia System for Ubiquitous Cloud Computing (2015) (2)
- Cognitive scenario generation computing in the Internet of things for enterprise information systems (2020) (2)
- User Authentication for Multi Domain in Home Network Environments (2007) (2)
- Analysis and Synthesis of Spatial Parameters Using MDCT (2009) (2)
- A rhythm-based access control system for secure wellness services (2016) (2)
- Multi-WSN Simulator with Log Data for Efficient Sensing on Internet of Things (2015) (2)
- Load Balancing with Fair Scheduling for Multiclass Priority Traffic in Wireless Mesh Networks (2011) (2)
- A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment (2006) (2)
- Erratum to “A genetic algorithm for energy-efficient based multicast routing on MANETs” [Comput. Commun. 31 (2008) 858--869] (2008) (2)
- Encoder design for healthcare signals (2013) (2)
- Security technologies and applications for convergence environments (2012) (2)
- Novel Solutions and Approaches to Effective Data Processing (2018) (2)
- Deep Learning Based IoT Re-authentication for Botnet Detection and Prevention (2019) (2)
- A Security Model for Protecting Virtualization in Cloud Computing (2016) (2)
- SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems (2009) (2)
- Advances in information security and assurance : Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings (2009) (2)
- Implementation of Rate Control in Distributed Wireless Multicast by Neural Network Prediction (2009) (2)
- A security management scheme for failure detector distributed systems based on self-tuning control theory (2011) (2)
- Augmenting user interaction in a smart home applying commonsense knowledge (2008) (2)
- Large-Scale USN Middleware Based on Context-Aware (2008) (2)
- Secure multimedia communication (2008) (2)
- IT convergence security (2014) (2)
- Advanced Technologies in Blockchain, Machine Learning, and Big Data (2020) (2)
- The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network (2009) (2)
- A user experience environment model for human activity simulation (2017) (2)
- The Security System Design in Online Game for u Entertainment (2008) (2)
- Adaptive Scheduling Mechanisms toward Intelligent Services in Mobile and Wireless RFID Environments (2008) (2)
- Performance Evaluation of Hybrid Multipath Mobile Ad Hoc Network (2009) (2)
- Design of QoS in Intelligent Communication Environments Based on Neural Network (2011) (2)
- A Document Based Framework for Smart Object Systems (2008) (2)
- C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home (2006) (2)
- U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home (2008) (2)
- Adaptive network-based fuzzy inference model on CPS for large scale intelligent and cooperative surveillance (2013) (2)
- Ontology Based Resource Usage Policy Matching in Computational Grid for Pervasive Computing Applications (2011) (2)
- Advances in Computational Science and Engineering (2009) (2)
- User Centric Intelligent IPMPS in Ubi-Home (2006) (2)
- Novel Approaches to EnhanceMobileWiMAX Security (2010) (2)
- A Smart Object Centric Indoor Location Model for Future Ubiquitous and Grid Services (2009) (2)
- A Virtualization Security Framework for Public Cloud Computing (2012) (2)
- Privacy Protection and Access Control of Image Information Processing Devices (2011) (2)
- WiFi Auto Configuration Architecture Using ZigBee RF4CE for Pervasive Environments (2011) (2)
- Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning (2017) (2)
- Deep Learning Adoption Blockchain Secure Framework for Cyber Physical System (2020) (2)
- An ANP-Based Practical Quality Model for a Secure Embedded System with Sensor Network (2014) (2)
- A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices (2020) (2)
- Information success model for learning system in cloud computing environment (2013) (2)
- Fuzzy Set Theory-Based Trust Models in Multi-Agent Environment (2012) (2)
- A New Prefetching Strategy Based on Access Density in Linux (2008) (2)
- A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems (2012) (2)
- Concurrent Multipath Transmission with Adaptive Forward Error Correction Mechanism for Delay-Sensitive Videostreaming in Wireless Home Networks (2010) (2)
- The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia (2016) (2)
- [EDITORIAL] Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognitionand Machine Learning (2017) (2)
- Guest editorial: Theme issue on smartphone applications and services for pervasive computing (2012) (2)
- Machine Learning-Based Intrusion Detection System for Smart City (2018) (2)
- Blockchain Based Integrated Authentication System (2018) (2)
- Resource Utilization Scheme of Idle Virtual Machines for Multiple Large-Scale Jobs Based on OpenStack (2019) (2)
- Smart devices and spaces for pervasive computing (2014) (2)
- Computational awareness towards green environments (2014) (2)
- Bio-inspired computing for hybrid information technology (2012) (2)
- Ensemble learning-based prediction of contentment score using social multimedia in education (2021) (2)
- A Priority-Driven Inheritance Scheme for Reusing Temporal-Spatial Structures in Multimedia Databases (1997) (1)
- 7-(3-Benzyloxypropyl)apigenin, a novel cytotoxic flavone derivative (2007) (1)
- Strategy for IT Security in E-enterprise Environment (2008) (1)
- Advanced communication models and services for smart world (2015) (1)
- A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition (2012) (1)
- A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions (2016) (1)
- uiH-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment (2006) (1)
- Open API Design for Research Information System (2012) (1)
- An Energy-Efficient Virtualization-Based Secure Platform for Protecting Sensitive User Data (2017) (1)
- Advances in Computational Science and Engineering: Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December ... in Computer and Information Science) (2009) (1)
- Real-time smartphone sensing and recommendations towards context-awareness shopping (2013) (1)
- A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment (2008) (1)
- Optional Frame Selection Algorithm for Adaptive Symmetric Service of Augmented Reality Big Data on Smart Devices (2016) (1)
- [EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors (2016) (1)
- Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World (2016) (1)
- Advanced algorithms and applications for IoT cloud computing convergence (2018) (1)
- On modeling and evaluating multicomputer transcoding architectures for live-video streams (2009) (1)
- Computer Science and Convergence: CSA 2011 & WCC 2011 Proceedings (2011) (1)
- Secure and Trust Computing, Data Management, and Applications: 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. ... in Computer and Information Science) (2011) (1)
- Special issue on “security for multimedia and ubiquitous applications” (2010) (1)
- A Study on the Use of Drone-Based Mapping in Social Studies Education (2021) (1)
- On Scheduling Transmissions for Hidden Terminal Problems in Dynamic RFID Systems (2006) (1)
- Sargassum horneri and Ascophyllum nodosum extracts enhance thermal tolerance and antioxidant activity of Neopyropia yezoensis (2022) (1)
- Erratum: Security Considerations for Smart Phone Smishing Attacks (2014) (1)
- Mobile cloud computing framework for a pervasive and ubiquitous environment (2011) (1)
- Comparative Analysis of Physiological Responses in Two Ulva prolifera Strains Revealed the Effect of Eutrophication on High Temperature and Copper Stress Tolerance (2022) (1)
- i-SHSS: An IoT Based Smart Home Security System (2017) (1)
- Telling Computer and Human Apart: Image-Sound Based CAPTCHA System (2017) (1)
- Adaptive power management scheme using many-core for maximizing network topology lifetime based on ubiquitous computing (2017) (1)
- A real-time display methods for large-scale human body data (2016) (1)
- Embedded and Multimedia Computing Technology and Service: EMC 2012 (2012) (1)
- Advances in communication networks for pervasive and ubiquitous applications (2013) (1)
- Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing (2015) (1)
- The Practical Quality Model for Cloud Learning System (2014) (1)
- Sequencing Strategy with Learning Portfolio Analysis for Personalized English Reading (2010) (1)
- hFractal: A Cloud-Assisted Simulator of Virtual Plants for Digital Agriculture (2016) (1)
- The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era (2015) (1)
- Visual Scheme for the Detection of Mobile Attack on WSN Simulator (2013) (1)
- Using Contextual Information to Assist Desktop Search (2013) (1)
- Advanced Modeling and Services Based Mathematics for Ubiquitous Computing (2015) (1)
- Secure communications and data management in ubiquitous services (2009) (1)
- ACE: Active Emergence Call Service System for u-Lifecare (2008) (1)
- Advanced Security Technologies and Services for Future Computing Environments (2013) (1)
- MTD-Spamguard: a moving target defense-based spammer detection system in social network (2017) (1)
- Effects of Transcranial Direct-Current Stimulation Therapy on Primary Chronic Insomnia: A Proof-of Concept Clinical Trial (2018) (1)
- S-Detector: an enhanced security model for detecting Smishing attack for mobile computing (2017) (1)
- Service Based User Oriented Adaptive Learning System (2013) (1)
- Providing security vertical handoff in SARAH for heterogeneous networks (2011) (1)
- Integration of Cloud and Big Data Analytics for Future Smart Cities (2019) (1)
- A novel low‐power RF4CE‐based communication framework for multimedia system control (2011) (1)
- A VoIP System for Mobility Voice Security Support Using the VPN (2009) (1)
- Realizing the Right to Be Forgotten in an SNS Environment (2014) (1)
- Hierarchical Customization Method for Ubiquitous Web Applications (2014) (1)
- CloudRPS: a cloud analysis based enhanced ransomware prevention system (2016) (1)
- Ascertaining the interactions of brown seaweed-derived biostimulants and seawater temperature on spore release, germination, conchocelis, and newly formed blades of the commercially important red alga Neopyropia yezoensis? (2022) (1)
- Efficient De-Fragmented Writeback for Journaling File System (2011) (1)
- Advanced IT-Based Future Sustainable Computing (2017–2018) (2019) (1)
- Graph-Based Motor Primitive Generation Method of UAVs Based on Demonstration-Based Learning (2016) (1)
- Design and implementation of light-weight mobile multicast for fast MIPv 6 (2010) (1)
- Challenges and opportunities in next-generation cyberspace security (2016) (1)
- Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment (2005) (1)
- Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments (2009) (1)
- An efficient collusion resistant security mechanism for heterogeneous sensor networks (2009) (1)
- Efficient Approaches to Computer Vision and Pattern Recognition (2017) (1)
- A Simple Method for Facial Pose Detection (2004) (1)
- REST-MapReduce: An Integrated Interface but Differentiated Service (2014) (1)
- Influence of Gas Nitriding on the Damping Capacity of Fe-17Mn Alloy (2018) (1)
- Intelligent Multimedia Services Using Semantic Web Technologies in Internet Computing Environments (2010) (1)
- An enhanced integrity of web contents through mobile cloud environments (2014) (1)
- Survey for U-Greenhouse System Technology (2012) (1)
- Guest Editorial Special Issue on Advanced Computational Technologies in Mobile Edge Computing for the Internet of Things (2019) (1)
- Advances in intelligence and internet of things for human-centric computing (2018) (1)
- A Novel Routing-Aware MAC Protocol for Mobile Ad Hoc Network (2010) (1)
- Efficient Similarity Search for Multi-Dimensional Time Sequences (2010) (1)
- A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets (2011) (1)
- Real-World Failure Prevention Framework for Manufacturing Facilities Using Text Data (2021) (1)
- A Study on Seon Therapy Methods (2003) (1)
- 2009 Third International Conference on Multimedia and Ubiquitous Engineering, MUE 2009, Qingdao, China, June 4-6, 2009 (2009) (1)
- Output Effect Evaluation Based on Input Features in Neural Incremental Attribute Learning for Better Classification Performance (2015) (1)
- The Design and Analysis of a Secure Personal Healthcare System Based on Certificates (2016) (1)
- Mouse models of lung-specific SARS-CoV-2 infection with moderate pathological traits (2022) (1)
- Ensuring Healthcare Services Provision: An Integrated Approach of Resident Contexts Extraction and Analysis via Smart Objects (2014) (1)
- A Fair-Oriented Two-Level Scheduling Scheme for Downlink Traffic in WiMAX Network (2010) (1)
- Special issue on advanced intelligent multimedia applications for next generation environments (2010) (1)
- Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science" (2010) (1)
- Virtualization and SDN/NFV technology research for efficient cloud environment (2017) (0)
- IS 2008 PC Co-chairs' Message (2008) (0)
- Discrete Radio Communication Model for Energy Efficient Data Dissemination in Wireless Sensor Networks (2008) (0)
- A Survey on Multimedia Communicating Technology Based on Spatial Audio Coding (2010) (0)
- Revisiting reorder buffer architecture for next generation high performance computing (2012) (0)
- Editorial (2010) (0)
- A service composition model based on user experience in Ubi-cloud comp (2015) (0)
- Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance (2009) (0)
- Guest Editorial: Technologies and Applications for Interactive NUX/NUI (2016) (0)
- Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks (2007) (0)
- Automatic Generation of Ortho-Photo Texture from Digital Elevation Model (2017) (0)
- LARSs: Design of Middleware for Location-Based Augmented Reality Services (2012) (0)
- User tailored cloud-learning system using SNS and learning resources (2013) (0)
- ER-CLT: A Secure Emotion Recognition-Based Child Location Tracking System (2015) (0)
- Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks (2011) (0)
- Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (2009) (0)
- Multi-blockchain System based on Directed Acyclic Graph for Increasing Data Throughput (2021) (0)
- Self-stabilizing flocking of a group of mobile robots with memory corruption (2011) (0)
- Beacon-based active media control interface in indoor ubiquitous computing environment (2016) (0)
- Congestion Control in Wireless Sensor Network based on Predicted Sensor Position on Movement for Body Area Network Applications (2017) (0)
- Content-oriented learning recommendation mechanism in MANETs (2014) (0)
- Enlarging Instruction Window through Separated Reorder Buffers for High Performance Computing (2011) (0)
- A Hybrid Security Model in MongoDB Application Server (2016) (0)
- Discrete radio communicationmodel for energy efficient data dissemination in wireless sensor networks (2008) (0)
- Radio resource management for data transmission in low power wide area networks integrated with large scale cyber physical systems (2017) (0)
- DOTP-AaaS: Dynamic One Time Password Matching-Based Authentication as a Service (2017) (0)
- A Component Model for Manufacturing System in Cloud Computing (2013) (0)
- Energy Consumption and Reliable Communications for Green IoT (2017) (0)
- Trend Analyses and Considerations on Countermeasurement of Cyber Attack (2017) (0)
- An Efficient Design of Graycode Circuit Using Reversible Logic (2016) (0)
- Message from the UASS 2008 chairs (2008) (0)
- Advances in communication networks for pervasive and ubiquitous applications (2013) (0)
- A Context Information Management System for Context-Aware Services in Smart Home Environments (2011) (0)
- A Study of Halo-Galaxy Correspondence from the Horizon Run 4 (2015) (0)
- An integrated clinical and genomic information system for cancer precision medicine (2018) (0)
- An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory (2011) (0)
- Relative weight evaluation of the factors inducing social media service use (2013) (0)
- Understanding resilience: Investigating the relationship between risk factors, resilience, and psychological well-being (2023) (0)
- Net clinical benefit of antithrombotic therapy for atrial fibrillation patients with stable coronary artery disease (2022) (0)
- A State-of-art of Open Type Automated Communication Technologies (1998) (0)
- In Visible Climate Change: Exploring Immersive Data Visualisation to Promote Climate Change Awareness in a VR Game (2022) (0)
- A strengthening plan for enterprise information security based on cloud computing (2013) (0)
- Improving Research Integrity of Beginners for Conducting Human Research (2023) (0)
- Dark treatment effect on the carrageenan characterization in a red alga, Chondrus crispus (2022) (0)
- Corrigendum: Mouse models of lung-specific SARS-CoV-2 infection with moderate pathological traits (2022) (0)
- Petri-Net Based User Profile Data Ontology for SNS (2013) (0)
- Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing (2007) (0)
- Alteration of transthyretin and thyroxine-binding globulin in major depressive disorder: multiple reaction monitoring-based proteomic analysis (2021) (0)
- An Analysis of Convergent Thinking Type for Visual Artistic Giftednees through the Grounded Theory Approach: Based on A-STEAM (2018) (0)
- Application of Computational Thinking Based on Moral Machine for Digital Citizenship Education (2023) (0)
- Faster Translated Binary Execution on Mobile System through Virtualization (2014) (0)
- A Study on Learners’ Dropout Factors of Internet-based Learning of High School Students (2022) (0)
- Temperature and high nutrients enhance hypo-salinity tolerance of the bloom forming green alga, Ulva prolifera. (2023) (0)
- A Test of Correspondence Model with the HorizonRun 4 Simulation (2015) (0)
- Data Mining Techniques to Facilitate Digital Forensics Investigations (2016) (0)
- Automating Data Presentations from Temporal-Spatial Structures in Multimedia Databases (1999) (0)
- Aging Prediction Modeling Based on Machine Learning with Body Odor Compounds Data (2023) (0)
- A Study on the Utilization and Tasks of Drones as a Tool for Fieldwork (2022) (0)
- Korean grapheme recognition immersive scheme with gesture on smartphone (2016) (0)
- Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing (2016) (0)
- Digital Evidence Discovery and Knowledge Management Issues Concerning Multimedia Computing Devices Utilizing GPS Navigation Services and Social Network Activities (2011) (0)
- [EDITORIAL] New Approaches to Advanced Network and Image Processing (2017) (0)
- ACM/Springer Mobile Networks and Applications (MONET) Special Issue on “Advanced Mobile Applications and Intelligent Multimedia systems for Ubi-Com” (2010) (0)
- Study on the Desorption of Isovaleric Acid in Garments (2022) (0)
- Comparative transcriptome analysis reveals the molecular mechanism of heat-tolerance in Neopyropia yezoensis induced by Sargassum horneri extract (2023) (0)
- Relative weight comparison between virtual key factors of cloud computing with analytic network process (2014) (0)
- A Study on Intelligent Wellness Services for Optimizing Driver’s Health Status (2017) (0)
- IT Convergence and Services: ITCS & IRoA 2011 (2011) (0)
- Future Information Technology - II: Proceedings of The 9th FTRA International Conference on Future Information Technology (FutureTech 2014), Zhangjiajie, China, 28-31 May 2014 / James J. (Jong Hyuk) Park, Yi Pan, Cheonshik Kim, Yun Yang (eds.) (2015) (0)
- Multimedia technology for pervasive computing environment (2013) (0)
- A Traitor Tracing Using an Efficient Key Renewal in Embedded System (2008) (0)
- CSA 2009 Organization (2009) (0)
- An effective locking scheme of smart multimedia devices with convenience and enhanced security (2014) (0)
- Welcome message from the workshop organizers, MCCTA 2013 (2013) (0)
- Advances in Algorithms, Security, and Systems for ICT Convergence (2020) (0)
- Fusion algorithms and high-performance applications for vehicular cloud computing (2018) (0)
- Message from the MCM 2011 Chairs (CSA 2011 Workshop) (2012) (0)
- Proceedings of the international conference on human-centric computing 2011 and embedded and multimedia computing 2011 : HumanCom & EMC 2011 (2011) (0)
- Coalitional Power Control and Time Allocation for Multiuser Cognitive Networks (2013) (0)
- The QoS-based MCDM system for SaaS ERP applications with Social Network (2012) (0)
- Applying Embedded System Forensics to Car GPS Navigation System Analysis (2009) (0)
- EEG Based Smart Driving for Intelligent Accident Management (2017) (0)
- MSNS: mobile sensor network simulator for area coverage and obstacle avoidance based on GML (2012) (0)
- Network and Parallel Computing (2014) (0)
- Efficient Resource Management Scheme for Storage Processing in Cloud Infrastructure with Internet of Things (2015) (0)
- VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity (2014) (0)
- A Study on Lightweight Authentication of RFID against Passive Attack in Ubiquitous Environment (2009) (0)
- Guest editorial: Theme issue on smartphone applications and services for pervasive computing (2011) (0)
- An efficient character input scheme with a gyro sensor of smartphone on ubiquitous cluster computing (2014) (0)
- A study on authentication/authorization/accounting and roaming mechanism in pervasive environment (2008) (0)
- Welcome message from the SKDM 2012 chairs (2012) (0)
- Safe-Driving Aid System Using Bi-directional Cameras (2017) (0)
- Erratum to: IT Convergence and Services (2013) (0)
- 8th International Conference on Computer Science and its Applications (CSA-16) and the 11st International Conference on Ubiquitous Information Technologies and Applications (CUTE 2016) (2017) (0)
- Erratum to: Information Technology Convergence (2013) (0)
- Service, Security and Its Data Management for Ubiquitous Computing - Overview (2007) (0)
- A shortest path planning algorithm for cloud computing environment based on multi-access point topology analysis for complex indoor spaces (2016) (0)
- Video transcoding scheme of multimedia data-hiding for multiform resources based on intra-cloud (2019) (0)
- Novel assessment method for accessing private data in social network security services (2017) (0)
- User Experience and Quality-of-Service in Internet of Things: Practice and Trends (2016) (0)
- An efficient approach to understanding social evolution of location-focused online communities in location-based services (2017) (0)
- Welcome message from NBiS 2012 general co-chairs (2012) (0)
- A smart assistant toward product-awareness shopping (2013) (0)
- Digital evidence discovery of networked multimedia smart devices based on social networking activities (2013) (0)
- Efficient model of Korean graphemes based on a smartphone keyboard (2013) (0)
- Advances in Computer Science and Ubiquitous Computing - CSA/CUTE 2017, Taichung, Taiwan, 18-20 December (2018) (0)
- Development Direction for Information Security in Network-Centric Warfare (2012) (0)
- A Study on Lightweight Authentication·Authorization·Accounting for Mobile Device (2009) (0)
- Cloud computing-based jam management for a manufacturing system in a Green IT environment (2013) (0)
- A network element management system for managing H.323 gatekeepers (2004) (0)
- Advances in security and multimodality for pervasive computing environments (2013) (0)
- Mining Social Media for Knowledge Discovery (2015) (0)
- SH 2010: Welcome message from workshop organizers: FutureTech 2010 (2010) (0)
- RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services (2009) (0)
- Welcome Message from the General Chairs (2021) (0)
- Special Issue on Advanced Information Security for Secure and Trust Computing (2013) (0)
- Message from the Workshop Co-Organizers (2009) (0)
- Introduction to the Special Section on Artificial Intelligence-based Information Security (2020) (0)
- Time Stamp Protocol for Smart Environment Services (2008) (0)
- Rhythm-Based Authentication Scheme on Smart Devices (2014) (0)
- Intelligent internet computing: applications and security systems (2010) (0)
- A secure smart-work service model based OpenStack for Cloud computing (2013) (0)
- Privacy-enhanced Key Recovery in mobile communication environments (2010) (0)
- Special Section On Embedded System And Software For IPC Guest Editorial - Guest Editorial (2009) (0)
- Welcome message from the general chairs MUE 2008 (2008) (0)
- Design and Simulation of Access Router Discovery Process in Mobile Environments (2013) (0)
- An Efficient Dynamic Integration Middleware for Cyber-Physical Systems in Mobile Environments (2012) (0)
- Algorithms, Processes, and Services for Future ICT (2020) (0)
- Advances in Communication and Networking: Second International Conference on Future Generation Communication and Networking, FGCN 2008, Sanya, Hainan Island, ... in Computer and Information Science) (2009) (0)
- IPS/UMS/WNGS/MUS 2008 workshop message from the workshop organizers MUE 2008 (2008) (0)
- RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks (2014) (0)
- SLP-MCAF: Multiple Clusters of Connected Vehicles Authentication Framework in a Smart Life Platform (2018) (0)
- Enhanced Integrated Algorithm & Software Architecture (2018) (0)
- A Study on Moving Target Defense Issue and Certification Requirements (2018) (0)
- Adaptive network-based fuzzy inference model on CPS for large scale intelligent and cooperative surveillance (2013) (0)
- Human-centric storage resource mechanism for big data on cloud service architecture (2015) (0)
- Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device (2012) (0)
- Automatic Generation of Ortho-Photo Texture from Digital Elevation Model (2017) (0)
- [Editorial] Advanced Technologies and Applications for Security and Multimedia Computing (2016) (0)
- New Approaches to Advanced Network and Image Processing (2017) (0)
- Traffic Speed Prediction Based on Graph Neural Networks for Intelligent Transportation System (2021) (0)
- Analyses and Considerations for Research Trends of Smart Home (2017) (0)
- Multimedia Services and Applications (2010) (0)
- Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing (2015) (0)
- Consideration for Improving the Vulnerability of the Cloud Hypervisor Architecture (2020) (0)
- Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems (2007) (0)
- An efficient route scheduling mechanism for WiMAX network – ERRATUM (2014) (0)
- DFA-AD: a distributed framework architecture for the detection of advanced persistent threats (2016) (0)
- Third Party Application Analysis For Mobile Forensics Study (2017) (0)
- Editorial Intelligent Systems for Future GenerationWireless Networks (2008) (0)
- Security Simulation Modeling Using Contract Net Protocol (2009) (0)
- IS 2007 PC Co-chairs' Message (2007) (0)
- A rhythm-based access control system for secure wellness services (2016) (0)
- SHSec: SDN based Secure Smart Home Network Architecture for Internet of Things (2018) (0)
- PMSN 2009 Organizing and Program Committees (2009) (0)
- An Analysis on Online Social Network Security (2017) (0)
- Efficient Clustering Simulator for Hierarchical Management of High-Risk with Wellness (2014) (0)
- Advanced Data Processing, Optimization & Software Engineering (2018) (0)
- Service based AEHS for human centric learning environments (2015) (0)
- A Study on the Performance Improvement of Impulse-Radio System in Multiple Interference Environment (2011) (0)
- IP spoofing based DoS Attack Countermeasures and Consideration (2020) (0)
- Research Trends and Considerations of Security Technology of Industrial Control System (2018) (0)
- A Study on Linked Platform and Techonology of Big Data and IoT (2017) (0)
- Intelligent Systems for Future Generation Wireless Networks (2008) (0)
- The 2nd International Workshop on Web and Pervasive Security (WPS 2008) (2008) (0)
- Multimedia Services and Applications J.UCS Special Issue (2011) (0)
- Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016 (2017) (0)
- A Flexible DRM System Considering Ubiquitous Environment (2006) (0)
- Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI (2006) (0)
- A Middleware and Security for in Internet of Things (2017) (0)
- Guest Editorial: Technologies and Applications for Interactive NUX/NUI (2016) (0)
- Research Trends and Considerations of Invasion Threat and Countermeasures for Connected Car Security (2018) (0)
- Network security and digital forensics in next generation communications (2011) (0)
- IMIS 2008 message from the workshop organizers MUE 2008 (2008) (0)
- Design and simulation of a hierarchical priority fairness scheduler in an uplink Worldwide Interoperability for Microwave Access system (2012) (0)
- An on-site digital investigation methodology for data leak case (2014) (0)
- HUC-HISF: A Hybrid Intelligent Security Framework for Human-centric Ubiquitous Computing (2012) (0)
- Recent advances and future directions in multimedia and mobile computing (2012) (0)
- Algorithms, Processes, and Frameworks for User-oriented Applications (2018) (0)
- Retraction notice to "Hybrid Layered Architecture forDetection and Analysis of Network Based Zero-day Attack"[COMCOM 106 (2017) 100-106] (2019) (0)
- A Secure Service Framework for Optimizing Driver’s Health Status (2016) (0)
- Intelligent state machine for social ad hoc data management and reuse (2015) (0)
- Reliable Blockchain Based Stochastic Game System (2019) (0)
- Cybersecurity Crowdsensing Multimedia Data : Security and Privacy Issues (2017) (0)
- RFID Mutual Authentication Protocol with Security and Performance Improvements (2009) (0)
- Data center selection based on neuro-fuzzy inference systems in cloud computing environments (2011) (0)
- Research trends in cloud, cluster and grid computing (2012) (0)
- Strategic Approach to the Security Issues in SCADA Networks (2008) (0)
- A Case Study for Forensic Investigation Concerning Malformed Flash Drive and Unknown Graphic Image Files (2009) (0)
- A Study on Artificial Intelligence based Intrusion Detection System for Internet of Things (2018) (0)
- Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network (2011) (0)
- Erratum to: Effective session key distribution for secure fast handover in mobile networks (2013) (0)
- Multimedia technology for pervasive computing environment (2013) (0)
- Topic Map Based Ontology Model for SaaS Application in Cloud Computing (2014) (0)
- The Quality Attribute for Embedded System and Application (2012) (0)
- A Pervasive Secret Sharing Scheme For Embedded Visual Communication System (2010) (0)
- An Efficient Locking Scheme for Touch Screens with Eight Waypoints on Smart Devices (2013) (0)
- Analyses and Considerations for Data base Security Requirements for Desktop Virtualization (2017) (0)
- A Study on Certification System for Assurance of Secure Information Security Product Development (2010) (0)
- Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment (2015) (0)
- Security Requirements and Countermeasures for Secure Home Network in Internet of Things (2016) (0)
- Modeling and Analysis of the Execution Context in WS-BPEL (2009) (0)
- Analyses and Considerations for Research Trends of User Interface on Wearable Devices (2017) (0)
- The Dynamic Software Development Process for Industrial Manufacturing System (2013) (0)
- Preface to Special Section on Intelligent Multimedia Systems and Data Management for UBI-COM (2011) (0)
- A cache-based search algorithm in unstructured P2P networks (2011) (0)
- A Centralized-Abstraction and Replicated-View Architecture Running on Ubiquitous Networks for Collaborative Multimedia Distance Education Services (2007) (0)
- Algorithms and Architectures for Parallel Processing, 10th International Conference, ICA3PP 2010, Busan, Korea, May 21-23, 2010. Proceedings. Part II (2010) (0)
- A Trend of Information Security Management for an E-Enterprise (2008) (0)
- Solving Standard Cell Placement Problem Using Discrete Firefly Algorithm: A Nature Inspired Approach (2016) (0)
- Trusted virtual machine monitor-based group signature architecture (2008) (0)
This paper list is powered by the following services:
Other Resources About Jong Hyuk Park
What Schools Are Affiliated With Jong Hyuk Park?
Jong Hyuk Park is affiliated with the following schools: