default search action
Tae Ho Cho
- > Home > Persons > Tae Ho Cho
Publications
- 2020
- [j32]Su Man Nam, Tae Ho Cho:
Discrete event simulation-based energy efficient path determination scheme for probabilistic voting-based filtering scheme in sensor networks. Int. J. Distributed Sens. Networks 16(8): 155014772094913 (2020) - 2017
- [j26]Su Man Nam, Tae Ho Cho:
Context-Aware Architecture for Probabilistic Voting-based Filtering Scheme in Sensor Networks. IEEE Trans. Mob. Comput. 16(10): 2751-2763 (2017) - 2015
- [j24]Su Man Nam, Tae Ho Cho:
A fuzzy rule-based path configuration method for LEAP in sensor networks. Ad Hoc Networks 31: 63-79 (2015) - [c41]Su Man Nam, Tae Ho Cho:
A Method to Select Next Hop Node for Improving Energy Efficiency in LEAP-Based WSNs. ICIC (1) 2015: 639-648 - 2014
- [c40]Su Man Nam, Tae Ho Cho:
Improvement of energy consumption and detection power for PVFS in wireless sensor networks. ICMU 2014: 129-134 - 2013
- [j22]Jin Myoung Kim, Tae Ho Cho:
Location-Based Key Management Structure for Secure Group Communication in Wireless Sensor Networks. IEICE Trans. Commun. 96-B(9): 2183-2189 (2013) - 2012
- [c38]Su Man Nam, Tae Ho Cho:
A Method for the Enhancement of the Detection Power and Energy Savings against False Data Injection Attacks in Wireless Sensor Networks. ICIC (1) 2012: 547-554 - 2011
- [j20]Hae Young Lee, Tae Ho Cho:
Optimized Fuzzy Adaptive Filtering for Ubiquitous Sensor Networks. IEICE Trans. Commun. 94-B(6): 1648-1656 (2011) - [j19]Jin Myoung Kim, Youngshin Han, Hae Young Lee, Tae Ho Cho:
Path Renewal Method in Filtering Based Wireless Sensor Networks. Sensors 11(2): 1396-1404 (2011) - [c37]Jin Myoung Kim, Tae Ho Cho:
A* Based Cutting Plan Generation for Metal Grating Production. ACIIDS (2) 2011: 402-410 - [c36]Byung Hee Kim, Tae Ho Cho:
Key Distribution Method for Enhancing Secure Performances in Dynamic Filtering-Based Wireless Sensor Network. FGIT-CA/CES3 2011: 220-226 - [c35]Jin Myoung Kim, Hae Young Lee, Ingeol Chun, Wontae Kim, Seung-Min Park, Tae Ho Cho:
Location Based Hierarchical Secure Multicast Group Building in Wireless Sensor Networks. MUE 2011: 28-32 - [c34]Chung Il Sun, Tae Ho Cho:
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs. WISA 2011: 232-241 - 2010
- [j17]Hae Young Lee, Tae Ho Cho:
A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks. IEICE Trans. Commun. 93-B(7): 1881-1889 (2010) - [j16]Hae Young Lee, Seung-Min Park, Tae Ho Cho:
Simulation Modeling of SAM Fuzzy Logic Controllers. IEICE Trans. Inf. Syst. 93-D(7): 1984-1986 (2010) - [j15]Sang Jin Lee, Hae Young Lee, Tae Ho Cho:
Environment-based Selection Method for En-route Filtering Scheme using Fuzzy Logic. J. Networks 5(3): 292-299 (2010) - [c31]Hae Young Lee, Tae Ho Cho, Hyung-Jong Kim:
Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks. ISA 2010: 128-137 - 2009
- [j14]Hae Young Lee, Tae Ho Cho:
Fuzzy-Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks. IEICE Trans. Inf. Syst. 92-D(8): 1574-1576 (2009) - [j13]Chung Il Sun, Hae Young Lee, Tae Ho Cho:
A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks. J. Inf. Sci. Eng. 25(4): 1163-1175 (2009) - [c27]Sang Jin Lee, Hae Young Lee, Tae Ho Cho:
Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. ICUIMC 2009: 597-601 - 2008
- [j11]Hae Young Lee, Tae Ho Cho:
A* -based layout design for gratings allocation. Comput. Aided Des. 40(4): 455-464 (2008) - [j10]Jin Myoung Kim, Tae Ho Cho:
A*-based key tree structure generation for group key management in wireless sensor networks. Comput. Commun. 31(10): 2414-2419 (2008) - [j9]Sang Ryul Kim, Hae Young Lee, Tae Ho Cho:
Fuzzy Adaptive Partitioning Method for the Statistical Filtering. IEICE Trans. Inf. Syst. 91-D(7): 2065-2067 (2008) - [c26]Byung Hee Kim, Tae Ho Cho:
Selective Sensor Node Selection Method for Making Suitable Cluster in Filtering-Based Sensor Networks. ICIC (1) 2008: 636-643 - [c25]Hae Young Lee, Tae Ho Cho:
A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic. ICIC (1) 2008: 1234-1241 - [c24]Byung Hee Kim, Tae Ho Cho:
Efficient selection method of message authentication codes for filtering scheme in sensor networks. ICUIMC 2008: 511-514 - 2007
- [j7]Hae Young Lee, Tae Ho Cho:
Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks. IEICE Trans. Commun. 90-B(12): 3346-3353 (2007) - [j6]Byung Hee Kim, Hae Young Lee, Tae Ho Cho:
Fuzzy Rule-Based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks. Int. J. Inf. Acquis. 4(3): 273-280 (2007) - [c23]Hae Young Lee, Tae Ho Cho:
Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks. ICCSA (2) 2007: 573-583 - [c22]Jin Myoung Kim, Tae Ho Cho:
Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function. ICCSA (3) 2007: 637-648 - [c20]Byung Hee Kim, Hae Young Lee, Tae Ho Cho:
Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks. ICIC (1) 2007: 263-272 - [c19]Jin Myoung Kim, Tae Ho Cho:
Genetic Algorithm Based Routing Method for Efficient Data Transmission in Sensor Networks. ICIC (1) 2007: 273-282 - [c18]Hae Young Lee, Tae Ho Cho:
Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks. IEA/AIE 2007: 64-73 - [c17]Hae Young Lee, Tae Ho Cho:
Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. UIC 2007: 535-544 - 2006
- [c14]Hae Young Lee, Tae Ho Cho:
Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. ICDCIT 2006: 116-127 - [c13]Mi Ra Yi, Jihyun Hong, Tae Ho Cho:
Genetic Algorithms for Improving Material Utilization in Manufacturing. ICIC (1) 2006: 717-724 - [c12]Hae Young Lee, Tae Ho Cho:
Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks. MICAI 2006: 112-121 - 2005
- [c11]Hee Suk Seo, Tae Ho Cho:
Application of Fuzzy Logic for Distributed Intrusion Detection. CIS (2) 2005: 340-347 - 2004
- [c9]Mi Ra Yi, Tae Ho Cho:
Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System. AIS 2004: 71-80 - [c8]Won Young Lee, Hee Suk Seo, Tae Ho Cho:
Modeling of Policy-Based Network with SVDB. AIS 2004: 323-332 - [c7]HyungJong Kim, Joonmo Kim, Kang Shin Lee, Hongsub Lee, Tae Ho Cho:
Simulation-Based Security Testing for Continuity of Essential Service. ICCSA (1) 2004: 567-576 - [c6]Hee Suk Seo, Tae Ho Cho:
Distributed Security Agent Modeling in the Policy-Based Networking. PDCAT 2004: 782-786 - 2003
- [j4]Mi Ra Yi, Tae Ho Cho:
Hierarchical simulation model with animation. Eng. Comput. 19(2-3): 203-212 (2003) - [j2]Hee Suk Seo, Tae Ho Cho:
Simulation Model Design of a Security System Based on a Policy-Based Framework. Simul. 79(9): 515-527 (2003) - [c5]Hee Suk Seo, Tae Ho Cho, Sung-Do Chi:
Modeling and Simulation of Distributed Security Models. International Conference on Computational Science 2003: 809-818 - 2002
- [c4]Hee Suk Seo, Tae Ho Cho:
Modeling and Simulation for Detecting a Distributed Denial of Service Attack. Australian Joint Conference on Artificial Intelligence 2002: 179-190 - [c3]Jong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim:
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies. ICICS 2002: 374-385 - 2001
- [c2]Hee Suk Seo, Tae Ho Cho:
Simulation of Network Security with Collaboration among IDS Models. Australian Joint Conference on Artificial Intelligence 2001: 438-448 - [c1]Mi Ra Yi, Tae Ho Cho:
Hierarchical Simulation Model with Animation for Large Network Security. ICICS 2001: 456-460
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint