Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Tai-Hoon Kim
2010 – today
- 2013
[j36]Daniel Servos, Sabah Mohammed, Jinan Fiaidhi, Tai-Hoon Kim: Extensions to ciphertext-policy attribute-based encryption to support distributed environments. IJCAT 47(2/3): 215-226 (2013)
[j35]Debnath Bhattacharyya, Anindya Jyoti Pal, Tai-Hoon Kim: Cell-graph coloring for cancerous tissue modelling and classification. Multimedia Tools Appl. 66(2): 229-245 (2013)
[j34]Krishna Bhowal, Debnath Bhattacharyya, Anindya Jyoti Pal, Tai-Hoon Kim: A GA based audio steganography with enhanced security. Telecommunication Systems 52(4): 2197-2204 (2013)
[j33]Tai-Hoon Kim, Sabah Mohammed: Editorial of special section on multimedia applications and ubiquitous computing. The Journal of Supercomputing 65(1): 1-3 (2013)
[j32]Tai-Hoon Kim, Sabah Mohammed: Toward designing a secure biosurveillance cloud. The Journal of Supercomputing 65(1): 61-70 (2013)
[j31]Jung-Ho Um, Hoon Choi, Sa-Kwang Song, Sung-Pil Choi, Hwa-Mook Yoon, Hanmin Jung, Tai-Hoon Kim: Development of a virtualized supercomputing environment for genomic analysis. The Journal of Supercomputing 65(1): 71-85 (2013)- 2012
[j30]Mohamed Hamdi, Nabil Tabbane, Tai-Hoon Kim, Sajid Hussain: Web Services in Multimedia Communication. Adv. in MM 2012 (2012)
[j29]Hoon Ko, Kyung-jin An, Tai-Hoon Kim, Goreti Marreiros, Zita Vale, Jong-Myoung Choi: A study on dynamic state information (DSI) around users for safe urban life. Computers & Mathematics with Applications 63(2): 554-563 (2012)
[j28]Guoliang He, Naixue Xiong, Laurence Tianruo Yang, Tai-Hoon Kim, Ching-Hsien Hsu, Yuanxiang Li, Ting Hu: Evolvable hardware design based on a novel simulated annealing in an embedded system. Concurrency and Computation: Practice and Experience 24(4): 354-370 (2012)
[j27]Yujin Lim, Hak-Man Kim, Sanggil Kang, Tai-Hoon Kim: Vehicle-to-grid communication system for electric vehicle charging. Integrated Computer-Aided Engineering 19(1): 57-65 (2012)
[j26]Luis Javier García-Villalba, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco, Tai-Hoon Kim: Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks. IJDSN 2012 (2012)
[j25]Luis Javier García-Villalba, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco, Tai-Hoon Kim: Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks. IJDSN 2012 (2012)
[j24]Tz-Heng Hsu, Tai-Hoon Kim, Chao-Chun Chen, Jyun-Sian Wu: A Dynamic Traffic-Aware Duty Cycle Adjustment MAC Protocol for Energy Conserving in Wireless Sensor Networks. IJDSN 2012 (2012)
[j23]Hye-Jin Kim, Ronnie D. Caytiles, Tai-Hoon Kim: Design of an Effective WSN-Based Interactive u-Learning Model. IJDSN 2012 (2012)
[j22]Tai-Hoon Kim, Wai-Chi Fang, Carlos Ramos, Sabah Mohammed, Osvaldo Gervasi, Adrian Stoica: Ubiquitous Sensor Networks and Its Application. IJDSN 2012 (2012)
[j21]Ana Lucila Sandoval Orozco, Julián García Matesanz, Luis Javier García-Villalba, José Duván Márquez Díaz, Tai-Hoon Kim: Security Issues in Mobile Ad Hoc Networks. IJDSN 2012 (2012)
[j20]Aboul Ella Hassanien, Tai-Hoon Kim: Breast cancer MRI diagnosis approach using support vector machine and pulse coupled neural networks. J. Applied Logic 10(4): 277-284 (2012)
[j19]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Tai-Hoon Kim, Hassan M. Elkamchouchi: Mobile one-time passwords: two-factor authentication using mobile phones. Security and Communication Networks 5(5): 508-516 (2012)
[c103]Mohamed Abd Elfattah, Mohamed A. Abu Elsoud, Aboul Ella Hassanien, Tai-Hoon Kim: Automated Classification of Galaxies Using Invariant Moments. FGIT 2012: 103-111
[c102]Mohamed Sami, Nashwa El-Bendary, Tai-Hoon Kim, Aboul Ella Hassanien: Using Particle Swarm Optimization for Image Regions Annotation. FGIT 2012: 241-250
[c101]Jinan Fiaidhi, Osama Mohammed, Sabah Mohammed, Simon Fong, Tai-Hoon Kim: Mining twitterspace for information: Classifying sentiments programmatically using Java. ICDIM 2012: 303-308
[c100]Jinan Fiaidhi, Osama Mohammed, Sabah Mohammed, Simon Fong, Tai-Hoon Kim: Opinion mining over twitterspace: Classifying tweets programmatically using the R approach. ICDIM 2012: 313-319
[c99]Jinan Fiaidhi, Michael D. Rioux, Sabah Mohammed, Tai-Hoon Kim: Developing Casual Learning Games Using the Apache Pivot IIA Capabilities. NDT (1) 2012: 1-10
[e32]Aboul Ella Hassanien, Abdel-Badeeh M. Salem, Rabie Ramadan, Tai-Hoon Kim (Eds.): Advanced Machine Learning Technologies and Applications - First International Conference, AMLTA 2012, Cairo, Egypt, December 8-10, 2012. Proceedings. Communications in Computer and Information Science 322, Springer 2012, ISBN 978-3-642-35325-3
[e31]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang, Seung-Jung Shin (Eds.): Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part I. Communications in Computer and Information Science 262, Springer 2012, ISBN 978-3-642-27203-5
[e30]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, Thanos Vasilakos, Adrian Stoica, Charalampos Z. Patrikakis, Gansen Zhao, L. Javier García-Villalba, Yang Xiao (Eds.): Communication and Networking - International Conference, FGCN 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part I. Communications in Computer and Information Science 265, Springer 2012, ISBN 978-3-642-27191-5
[e29]Tai-Hoon Kim, Young-Hoon Lee, Wai-Chi Fang (Eds.): Future Generation Information Technology - 4th International Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings. Lecture Notes in Computer Science 7709, Springer 2012, ISBN 978-3-642-35584-4- 2011
[j18]Ruay-Shiung Chang, Tai-Hoon Kim: Special Section: Future Generation Information Technology. Future Generation Comp. Syst. 27(4): 370-371 (2011)
[j17]Tai-Hoon Kim, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay: Supervised chromosome clustering and image classification. Future Generation Comp. Syst. 27(4): 372-376 (2011)
[j16]Naveen K. Chilamkurti, Ben Soh, Tai-Hoon Kim: Special issue on security and privacy in wireless systems. Security and Communication Networks 4(7): 727-728 (2011)
[j15]Tai-Hoon Kim, Omer F. Rana, Juan Touriño, Isaac Woungang: Special issue on "Theory and practice of high-performance computing, communications, and security". The Journal of Supercomputing 55(2): 123-125 (2011)
[c98]Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim: A rough k-means fragile watermarking approach for image authentication. FedCSIS 2011: 19-23
[c97]Hossam M. Zawbaa, Nashwa El-Bendary, Aboul Ella Hassanien, Tai-Hoon Kim: Machine Learning-Based Soccer Video Summarization System. FGIT-MulGraB (2) 2011: 19-28
[c96]Armen Bagdasaryan, Tai-Hoon Kim: A Model of Hierarchically Consistent Control of Nonlinear Dynamical Systems. FGIT-CA/CES3 2011: 58-64
[c95]Armen Bagdasaryan, Tai-Hoon Kim: Mathematical Model and Analysis of Reliability and Safety of Large Database Systems. FGIT-DTA/BSBT 2011: 61-70
[c94]Masitah Ahmad, Jemal H. Abawajy, Tai-Hoon Kim: Service Quality Assessment in Provision of Library Services. FGIT-UNESST 2011: 83-92
[c93]Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim: A Fast and Secure One-Way Hash Function. FGIT-SecTech 2011: 85-93
[c92]Debnath Bhattacharyya, Tai-Hoon Kim, Gang-soo Lee: Leaf Image Analysis towards Plant Identification. FGIT-SIP 2011: 113-125
[c91]Debnath Bhattacharyya, Tai-Hoon Kim, Gang-soo Lee: Watermarking Using Multiresolution Cosine Transformation: A Review. FGIT-SIP 2011: 126-139
[c90]Debnath Bhattacharyya, Tai-Hoon Kim, Gang-soo Lee: Use of Artificial Neural Network in Bengali Character Recognition. FGIT-SIP 2011: 140-152
[c89]Rajib Ghosh, Debnath Bhattacharyya, Tai-Hoon Kim, Gang-soo Lee: New Algorithm for Skewing Detection of Handwritten Bangla Words. FGIT-SIP 2011: 153-159
[c88]F. Eid Heba, Mostafa A. Salama, Aboul Ella Hassanien, Tai-Hoon Kim: Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification. FGIT-SecTech 2011: 195-203
[c87]Nabanita Mukherjee, Imon Mukherjee, Debnath Bhattacharyya, Tai-Hoon Kim: Context Based Speech Analysis of Bengali Language as a Part of TTS Conversion. FGIT-SIP 2011: 204-214
[c86]F. Eid Heba, Ashraf Darwish, Aboul Ella Hassanien, Tai-Hoon Kim: Intelligent Hybrid Anomaly Network Intrusion Detection System. FGIT-FGCN (1) 2011: 209-218
[c85]Mostafa A. Salama, Aboul Ella Hassanien, Aly A. Fahmy, Tai-Hoon Kim: Heart Sound Feature Reduction Approach for Improving the Heart Valve Diseases Identification. FGIT-SIP 2011: 280-290
[c84]Fabio Buiati, Luis Javier García-Villalba, Delfín Rupérez Cañas, Tai-Hoon Kim: Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service. FGIT-MulGraB (2) 2011: 290-294
[c83]Julio César Rodríguez Ribón, Luis Javier García-Villalba, Tomás Pedro de Miguel Moro, Tai-Hoon Kim: Grid of Learning Resources in E-learning Communities. FGIT-MulGraB (2) 2011: 295-299
[c82]Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba, Tai-Hoon Kim: A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks. FGIT-MulGraB (2) 2011: 300-304
[c81]Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba, Tai-Hoon Kim: Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension. FGIT-MulGraB (2) 2011: 305-309
[c80]Jemal H. Abawajy, Tai-Hoon Kim: Engaging and Effective Asynchronous Online Discussion Forums. FGIT-ASEA/DRBC/EL 2011: 695-705
[c79]Jemal H. Abawajy, Tai-Hoon Kim: Online Learning Environment: Taxonomy of Asynchronous Online Discussion Forums. FGIT-ASEA/DRBC/EL 2011: 706-714
[c78]Hoon Ko, Goreti Marreiros, Kyung-jin An, Zita Vale, Tai-Hoon Kim, Jong-Myoung Choi: Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design. IMIS 2011: 65-72
[c77]Maricel O. Balitanas, Seung-Hwan Jeon, Tai-Hoon Kim: Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System. ISA 2011: 211-218
[c76]Rosslin John Robles, Tai-Hoon Kim: Application Program Interface as Back-Up Data Source for SCADA Systems. ISA 2011: 219-226
[c75]Maricel O. Balitanas, Tai-Hoon Kim: Supervisory Control and Data Acquisition System CAIN Issues. ISA 2011: 227-235
[e28]Tai-Hoon Kim, Hojjat Adeli, Adrian Stoica, Byeong Ho Kang (Eds.): Control and Automation, and Energy System Engineering - International Conferences, CA and CES3 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 256, Springer 2011, ISBN 978-3-642-26009-4
[e27]Tai-Hoon Kim, Hojjat Adeli, Haeng-Kon Kim, Heau-Jo Kang, Kyung Jung Kim, Kiumi Akingbehin, Byeong Ho Kang (Eds.): Software Engineering, Business Continuity, and Education - International Conferences ASEA, DRBC and EL 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 257, Springer 2011, ISBN 978-3-642-27206-6
[e26]Tai-Hoon Kim, Hojjat Adeli, Alfredo Cuzzocrea, Tughrul Arslan, Yanchun Zhang, Jianhua Ma, Kyo-Il Chung, Siti Mariyam Hj. Shamsuddin, Xiaofeng Song (Eds.): Database Theory and Application, Bio-Science and Bio-Technology - International Conferences, DTA and BSBT 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2001 in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 258, Springer 2011, ISBN 978-3-642-27156-4
[e25]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, L. Javier García-Villalba, Kirk P. Arnett, Muhammad Khurram Khan (Eds.): Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 259, Springer 2011, ISBN 978-3-642-27188-5
[e24]Tai-Hoon Kim, Hojjat Adeli, Carlos Ramos, Byeong Ho Kang (Eds.): Signal Processing, Image Processing and Pattern Recognition - International Conference, SIP 2011, Held as Part of the Future Generation Information Technology Conference FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 260, Springer 2011, ISBN 978-3-642-27182-3
[e23]Tai-Hoon Kim, Hojjat Adeli, Hyun-seob Cho, Osvaldo Gervasi, Stephen S. Yau, Byeong Ho Kang, L. Javier García-Villalba (Eds.): Grid and Distributed Computing - International Conference, GDC 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 261, Springer 2011, ISBN 978-3-642-27179-3
[e22]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang, Seung-Jung Shin (Eds.): Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II. Communications in Computer and Information Science 263, Springer 2011, ISBN 978-3-642-27185-4
[e21]Tai-Hoon Kim, Hojjat Adeli, Jianhua Ma, Wai-Chi Fang, Byeong Ho Kang, Byungjoo Park, Frode Eika Sandnes, Kun Chang Lee (Eds.): U- and E-Service, Science and Technology - International Conference, UNESST 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 264, Springer 2011, ISBN 978-3-642-27209-7
[e20]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, Thanos Vasilakos, Adrian Stoica, Charalampos Z. Patrikakis, Gansen Zhao, L. Javier García-Villalba, Yang Xiao (Eds.): Communication and Networking - International Conference, FGCN 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II. Communications in Computer and Information Science 266, Springer 2011, ISBN 978-3-642-27200-4
[e19]Tai-Hoon Kim, Hojjat Adeli, Dominik Slezak, Frode Eika Sandnes, Xiaofeng Song, Kyo-Il Chung, Kirk P. Arnett (Eds.): Future Generation Information Technology - Third International Conference, FGIT 2011 in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Lecture Notes in Computer Science 7105, Springer 2011, ISBN 978-3-642-27141-0
[e18]Tai-Hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel O. Balitanas (Eds.): Information Security and Assurance - International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings. Communications in Computer and Information Science 200, Springer 2011, ISBN 978-3-642-23140-7- 2010
[j14]Zhao Wu, Naixue Xiong, Jong Hyuk Park, Tai-Hoon Kim, Lei Yuan: A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition. Comput. J. 53(2): 219-233 (2010)
[j13]Naixue Xiong, Jing He, Yan Yang, Yanxiang He, Tai-Hoon Kim, Chuan Lin: A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper). JCM 5(1): 31-38 (2010)
[c74]Jemal H. Abawajy, Tai-Hoon Kim: Performance Analysis of Cyber Security Awareness Delivery Methods. FGIT-SecTech/DRBC 2010: 142-148
[c73]Rizwan Ahmad, Saif ur Rehman Khan, Aamer Nadeem, Tai-Hoon Kim: ISARE: An Integrated Software Architecture Reuse and Evaluation Framework. FGIT-ASEA 2010: 174-187
[c72]Mahreen Ahmad, Aamer Nadeem, Tai-Hoon Kim: An Automated Approach to Testing Polymorphic Features Using Object-Z. FGIT-ASEA 2010: 195-207
[c71]Rituparna Samaddar, Sandip Samaddar, Tai-Hoon Kim, Debnath Bhattacharyya: Hierarchical Data Structures for Accessing Spatial Data. FGIT-SIP/MulGraB 2010: 267-274
[c70]Rosslin John Robles, Haeng-Kon Kim, Tai-Hoon Kim: Internet SCADA Utilizing API's as Data Source. FGIT-SecTech/DRBC 2010: 269-275
[c69]Shilpi Saha, Debnath Bhattacharyya, Tai-Hoon Kim: OSI Layer Wise Security Analysis of Wireless Sensor Network. FGIT-SIP/MulGraB 2010: 275-282
[c68]Maricel O. Balitanas, Tai-Hoon Kim: Insecure Information System's Solution Using Isolation Method. FGIT-SecTech/DRBC 2010: 276-281
[c67]Rosslin John Robles, Tai-Hoon Kim: Communication Security for Control Systems in Smart Grid. FGIT-SecTech/DRBC 2010: 282-289
[c66]Prasun Chakrabarti, Jayanta Kumar Basu, Tai-Hoon Kim: Business Planning in the Light of Neuro-fuzzy and Predictive Forecasting. FGIT-SIP/MulGraB 2010: 283-290
[c65]Subhra Pramanik, Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Tai-Hoon Kim: Identification of Plant Using Leaf Image Analysis. FGIT-SIP/MulGraB 2010: 291-303
[c64]Maricel O. Balitanas, Tai-Hoon Kim: Using Incentives to Reduce Active Network Privacy Threats and Vulnerabilities. FGIT-SIP/MulGraB 2010: 304-316
[c63]Rosslin John Robles, Tai-Hoon Kim: Security Encryption Scheme for Communication of Web Based Control Systems. FGIT-SIP/MulGraB 2010: 317-325
[c62]Gladys Benigni, Osvaldo Gervasi, Francesco Luca Passeri, Tai-Hoon Kim: USABAGILE_Web: A Web Agile Usability Approach for Web Site Design. ICCSA (2) 2010: 422-431
[c61]Debnath Bhattacharyya, Arup Kumar Bhaumik, Minkyu Choi, Tai-Hoon Kim: Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. AST/UCMA/ISA/ACN 2010: 61-69
[c60]Debnath Bhattacharyya, Arijit Chakraborty, Feruza Sattarova Yusufovna, Young-hun Lee, Tai-Hoon Kim: Lane Design for Speed Optimization. ISA 2010: 97-107
[c59]Debnath Bhattacharyya, A. Shrotri, S. C. Rethrekar, M. H. Patil, Farkhod A. Alisherov, Tai-Hoon Kim: Biometric Authentication Using Infrared Imaging of Hand Vein Patterns. ISA 2010: 108-115
[c58]Maricel O. Balitanas, Tai-Hoon Kim: IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach. ISA 2010: 116-127
[c57]
[c56]Praveen Ranjan Srivastava, Tai-Hoon Kim: Agent Based Approach to Regression Testing. AST/UCMA/ISA/ACN 2010: 345-355
[e17]Tai-Hoon Kim, Haeng-Kon Kim, Muhammad Khurram Khan, Kiumi Akingbehin, Wai-Chi Fang, Dominik Slezak (Eds.): Advances in Software Engineering - International Conference, ASEA 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 117, Springer 2010, ISBN 978-3-642-17577-0
[e16]Tai-Hoon Kim, Alan Chin-Chen Chang, MingChu Li, Chunming Rong, Charalampos Z. Patrikakis, Dominik Slezak (Eds.): Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I. Communications in Computer and Information Science 119, Springer 2010, ISBN 978-3-642-17586-2
[e15]Tai-Hoon Kim, Thanos Vasilakos, Kouichi Sakurai, Yang Xiao, Gansen Zhao, Dominik Slezak (Eds.): Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II. Communications in Computer and Information Science 120, Springer 2010, ISBN 978-3-642-17603-6
[e14]Tai-Hoon Kim, Stephen S. Yau, Osvaldo Gervasi, Byeong Ho Kang, Adrian Stoica, Dominik Slezak (Eds.): Grid and Distributed Computing, Control and Automation - International Conferences, GDC and CA 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 121, Springer 2010, ISBN 978-3-642-17624-1
[e13]Tai-Hoon Kim, Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-Jo Kang, Dominik Slezak (Eds.): Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 122, Springer 2010, ISBN 978-3-642-17609-8
[e12]Tai-Hoon Kim, Sankar K. Pal, William I. Grosky, Niki Pissinou, Timothy K. Shih, Dominik Slezak (Eds.): Signal Processing and Multimedia - International Conferences, SIP and MulGraB 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 123, Springer 2010, ISBN 978-3-642-17640-1
[e11]Tai-Hoon Kim, Jianhua Ma, Wai-Chi Fang, Byungjoo Park, Byeong Ho Kang, Dominik Slezak (Eds.): U- and E-Service, Science and Technology - International Conference UNESST 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 124, Springer 2010, ISBN 978-3-642-17643-2
[e10]Tai-Hoon Kim, Young-Hoon Lee, Byeong Ho Kang, Dominik Slezak (Eds.): Future Generation Information Technology - Second International Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Lecture Notes in Computer Science 6485, Springer 2010, ISBN 978-3-642-17568-8
[e9]Samir Kumar Bandyopadhyay, Wael Adi, Tai-Hoon Kim, Yang Xiao (Eds.): Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 76, Springer 2010, ISBN 978-3-642-13364-0
[e8]Tai-Hoon Kim, Hojjat Adeli (Eds.): Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings. Lecture Notes in Computer Science 6059, Springer 2010, ISBN 978-3-642-13576-7
2000 – 2009
- 2009
[j12]Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen: SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems. Comput. J. 52(8): 861-870 (2009)
[j11]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Tai-Hoon Kim: Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. Comput. J. 52(8): 871-877 (2009)
[j10]Tai-Hoon Kim, Wai-Chi Fang: Special section: Grid/distributed computing systems security. Future Generation Comp. Syst. 25(3): 351 (2009)
[j9]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim: Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation. IJCNS 2(5): 363-370 (2009)
[j8]Chuan Lin, Naixue Xiong, Jong Hyuk Park, Tai-Hoon Kim: Dynamic power management in new architecture of wireless sensor networks. Int. J. Communication Systems 22(6): 671-693 (2009)
[j7]Binod Vaidya, Tai-Hoon Kim, Jong Hyuk Park, Young Jae Lee: Secure ubiquitous connectivity in hybrid multipath wireless ad hoc network. Int. J. Communication Systems 22(9): 1153-1176 (2009)
[j6]Debnath Bhattacharyya, Poulami Das, Tai-Hoon Kim, Samir Kumar Bandyopadhyay: Vascular Pattern Analysis towards Pervasive Palm Vein Authentication. J. UCS 15(5): 1081-1089 (2009)
[j5]Tai-Hoon Kim, Andrew Kusiak, David Taniar, Daqing Zhang: Intelligent Environments and Services. J. UCS 15(12): 2284-2286 (2009)
[j4]Rodrigo Fernandes de Mello, Rudinei Goularte, Evgueni Dodonov, Laurence Tianruo Yang, Jong Hyuk Park, Tai-Hoon Kim: On modeling and evaluating multicomputer transcoding architectures for live-video streams. Multimedia Tools Appl. 43(2): 109-129 (2009)
[j3]Naixue Xiong, Laurence T. Yang, Jong Hyuk Park, Xuefeng Liang, Tai-Hoon Kim: Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments. Wireless Personal Communications 51(1): 209-220 (2009)
[c55]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Rathit Bandyopadhyay, Samir Kumar Bandyopadhyay, Tai-Hoon Kim: Discrete Fourier Transformation based Image Authentication technique. IEEE ICCI 2009: 196-200
[c54]Feruza Sattarova Yusufovna, Farkhod Alisherov Alisherovich, Minkyu Choi, Eun-suk Cho, Furkhat Tadjibayev Abdurashidovich, Tai-Hoon Kim: Research on Critical Infrastructures and Critical Information Infrastructures. BLISS 2009: 97-101
[c53]Maricel O. Balitanas, Rosslin John Robles, Nayoun Kim, Tai-Hoon Kim: Crossed Crypto-Scheme in WPA PSK Mode. BLISS 2009: 102-106
[c52]Debnath Bhattacharyya, Poulami Das, Kheyali Mitra, Swarnendu Mukherjee, Debashis Ganguly, Samir Kumar Bandyopadhyay, Tai-Hoon Kim: Refine Crude Corpus for Opinion Mining. CICSyN 2009: 17-22
[c51]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim: Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme. CICSyN 2009: 374-379
[c50]Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim: Analysis of Handwritten Signature Image. FGIT-SecTech 2009: 43-50
[c49]Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim: Grayscale Image Classification Using Supervised Chromosome Clustering. FGIT-SecTech 2009: 64-71
[c48]Debnath Bhattacharyya, Debasri Chakraborty, Tai-Hoon Kim: Effective GIS Mobile Query System. FGIT 2009: 129-137
[c47]Tae (Tom) Oh, Young B. Choi, Michael Guthrie, Kristi Harold, Daniel Copeland, Tai-Hoon Kim: Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management. FGIT-FGCN 2009: 360-369
[e7]Dominik Slezak, Tai-Hoon Kim, Alan Chin-Chen Chang, Thanos Vasilakos, MingChu Li, Kouichi Sakurai (Eds.): Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 56, Springer 2009, ISBN 978-3-642-10843-3
[e6]Dominik Slezak, Tughrul Arslan, Wai-Chi Fang, Xiaofeng Song, Tai-Hoon Kim (Eds.): Bio-Science and Bio-Technology - International Conference, BSBT 2009 Held as Part of the Future Generation Information Technology Conference, FGIT 2009 Jeju Island, Korea, December 10-12, 2009 Proceedings. Communications in Computer and Information Science 57, Springer 2009, ISBN 978-3-642-10615-6
[e5]Dominik Slezak, Tai-Hoon Kim, Wai-Chi Fang, Kirk P. Arnett (Eds.): Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 58, Springer 2009, ISBN 978-3-642-10846-4
[e4]Dominik Slezak, Tai-Hoon Kim, Yanchun Zhang, Jianhua Ma, Kyo-Il Chung (Eds.): Database Theory and Application - International Conference, DTA 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 64, Springer 2009, ISBN 978-3-642-10582-1
[e3]Young-Hoon Lee, Tai-Hoon Kim, Wai-Chi Fang, Dominik Slezak (Eds.): Future Generation Information Technology, First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Lecture Notes in Computer Science 5899, Springer 2009, ISBN 978-3-642-10508-1
[e2]Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-Hoon Kim, Sang-Soo Yeo (Eds.): Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings. Lecture Notes in Computer Science 5576, Springer 2009, ISBN 978-3-642-02616-4- 2008
[j2]Govardhanan Kousalya, P. Narayanasamy, Jong Hyuk Park, Tai-Hoon Kim: Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS. Computer Communications 31(12): 2781-2789 (2008)
[j1]Deok-Gyu Lee, Jong Hyuk Park, Tai-Hoon Kim, Laurence Tianruo Yang: U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home. The Journal of Supercomputing 45(1): 88-104 (2008)
[c46]Naixue Xiong, Hongyan Li, Tai-Hoon Kim, Laurence Tianruo Yang: An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control Systems. FGCN (1) 2008: 116-121
[c45]Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-Hoon Kim: A Novel Approach for Infrastructure Deployment for VANET. FGCN (1) 2008: 234-238
[c44]Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-Hoon Kim: A Prioritized Service Protocol for Vehicular Communication. FGCN (1) 2008: 337-342
[c43]Chowdhury Sayeed Hyder, Anindya Iqbal, Une Thoing Rosi, Tai-Hoon Kim: Towards Automated Traffic System Using Vehicular Network with Directional Antenna. FGCN (1) 2008: 454-458
[c42]Yuanyuan Zeng, Naixue Xiong, Tai-Hoon Kim: Channel assignment and scheduling in multichannel wireless sensor networks. LCN 2008: 512-513
[c41]Deqing Zou, Jong Hyuk Park, Laurence Tianruo Yang, Zhensong Liao, Tai-Hoon Kim: A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. UIC 2008: 35-45- 2007
[c40]Tai-Hoon Kim, Seoksoo Kim, Gilcheol Park: Block Model Application for Decision Support Systems. BLISS 2007: 25-28
[c39]Hak-Man Kim, Dong-Joo Kang, Tai-Hoon Kim: Flexible Key Distribution for SCADA Network using Multi-Agent System. BLISS 2007: 29-34
[c38]Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashraf Masood: Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks. EUC Workshops 2007: 1-11
[c37]Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen: Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. FGCN (2) 2007: 71-75
[c36]Majid Alkaee Taleghan, Amirhosein Taherkordi, Mohsen Sharifi, Tai-Hoon Kim: A Survey of System Software for Wireless Sensor Networks. FGCN (2) 2007: 402-407
[c35]Chang Sun, Hong-Jun Wang, Hua Li, Tai-Hoon Kim: Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264. FGCN (1) 2007: 459-463
[c34]Jae-Dong Shin, Sang-Soo Yeo, Tai-Hoon Kim, Sung Kwon Kim: Hybrid Tag Anti-collision Algorithms in RFID Systems. International Conference on Computational Science (4) 2007: 693-700
[c33]Yong-tae Kim, Gilcheol Park, Tai-Hoon Kim, Sang-ho Lee: Security Evaluation for Information Assurance. ICCSA Workshops 2007: 227-230
[c32]Minseong Ju, Seoksoo Kim, Tai-Hoon Kim: A Study on Digital Media Security by Hopfield Neural Network. ISNN (3) 2007: 140-146
[c31]Tai-Hoon Kim, Kouichi Sakurai, Sun-myung Hwang: Induction and Implementation of Security Requirements in Each System Block. MMM (2) 2007: 694-701
[e1]Marcin S. Szczuka, Daniel Howard, Dominik Slezak, Haeng-Kon Kim, Tai-Hoon Kim, Il Seok Ko, Geuk Lee, Peter M. A. Sloot (Eds.): Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4413, Springer 2007, ISBN 978-3-540-77367-2- 2006
[c30]Tai-Hoon Kim, Seoksoo Kim, Hee-Un Park, Myoung-sub Kim: Analysis of Security Session Reusing in Distribution Server System. ICCSA (5) 2006: 700-707
[c29]In-hye Seo, Heau-Jo Kang, Tai-Hoon Kim: Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment. ICIC (1) 2006: 1062-1071
[c28]Mingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung: A Study on the Improvement of Military Logistics System Using RFID. ICIC (1) 2006: 1098-1102
[c27]Geuk Lee, Il Seok Ko, Tai-Hoon Kim: A Vulnerability Assessment Tool Based on OVAL in System Block Model. ICIC (1) 2006: 1115-1120
[c26]Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil: Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. KES (2) 2006: 701-708
[c25]Tai-Hoon Kim, Sun-myoung Hwang: Intelligent Method for Building Security Countermeasures. KES (2) 2006: 745-750
[c24]- 2005
[c23]Sang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha: Distribution Data Security System Based on Web Based Active Database. ICCSA (2) 2005: 341-352
[c22]Jae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee: Interference-Free ZCD-UWB for Wireless Home Network Applications. ICCSA (2) 2005: 429-441
[c21]Tai-Hoon Kim, Seung-youn Lee: Design Procedure of IT Systems Security Countermeasures. ICCSA (2) 2005: 468-473
[c20]Tai-Hoon Kim, Seung-youn Lee: Security Evaluation Targets for Enhancement of IT Systems Assurance. ICCSA (2) 2005: 491-498
[c19]Sang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha: Distribution Data Security System Based on Web Based Active Database. ICCSA (4) 2005: 1319-1330
[c18]Yangsun Lee, Heau-Jo Kang, Malrey Lee, Tai-Hoon Kim: A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System. ICIC (2) 2005: 665-674
[c17]Tai-Hoon Kim, Seung-youn Lee: Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. KES (2) 2005: 1069-1075
[c16]Tai-Hoon Kim, Seung-youn Lee: A Relationship Between Products Evaluation and IT Systems Assurance. KES (1) 2005: 1125-1130
[c15]Tai-Hoon Kim, Chang-hwa Hong, Myoung-sub Kim: Towards New Areas of Security Engineering. RSFDGrC (2) 2005: 568-574- 2004
[c14]Eun-Ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung: Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. ICCSA (1) 2004: 451-460
[c13]Haeng-Kon Kim, Tai-Hoon Kim: Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. ICCSA (1) 2004: 461-470
[c12]Tai-Hoon Kim, Haeng-Kon Kim: A Relationship between Security Engineering and Security Evaluation. ICCSA (4) 2004: 717-724
[c11]Tai-Hoon Kim, Dong Chun Lee: Reduction Method of Threat Phrases by Classifying Assets. ICCSA (1) 2004: 1052-1059
[c10]
[c9]Tai-Hoon Kim, Myong-chul Shin, Sang-ho Kim, Jae Sang Cha: Security Requirements for Software Development. KES 2004: 116-122
[c8]Tai-Hoon Kim, Ho-yeol Kwon: Applying Security Engineering to Build Security Countermeasures: An Introduction. PARA 2004: 957-963
[c7]Seung-youn Lee, Myong-chul Shin, Jae Sang Cha, Tai-Hoon Kim: Threat Description for Developing Security Countermeasure. PCM (1) 2004: 548-555- 2003
[c6]Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. International Conference on Computational Science 2003: 605-614
[c5]Sang-ho Kim, Eun-ser Kim, Choon Seong Leem, Ho-jun Shin, Tai-Hoon Kim: SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC. ISCIS 2003: 1069-1075
[c4]Sang-ho Kim, Choon Seong Leem, Tai-Hoon Kim, Jae-Sung Kim: Supplement of Security-Related Parts of ISO/IEC TR 15504. ISCIS 2003: 1084-1089
[c3]Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim: Reliability Assurance in Development Process for TOE on the Common Criteria. SERA 2003: 364-375
[c2]
[c1]Tai-Hoon Kim, Jae-Sung Kim, Eun-Kyoung Yi, Haeng-Kon Kim: A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC. SNPD 2003: 170-176
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:07 CEST by the dblp team



