default search action
Kangbin Yim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Md Rezanur Islam, Mahdi Sahlabadi, Keunkyoung Kim, Yoonji Kim, Kangbin Yim:
CF-AIDS: Comprehensive Frequency-Agnostic Intrusion Detection System on In-Vehicle Network. IEEE Access 12: 13971-13985 (2024) - [j56]Myoungsu Kim, Insu Oh, Kangbin Yim, Mahdi Sahlabadi, Zarina Shukur:
Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies. IEEE Access 12: 33972-34001 (2024) - [c107]Insu Oh, Junyoung Park, Sun-Young Lee, Juhyun Jang, Kangbin Yim:
Securing FSK-Based Paging System Using Format Preserving Encryption (FPE). BWCCA 2024: 104-113 - [c106]Kamronbek Yusupov, Md Rezanur Islam, Ibrokhim Muminov, Mahdi Sahlabadi, Kangbin Yim:
Comparative Analysis of Machine Learning and Deep Learning Models for Email Spam Classification Using TF-IDF and Word Embedding Techniques. BWCCA 2024: 114-122 - [c105]Md Rezanur Islam, Kamronbek Yusupov, Ibrokhim Muminov, Mahdi Sahlabadi, Kangbin Yim:
Cybersecurity in UAVs: An Intrusion Detection System Using UAVCAN and Deep Reinforcement Learning. BWCCA 2024: 123-131 - [c104]Ibrokhim Muminov, Kamronbek Yusupov, Md Rezanur Islam, Mahdi Sahlabadi, Kangbin Yim:
Lightweight and Accurate FER for Driver Emotion Analysis: Optimizing ResNet with Patch Extraction and Self-attention Techniques. BWCCA 2024: 171-180 - [c103]Yoonji Kim, Insu Oh, Jiung Hwang, Minchan Jeong, Kangbin Yim:
Effect of DoS Attack into LiDAR Ethernet. IMIS 2024: 69-78 - [c102]Md Rezanur Islam, Kamronbek Yusupov, Munkhdelgerekh Batzorig, Insu Oh, Kangbin Yim:
Enhancing Road Safety with In-Vehicle Network Abnormal Driving Behavior Detection. IMIS 2024: 79-88 - 2023
- [j55]Rahmad Abdillah, Zarina Shukur, Masnizah Mohd, Mohd Zamri Murah, Insu Oh, Kangbin Yim:
Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes. IEEE Access 11: 38721-38738 (2023) - [j54]Kyungroul Lee, Jaehyuk Lee, Sun-Young Lee, Kangbin Yim:
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. Sensors 23(6): 3023 (2023) - [j53]Kyungroul Lee, Kangbin Yim:
Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing. Sensors 23(7): 3501 (2023) - [j52]Jaehyuk Lee, Sun-Young Lee, Kangbin Yim, Kyungroul Lee:
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption. Sensors 23(10): 4728 (2023) - [c101]Kamronbek Yusupov, Md Rezanur Islam, Insu Oh, Kangbin Yim:
Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System. BWCCA 2023: 302-311 - [c100]Md Rezanur Islam, Insu Oh, Muminov Ibrokhim Botir Ugli, Kangbin Yim:
Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion Detection. IC3 2023: 224-229 - [c99]Md Rezanur Islam, Insu Oh, Kangbin Yim:
Universal Intrusion Detection System on In-Vehicle Network. IMIS 2023: 78-85 - [c98]Gwonsik Kang, Kamronbek Yusupov, Md Rezanur Islam, Keunkyoung Kim, Kangbin Yim:
The Comparison of Machine Learning Methods for Email Spam Detection. IMIS 2023: 86-95 - [c97]Baatarsuren Sukhbaatar, Md Rezanur Islam, Kamronbek Yuspov, Insu Oh, Kangbin Yim:
A Lightweight Intrusion Detection System on In-Vehicle Network Using Polynomial Features. IMIS 2023: 96-102 - [c96]Tugsmandakh Nyamdelger, Munkhdelgerekh Batzorig, Esam Ali Albhelil, Yeji Koh, Kangbin Yim:
Fuzz Testing and Safe Framework Development for Vehicle Security Analysis. IMIS 2023: 103-111 - [c95]Purevbaatar Ganbold, Insu Oh, Yoonji Kim, Kangbin Yim:
Artifact Extraction Methods for In-Vehicle Infotainment System. INCoS 2023: 68-78 - [c94]Munkhdelgerekh Batzorig, Yeji Koh, Insu Oh, Kangbin Yim:
A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network. NBiS 2023: 130-141 - 2022
- [j51]Kyungroul Lee, Kangbin Yim:
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT. Digit. Commun. Networks 8(2): 124-131 (2022) - [c93]Yeji Koh, Yoonji Kim, Munkhdelgerekh Batzorig, Kangbin Yim:
Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle. BWCCA 2022: 137-146 - [c92]Insu Oh, Munkhdelgerekh Batzorig, Baasantogtokh Duulga, Kangbin Yim:
Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method. BWCCA 2022: 215-223 - [c91]Md Rezanur Islam, Insu Oh, Munkhdelgerekh Batzorig, Myoungsu Kim, Kangbin Yim:
Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol. IMIS 2022: 85-96 - [c90]Yeji Koh, Seoyeon Kim, Yoonji Kim, Insu Oh, Kangbin Yim:
Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network. IMIS 2022: 97-107 - [e3]Leonard Barolli, Kangbin Yim, Hsing-Chung Chen:
Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), Asan, Korea, 1-3 July, 2021. Lecture Notes in Networks and Systems 279, Springer 2022, ISBN 978-3-030-79727-0 [contents] - 2021
- [j50]Kyungroul Lee, Jaehyuk Lee, Chang Choi, Kangbin Yim:
Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT. IEEE Access 9: 10925-10939 (2021) - [j49]SungMoon Kwon, Seongmin Park, HyungJin Cho, Youngkwon Park, Dowon Kim, Kangbin Yim:
Towards 5G-based IoT security analysis against Vo5G eavesdropping. Computing 103(3): 425-447 (2021) - [j48]HyungJin Cho, Seongmin Park, Youngkwon Park, Bomin Choi, Dowon Kim, Kangbin Yim:
Analysis against Security Issues of Voice over 5G. IEICE Trans. Inf. Syst. 104-D(11): 1850-1856 (2021) - [c89]Chanmin Kim, Insu Oh, Yeji Koh, Myoungsu Kim, Kangbin Yim:
In-vehicle Network IDS Using Message Time Interval Infrastructure. BWCCA 2021: 111-119 - [c88]Wontae Jung, Kangbin Yim, Kyungroul Lee:
Vulnerability Analysis of a Secure USB Memory: Based on a Commercial Product D. BWCCA 2021: 279-283 - [c87]Munkhdelgerekh Batzorig, Insu Oh, Chanmin Kim, Yeji Koh, Kangbin Yim:
SPEC: Frame Filtering for CAN Protocol on ECU. BWCCA 2021: 284-293 - [c86]Md Rezanur Islam, Insu Oh, Munkhdelgerekh Batzorig, Seoyeon Kim, Kangbin Yim:
A Concept of IDS for CAN Protocol Based on Statics Theory. BWCCA 2021: 294-302 - [c85]Jaehyuk Lee, Kangbin Yim, Kyungroul Lee:
Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C. IMIS 2021: 59-66 - [c84]Wontae Jung, Kangbin Yim, Kyungroul Lee:
Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D. IMIS 2021: 494-500 - [e2]Leonard Barolli, Kangbin Yim, Tomoya Enokido:
Complex, Intelligent and Software Intensive Systems - Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021), Asan, Korea, 1-3 July 2021. Lecture Notes in Networks and Systems 278, Springer 2021, ISBN 978-3-030-79724-9 [contents] - 2020
- [j47]Kyungroul Lee, Kangbin Yim, Sun-Young Lee:
Vulnerability analysis on the image-based authentication: Through the WM_INPUT message. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j46]Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service. Secur. Commun. Networks 2020: 7672941:1-7672941:16 (2020) - [j45]Dae-Hwi Lee, Kangbin Yim, Im-Yeong Lee:
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments. Sensors 20(14): 3983 (2020) - [j44]Gaurav Choudhary, Philip Virgil Astillo, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. IEEE Trans. Netw. Serv. Manag. 17(4): 2496-2510 (2020) - [c83]Eunseon Jeong, Junyoung Park, Minseong Kim, Chanmin Kim, Soyoung Jung, Kangbin Yim:
ICS Testbed Implementation Considering Dataset Collection Environment. BWCCA 2020: 397-406 - [c82]Insu Oh, Eunseon Jeong, Junyoung Park, Taeyoung Jeong, Junghoon Park, Kangbin Yim:
Cyber Attack Scenarios in Cooperative Automated Driving. BWCCA 2020: 416-425 - [c81]Yong-Woon Hwang, Im-Yeong Lee, Kangbin Yim:
A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment. EIDWT 2020: 215-221 - [c80]Youngho An, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:
Design and Implementation of a Novel Testbed for Automotive Security Analysis. IMIS 2020: 234-243 - [c79]Won-Bin Kim, Im-Yeong Lee, Kangbin Yim:
Group Delegated ID-Based Proxy Re-encryption for PHR. IMIS 2020: 447-456 - [c78]Eunseon Jeong, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:
Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime. IMIS 2020: 457-467 - [c77]Seongmin Park, Bomin Choi, Youngkwon Park, Dowon Kim, Eunseon Jeong, Kangbin Yim:
Vestiges of Past Generation: Threats to 5G Core Network. IMIS 2020: 468-480 - [c76]Seongmin Park, HyungJin Cho, Youngkwon Park, Bomin Choi, Dowon Kim, Kangbin Yim:
Security Problems of 5G Voice Communication. WISA 2020: 403-415
2010 – 2019
- 2019
- [j43]Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems. IEEE Access 7: 110205-110215 (2019) - [j42]Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems. IEEE Access 7: 118556-118580 (2019) - [j41]Insu Oh, Taeeun Kim, Kangbin Yim, Sun-Young Lee:
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing. Sensors 19(18): 3869 (2019) - [c75]Myoungsu Kim, Kangbin Yim:
Individually Separated Wireless Access Point to Protect User's Private Information. BWCCA 2019: 589-596 - [c74]Myoungsu Kim, Soonhong Kwon, Donald Elmazi, Jong-Hyouk Lee, Leonard Barolli, Kangbin Yim:
A Technical Survey on Methods for Detecting Rogue Access Points. IMIS 2019: 215-226 - [c73]Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, Sun-Young Lee:
Novel Encryption Method of GPS Information in Image File Using Format-Preserving Encryption. IMIS 2019: 815-823 - [c72]Kwangjun Kim, HeeDong Yang, Byeonggeun Son, Hanjae Yoon, Kangbin Yim, Manhee Lee:
A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities. IMIS 2019: 834-844 - [c71]Junghoon Park, Byeonggeun Son, Junyoung Park, Myoungsu Kim, Kangbin Yim:
Unintended Certificate Installation into Remote IoT Nodes. IMIS 2019: 845-854 - [c70]Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. I-SPAN 2019: 133-139 - 2018
- [j40]Kyungroul Lee, Sun-Young Lee, Changho Seo, Kangbin Yim:
TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network. IEEE Access 6: 12838-12847 (2018) - [j39]Kyungroul Lee, Kangbin Yim, Jung-Taek Seo:
Ransomware prevention technique using key backup. Concurr. Comput. Pract. Exp. 30(3) (2018) - [j38]Kyungroul Lee, Insu Oh, Yeunsu Lee, Hyeji Lee, Kangbin Yim, Jungtaek Seo:
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services. J. Sensors 2018: 2089626:1-2089626:17 (2018) - [j37]JongBeom Lim, Kwang-Sik Chung, HwaMin Lee, Kangbin Yim, HeonChang Yu:
Byzantine-resilient dual gossip membership management in clouds. Soft Comput. 22(9): 3011-3022 (2018) - [c69]Kyungroul Lee, Insu Oh, Wonyoung Jang, Chang Choi, Kangbin Yim:
Vulnerability Analysis on a Secure USB: Based on a Commercial Product A. BWCCA 2018: 498-502 - [c68]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems. CHASE 2018: 88-93 - [c67]Insu Oh, Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Hyobeom Ahn, Kangbin Yim:
Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface. IMIS 2018: 212-219 - [c66]Eunseon Jeong, Junyoung Park, Byeonggeun Son, Myoungsu Kim, Kangbin Yim:
Study on Signature Verification Process for the Firmware of an Android Platform. IMIS 2018: 540-545 - [c65]Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Kangbin Yim:
Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic. IMIS 2018: 546-553 - [c64]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. IWCMC 2018: 560-565 - [c63]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
On IoT Misbehavior Detection in Cyber Physical Systems. PRDC 2018: 189-190 - [c62]Kyungroul Lee, Byeonggeun Son, Sun-Young Lee, Kangbin Yim:
Vulnerability analysis of secure USB: based on the fingerprint authentication of product B. RACS 2018: 167-169 - [i2]Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You, Kyungroul Lee, Kangbin Yim:
A framework for mitigating zero-day attacks in IoT. CoRR abs/1804.05549 (2018) - [i1]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. CoRR abs/1807.00435 (2018) - 2017
- [j36]Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim, Junyoung Park, Kangbin Yim:
Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment. Int. J. Web Grid Serv. 13(1): 3-24 (2017) - [j35]Vishal Sharma, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim, Hyungjoon Park, Kangbin Yim, Sun-Young Lee:
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT. Secur. Commun. Networks 2017: 4749085:1-4749085:24 (2017) - [c61]Kyungroul Lee, Habin Yim, Insu Oh, Kangbin Yim:
Study on the Transaction Linkage Technique Combining the Designated Terminal. BDTA 2017: 3-8 - [c60]Myoungsu Kim, Kyungroul Lee, Kangbin Yim:
Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A. BWCCA 2017: 386-391 - [c59]Insu Oh, Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment of the Image-Based Authentication Using Screen-Capture Tools. IMIS 2017: 156-161 - [c58]Insu Oh, Kyungroul Lee, Kangbin Yim:
A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function. WISA 2017: 236-245 - [e1]Leonard Barolli, Fatos Xhafa, Kangbin Yim:
Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications, BWCCA 2016, Soonchunhyang University, Asan, Korea, November 5-7, 2016. Lecture Notes on Data Engineering and Communications Technologies 2, Springer 2017, ISBN 978-3-319-49105-9 [contents] - 2016
- [j34]Kyungroul Lee, Hyeungjun Yeuk, Jaein Kim, Hyungjoon Park, Kangbin Yim:
An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers. Comput. Stand. Interfaces 44: 137-143 (2016) - [j33]Tianhan Gao, Ling Tan, Peiyu Qiao, Kangbin Yim:
An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network. Intell. Autom. Soft Comput. 22(3): 389-396 (2016) - [j32]Lin Yao, Chi Lin, Guowei Wu, Taeyoung Jung, Kangbin Yim:
An anonymous authentication scheme in data-link layer for VANETs. Int. J. Ad Hoc Ubiquitous Comput. 22(1): 1-13 (2016) - [j31]Ilsun You, Marek R. Ogiela, Isaac Woungang, Kangbin Yim:
Innovative security technologies against insider threats and data leakage. Int. J. Comput. Math. 93(2): 236-238 (2016) - [c57]Kyungroul Lee, Insu Oh, Kangbin Yim:
Ransomware-Prevention Technique Using Key Backup. BDTA 2016: 105-114 - [c56]Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim:
Cognitive Countermeasures against BAD USB. BWCCA 2016: 377-386 - [c55]Hyeji Lee, Yeunsu Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment on the Mouse Data using Mouse Loggers. BWCCA 2016: 387-393 - [c54]Seungho Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment of Keyboard Data Based on Kaspersky Product. BWCCA 2016: 395-400 - [c53]Sangjoon Park, Kangbin Yim, Byeong-Gwon Kang:
Error Performance of Successive Interference Cancellation Schemes in MIMO Systems. BWCCA 2016: 649-655 - [c52]Kyungroul Lee, Hyeungjun Yeuk, Kangbin Yim, Suhyun Kim:
Analysis on Manipulation of the MAC Address and Consequent Security Threats. MIST@CCS 2016: 113-117 - [c51]Kyungroul Lee, Yeunsu Lee, Hyeji Lee, Kangbin Yim:
A Brief Review on JTAG Security. IMIS 2016: 486-490 - [c50]Kyungroul Lee, Hyeji Lee, Yeunsu Lee, Kangbin Yim:
Analysis on the Key Storage Mechanism of the CNG Library. IMIS 2016: 499-502 - [c49]Hsing-Chung Chen, Heri Wijayanto, Chia-Hui Chang, Fang-Yie Leu, Kangbin Yim:
Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem. INFOCOM Workshops 2016: 980-984 - 2015
- [c48]Taeyoung Jung, Jaein Kim, Junyoung Park, Kangbin Yim:
Novel Approaches to Protecting Block Ciphers by Distributing Round Keys. AINA 2015: 812-816 - [c47]Hyeryun Lee, Kyunghee Choi, Kihyun Chung, Jaein Kim, Kangbin Yim:
Fuzzing CAN Packets into Automobiles. AINA 2015: 817-821 - [c46]Junghoon Park, Taeyoung Jung, Kangbin Yim:
Implementation of an Eye Gaze Tracking System for the Disabled People. AINA 2015: 904-908 - [c45]Xiaochen Lai, Guoqiao Zhou, Chi Lin, Kangbin Yim:
Event-Driven Gait Recognition Method Based on Dynamic Temporal Segmentation. BWCCA 2015: 522-527 - [c44]Je-sung Jeon, Youngsun Kong, Yunyoung Nam, Kangbin Yim:
An Indoor Positioning System Using Bluetooth RSSI with an Accelerometer and a Barometer on a Smartphone. BWCCA 2015: 528-531 - [c43]DaeWon Lee, Kangbin Yim, HwaMin Lee:
Proxy Based Resource Management Scheme in IoT Environment. BWCCA 2015: 544-546 - [c42]Kyungroul Lee, Hyeungjun Yeuk, Habin Lim, Kangbin Yim:
Security Threats to the Platform Identification. BWCCA 2015: 547-550 - [c41]Kangbin Yim, Aniello Castiglione, Jeong Hyun Yi, Mauro Migliardi, Ilsun You:
Cyber Threats to Industrial Control Systems. MIST@CCS 2015: 79-81 - [c40]Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou:
Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set. IMIS 2015: 213-220 - [c39]Kyungroul Lee, Ilsun You, Kangbin Yim:
Vulnerability Analysis on the CNG Crypto Library. IMIS 2015: 221-224 - [c38]Junyoung Park, Taeyoung Jung, Jaein Kim, Kangbin Yim:
Soliciting Unexpected Traffic Flows into VoLTE. IMIS 2015: 426-430 - [c37]Junghoon Park, Taeyoung Jung, Kangbin Yim:
Precise Exposure Control for Efficient Eye Tracking. IMIS 2015: 431-435 - 2014
- [j30]Tianhan Gao, Nan Guo, Kangbin Yim, Qianyi Wang:
PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience. Comput. Sci. Inf. Syst. 11(3): 975-999 (2014) - [j29]Guowei Wu, Xiaojie Chen, Lin Yao, Youngjun Lee, Kangbin Yim:
An efficient wormhole attack detection method in wireless sensor networks. Comput. Sci. Inf. Syst. 11(3): 1127-1141 (2014) - [j28]Kangbin Yim, Aniello Castiglione, Ilsun You:
Prosperity of IT security technologies in homeland defense. J. Ambient Intell. Humaniz. Comput. 5(2): 169-171 (2014) - [j27]Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Kangbin Yim, Ilsun You:
Secure and distributed video surveillance via portable devices. J. Ambient Intell. Humaniz. Comput. 5(2): 205-213 (2014) - [j26]Nan Guo, Jia Wang, Tianhan Gao, Kangbin Yim:
Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential. J. Internet Serv. Inf. Secur. 4(1): 37-46 (2014) - [j25]Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed Sallam, Elisa Bertino, Kangbin Yim:
Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38: 43-53 (2014) - [j24]Guowei Wu, Zhuang Du, Yibo Hu, Taeyoung Jung, Ugo Fiore, Kangbin Yim:
A dynamic trust model exploiting the time slice in WSNs. Soft Comput. 18(9): 1829-1840 (2014) - [j23]Guangwei Xu, Cheng Shao, Yu Han, Kangbin Yim:
New quasi-Newton iterative learning control scheme based on rank-one update for nonlinear systems. J. Supercomput. 67(3): 653-670 (2014) - [c36]Lili Wang, Jianfeng Guan, Ilsun You, Huachun Zhou, Deyun Gao, Kangbin Yim, Pankoo Kim:
Survey on distributed mobility management schemes for Proxy mobile IPv6. CCNC 2014: 132-138 - [c35]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Ilsun You, Kangbin Yim, Jian-Hong Chen, William Cheng-Chung Chu:
A random wrapping encryption method. CCNC 2014: 151-156 - [c34]Fang-Yie Leu, Yi-Ting Hsiao, Kangbin Yim, Ilsun You:
A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid. ICT-EurAsia 2014: 375-385 - [c33]Kyungroul Lee, Hyungjun Yeuk, Jaein Kim, Kangbin Yim:
Anti-theft Solusions for In-Vehicle Electronic Devices. IMIS 2014: 549-553 - [c32]Nan Guo, Yuanting Jin, Kangbin Yim:
Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes. IMIS 2014: 554-559 - 2013
- [j22]Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Kangbin Yim:
Database Security System for Applying Sophisticated Access Control via Database Firewall Server. Comput. Informatics 32(6): 1192-1211 (2013) - [j21]Tianhan Gao, Nan Guo, Kangbin Yim:
A hybrid approach to secure hierarchical mobile IPv6 networks. Comput. Sci. Inf. Syst. 10(2): 913-938 (2013) - [j20]Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar, Lionel Brunie, Kangbin Yim:
An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing. Int. J. Inf. Manag. 33(2): 252-262 (2013) - [j19]Junho Choi, Chang Choi, Kangbin Yim, Jeongnyeo Kim, Pankoo Kim:
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery. Informatica 24(3): 381-394 (2013) - [j18]Yonglin Zhou, Qing-Shan Li, Qidi Miao, Kangbin Yim:
DGA-Based Botnet Detection Using DNS Traffic. J. Internet Serv. Inf. Secur. 3(3/4): 116-123 (2013) - [j17]Jaein Kim, Youngjun Lee, Kyungroul Lee, Taeyoung Jung, Dmitry Volokhov, Kangbin Yim:
Vulnerability to Flash Controller for Secure USB Drives. J. Internet Serv. Inf. Secur. 3(3/4): 136-145 (2013) - [j16]Tianhan Gao, Nan Guo, Kangbin Yim:
LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature. Math. Comput. Model. 58(5-6): 1427-1440 (2013) - [c31]Lin Yao, Chi Lin, Jing Deng, Fangyu Deng, Jingwei Miao, Kangbin Yim, Guowei Wu:
Biometrics-based Data Link Layer Anonymous Authentication in VANETs. IMIS 2013: 182-187 - [c30]Mohammad A. Mikki, Yousif M. Mansour, Kangbin Yim:
Privacy Preserving Secure Communication Protocol for Vehicular Ad Hoc Networks. IMIS 2013: 188-195 - [c29]Kyungroul Lee, Hyungjun Yeuk, Sungkwan Kim, Kangbin Yim:
Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client. IMIS 2013: 706-708 - [c28]Kyungroul Lee, Youngjun Lee, Junyoung Park, Kangbin Yim, Ilsun You:
Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation). IMIS 2013: 709-713 - [c27]Tianhan Gao, Nan Guo, Kangbin Yim, Qingshan Li:
Anonymity Scheme with Unlinkability Property in Wireless Mesh Networks. IMIS 2013: 719-722 - [c26]Junyoung Park, Youngjun Lee, Kyungroul Lee, Hanggon Kim, Dmitry Volokhov, Kangbin Yim:
GEESE: A Cognitive USN Platform. NBiS 2013: 267-269 - [c25]Nan Guo, Jianju Cheng, Bin Zhang, Kangbin Yim:
Aggregate Signature-Based Efficient Attributes Proof with Pairing-Based Anonymous Credential. NBiS 2013: 276-281 - 2012
- [j15]Kyungroul Lee, Kangbin Yim, Mohammad A. Mikki:
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols. Comput. Math. Appl. 63(2): 525-535 (2012) - [j14]Yu Han, Naigao Jin, Guangwei Xu, Kangbin Yim:
A new iterative learning control scheme using the geometric rotation for discrete time systems. Comput. Syst. Sci. Eng. 27(5) (2012) - [j13]Sun-Ho Lee, Kang Bin Yim, In-Yeong Lee:
A secure solution with a password recovery feature for USB flash drives. Comput. Syst. Sci. Eng. 27(6) (2012) - [j12]Kangbin Yim, Yoshiaki Hori:
Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2). J. Internet Serv. Inf. Secur. 2(3/4): 1-2 (2012) - [j11]Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim:
A Brief Survey on Rootkit Techniques in Malicious Codes. J. Internet Serv. Inf. Secur. 2(3/4): 134-147 (2012) - [j10]Yoshiaki Hori, William R. Claycomb, Kangbin Yim:
Frontiers in Insider Threats and Data Leakage Prevention. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 1-3 (2012) - [j9]Kangwon Lee, Kyungroul Lee, Jaecheon Byun, Sunghoon Lee, Hyobeom Ahn, Kangbin Yim:
Extraction of Platform-unique Information as an Identifier. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 85-99 (2012) - [j8]Ilsun You, Kangbin Yim, Leonard Barolli:
Advances in Network-based Information Systems. Mob. Inf. Syst. 8(3): 173-175 (2012) - [j7]Kyungroul Lee, Kangbin Yim, Eugene H. Spafford:
Reverse-safe authentication protocol for secure USB memories. Secur. Commun. Networks 5(8): 834-845 (2012) - [c24]Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, Kangbin Yim:
How to Forge a Digital Alibi on Mac OS X. CD-ARES 2012: 430-444 - [c23]Seung-Hyun Seo, Kangbin Yim, Ilsun You:
Mobile Malware Threats and Defenses for Homeland Security. CD-ARES 2012: 516-524 - [c22]Fang-Yie Leu, Ilsun You, Yi-Li Huang, Kangbin Yim, Cheng-Ru Dai:
Improving security level of LTE authentication and key agreement procedure. GLOBECOM Workshops 2012: 1032-1036 - [c21]Eun-Ae Cho, Kyungroul Lee, Kangbin Yim:
A Privacy Preserving Model for Personal Information in Search Engine. IMIS 2012: 17-21 - [c20]Kyungroul Lee, Eun-Ae Cho, Kangbin Yim:
A Novel Search System for Protecting Search Word. IMIS 2012: 22-28 - [c19]Yu Han, Kangbin Yim, Xiaochen Lai, Guangwei Xu, Hui Liu, Xilan Wang:
A New Iterative Learning Control Scheme Based on Damped Newton Method for Nonlinear Systems. IMIS 2012: 89-92 - [c18]Kwangjin Bae, Ilsun You, Kangbin Yim, Taeho Son:
A Secure Secondary Backup Storage with an Isolated Authentication. IMIS 2012: 122-125 - [c17]Seung-Hyun Seo, Dong-Guen Lee, Kangbin Yim:
Analysis on Maliciousness for Mobile Applications. IMIS 2012: 126-129 - [c16]Tianhan Gao, Nan Guo, Kangbin Yim:
Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network. IMIS 2012: 143-147 - [c15]Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar, Lionel Brunie, Kangbin Yim:
An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks. IMIS 2012: 208-215 - [c14]Mohannad Ayash, Mohammad A. Mikki, Kangbin Yim:
Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETs. IMIS 2012: 244-251 - 2011
- [j6]Zhuzhong Qian, Sheng Zhang, Kangbin Yim, Sanglu Lu:
Service Oriented Multimedia Delivery System in Pervasive Environments. J. Univers. Comput. Sci. 17(6): 961-980 (2011) - [j5]Yi-Fu Ciou, Fang-Yie Leu, Yi-Li Huang, Kangbin Yim:
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks. Mob. Inf. Syst. 7(3): 241-269 (2011) - [c13]Kangbin Yim, Ilsun You:
IT Issues on Homeland Security and Defense. ARES 2011: 374-385 - [c12]Kyungroul Lee, Sitha Pho, Kangbin Yim:
Reversability Assessment on Secure USB Memories. IMIS 2011: 6-8 - [c11]Kyungroul Lee, Kangbin Yim:
Keyboard Security: A Technological Review. IMIS 2011: 9-15 - [c10]Mohammad A. Mikki, Kyungroul Lee, Wansoo Kim, Kangbin Yim:
Architecture to Support Heterogeneous Devices for Video Surveillance System. IMIS 2011: 16-19 - [c9]Kwangjin Bae, Sungjin Kim, Yongoo Lee, Ilsun You, Kangbin Yim, Taeho Son:
Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required. INCoS 2011: 652-655 - 2010
- [j4]Kyungroul Lee, Hyeungjun Yeuk, Youngtae Choi, Sitha Pho, Ilsun You, Kangbin Yim:
Safe Authentication Protocol for Secure USB Memories. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 46-55 (2010) - [j3]Kangbin Yim:
Guest Editorial: Advances in Trust Management. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 1-2 (2010) - [c8]Jong Sik Moon, Im-Yeong Lee, Kang Bin Yim, Sang-Gu Byeon:
An Authentication and Authorization Protocol Using Ticket in Pervasive Environment. AINA Workshops 2010: 822-826 - [c7]Kyungroul Lee, Wansoo Kim, Kwangjin Bae, Kangbin Yim:
A Solution to Protecting USB Keyboard Data. BWCCA 2010: 108-111 - [c6]Ilsun You, Kangbin Yim:
Malware Obfuscation Techniques: A Brief Survey. BWCCA 2010: 297-300 - [c5]Kangbin Yim:
A New Noise Mingling Approach to Protect the Authentication Password. CISIS 2010: 839-842 - [c4]Sun-Ho Lee, Kang Bin Yim, Im-Yeong Lee:
A Secure Solution for USB Flash Drives Using FAT File System Structure. NBiS 2010: 487-492
2000 – 2009
- 2003
- [j2]Jaehong Shim, Kangbin Yim, Kyunghee Choi, Gihyun Jung:
An on-line frame scheduling algorithm for the Internet video conferencing. IEEE Trans. Consumer Electron. 49(1): 80-88 (2003) - 2002
- [c3]Kangbin Yim, Younkwang Jung, Panan Choi, Youngu Kang, Kyunghee Choi, Kinkyun Jung:
Analysis of Packet Size on VOIP Performance. International Conference on Internet Computing 2002: 996-1001 - 2000
- [c2]Mohammad A. Mikki, Kangbin Yim, Gihyun Jung:
Popularity-Independent Multimedia-on-Demand Server Model. COMPSAC 2000: 575-580
1990 – 1999
- 1999
- [j1]Kangbin Yim, Junho Shin, Gihyun Jung, Jaehong Shim, Kyunghee Choi:
Design issues on a popularity-independent video-on-demand server. IEEE Trans. Consumer Electron. 45(2): 455-464 (1999) - 1996
- [c1]Kangbin Yim, Jaehong Shim, Hwaja Chung, Gihyun Jung, Kyunghee Choi, Dongyoon Kim:
An Imprecise DCT Computation Model for Real-Time Applications. Multimedia Technology and Applications 1996: 153-161
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint