default search action
Kyung Joon Kwak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c12]Kyle Denney, Robert Lychev, Donato Kava, Alice Lee, Michael Vai, Nick Evancich, Richard Clark, David Lide, Kyung Joon Kwak, Jason H. Li, Michael Lynch, Kyle Tillotson, Walt Tirenin, Douglas Schafer:
A Novel Approach to Cyber Situational Awareness in Embedded Systems. HPEC 2021: 1-5 - [c11]Michael Vai, David Whelihan, Kyle Denney, Robert Lychev, Jeffrey J. Hughes, Donato Kava, Alice Lee, Nick Evancich, Richard Clark, David Lide, Kyung Joon Kwak, Jason H. Li, Douglas Schafer, Michael Lynch, Kyle Tillotson, Wladimir Tirenin:
Agile and Resilient Embedded Systems. MILCOM 2021: 715-720
2010 – 2019
- 2019
- [c10]Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason H. Li:
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. SecureComm (1) 2019: 429-449 - 2018
- [c9]Jason H. Li, Douglas Schafer, David Whelihan, Stefano Lassini, Nicholas Evancich, Kyung Joon Kwak, Michael Vai, Haley Whitman:
Designing Secure and Resilient Embedded Avionics Systems. SecDev 2018: 139 - 2017
- [c8]David Whelihan, Michael Vai, Nicholas Evancich, Kyung Joon Kwak, Jason H. Li, M. Britton, B. Frantz, D. Hadcock, Michael Lynch, Douglas Schafer, J. DeMatteis, D. Russo:
Designing agility and resilience into embedded systems. MILCOM 2017: 249-254 - 2016
- [c7]Michael Vai, David Whelihan, Nicholas Evancich, Kyung Joon Kwak, Jason H. Li, M. Britton, J. Foley, Michael Lynch, Douglas Schafer, J. DeMatteis:
Systems design of cybersecurity in embedded systems. HPEC 2016: 1-6 - 2014
- [j4]Kyung Joon Kwak, Yalin Evren Sagduyu, Justin Yackoski, Babak Azimi-Sadjadi, Ali Namazi, Julia Deng, Jason H. Li:
Airborne network evaluation: challenges and high fidelity emulation solution. IEEE Commun. Mag. 52(10): 30-36 (2014) - 2011
- [j3]Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung Joon Kwak, William Moran:
Minimalist counting in sensor networks (Noise helps). Ad Hoc Networks 9(6): 987-997 (2011) - [j2]Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung Joon Kwak:
CAUCHY localization: a distributed computation of WSNs. SIGMETRICS Perform. Evaluation Rev. 39(2): 59-61 (2011)
2000 – 2009
- 2008
- [j1]Kyung Joon Kwak, Yuliy M. Baryshnikov, Edward G. Coffman Jr.:
Self-assembling sweep-and-sleep sensor systems. SIGMETRICS Perform. Evaluation Rev. 36(2): 131-133 (2008) - [c6]Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung Joon Kwak, William Moran:
Stochastic Counting in Sensor Networks, or: Noise Is Good. DCOSS 2008: 32-45 - [c5]Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung Joon Kwak:
High Performance Sleep-Wake Sensor Systems Based on Cyclic Cellular Automata. IPSN 2008: 517-526 - [c4]Kyung Joon Kwak, Yuliy M. Baryshnikov, Edward G. Coffman Jr.:
Cyclic Cellular Automata: A Tool for Self-Organizing Sleep Scheduling in Sensor Networks. IPSN 2008: 535-536 - [c3]Kyung Joon Kwak, Yuliy M. Baryshnikov, Edward G. Coffman Jr.:
Self-Organizing Sleep-Wake Sensor Systems. SASO 2008: 393-402 - 2007
- [c2]Kyung Joon Kwak, Edward G. Coffman Jr.:
Retransmission in OBS networks with fiber delay lines. BROADNETS 2007: 243-249 - 2006
- [c1]Seoung-Bum Lee, Kyung Joon Kwak, Andrew T. Campbell:
Solicitation-based Forwarding for Sensor Networks. SECON 2006: 90-99
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint