default search action
Young-Gab Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Giluk Kang, Jahoon Koo, Young-Gab Kim:
Security and Privacy Requirements for the Metaverse: A Metaverse Applications Perspective. IEEE Commun. Mag. 62(1): 148-154 (2024) - [j54]Cheol-Gyu Yi, Young-Gab Kim:
Hypothesis Generation Model for Cyber Threat Hunting. IEEE Commun. Mag. 62(10): 110-116 (2024) - [c33]Palash Yuvraj Ingle, Young-Gab Kim:
Integrated Interoperability Based Panoramic Video Synopsis Framework. SAC 2024: 584-591 - 2023
- [j53]Jin-Yong Yu, Young-Gab Kim:
Coding Unit-Based Region of Interest Encryption in HEVC/H.265 Video. IEEE Access 11: 47967-47978 (2023) - [j52]Sang-Min Park, Young-Gab Kim:
Visual language navigation: a survey and open challenges. Artif. Intell. Rev. 56(1): 365-427 (2023) - [j51]Mischa Dohler, Young-Gab Kim, Mar González-Franco, Timoni West:
Making the MetAverse A Reality: Challenges And Opportunities. IEEE Commun. Mag. 61(9): 14-15 (2023) - [j50]Sang-Min Park, Young-Gab Kim:
Visual language integration: A survey and open challenges. Comput. Sci. Rev. 48: 100548 (2023) - [j49]Palash Yuvraj Ingle, Young-Gab Kim:
Multiview abnormal video synopsis in real-time. Eng. Appl. Artif. Intell. 123(Part B): 106406 (2023) - [j48]Palash Yuvraj Ingle, Young-Gab Kim:
Video Synopsis Algorithms and Framework: A Survey and Comparative Evaluation. Syst. 11(2): 108 (2023) - [c32]Jahoon Koo, Giluk Kang, Young-Gab Kim:
Interoperable Access Control Framework for Services Demanding High Level Security among Heterogeneous IoT Platforms. SAC 2023: 737-740 - 2022
- [j47]Sang-Min Park, Young-Gab Kim:
A Metaverse: Taxonomy, Components, Applications, and Open Challenges. IEEE Access 10: 4209-4251 (2022) - [j46]Yogesh K. Dwivedi, David Laurie Hughes, Abdullah M. Baabdullah, Samuel Ribeiro-Navarrete, Mihalis Giannakis, Mutaz M. Al-Debei, Denis Dennehy, Bhimaraya A. Metri, Dimitrios Buhalis, Christy M. K. Cheung, Kieran Conboy, Ronan Doyle, Rameshwar Dubey, Vincent Dutot, Reto Felix, D. P. Goyal, Anders Gustafsson, Chris Hinsch, Ikram Jebabli, Marijn Janssen, Young-Gab Kim, Jooyoung Kim, Stefan Koos, David Kreps, Nir Kshetri, Vikram Kumar, Keng-Boon Ooi, Savvas Papagiannidis, Ilias O. Pappas, Ariana Polyviou, Sang-Min Park, Neeraj Pandey, Maciel Manoel Queiroz, Ramakrishnan Raman, Philipp A. Rauschnabel, Anuragini Shirish, Marianna Sigala, Konstantina Spanaki, Garry Wei-Han Tan, Manoj Kumar Tiwari, Giampaolo Viglia, Samuel Fosso Wamba:
Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. Int. J. Inf. Manag. 66: 102542 (2022) - [j45]Euijong Lee, Young-Duk Seo, Young-Gab Kim:
Self-Adaptive Framework With Master-Slave Architecture for Internet of Things. IEEE Internet Things J. 9(17): 16472-16493 (2022) - [j44]Yujun Kim, Jin-Yong Yu, Euijong Lee, Young-Gab Kim:
Video anomaly detection using Cross U-Net and cascade sliding window. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part B): 3273-3284 (2022) - [j43]Jahoon Koo, Young-Gab Kim:
Resource identifier interoperability among heterogeneous IoT platforms. J. King Saud Univ. Comput. Inf. Sci. 34(7): 4191-4208 (2022) - [j42]Palash Yuvraj Ingle, Young-Gab Kim:
Real-Time Abnormal Object Detection for Video Surveillance in Smart Cities. Sensors 22(10): 3862 (2022) - [j41]Palash Yuvraj Ingle, Yujun Kim, Young-Gab Kim:
DVS: A Drone Video Synopsis towards Storing and Analyzing Drone Surveillance Data in Smart Cities. Syst. 10(5): 170 (2022) - [c31]Se-Ra Oh, Jahoon Koo, Young-Gab Kim:
Security interoperability in heterogeneous IoT platforms: threat model of the interoperable OAuth 2.0 framework. SAC 2022: 22-31 - 2021
- [j40]Jin-Yong Yu, Yujun Kim, Young-Gab Kim:
Intelligent Video Data Security: A Survey and Open Challenges. IEEE Access 9: 26948-26967 (2021) - [j39]Cheol-Gyu Yi, Young-Gab Kim:
Security Testing for Naval Ship Combat System Software. IEEE Access 9: 66839-66851 (2021) - [j38]Sang-Min Park, Young-Gab Kim:
Root Cause Analysis Based on Relations Among Sentiment Words. Cogn. Comput. 13(4): 903-918 (2021) - [j37]Euijong Lee, Young-Duk Seo, Se-Ra Oh, Young-Gab Kim:
A Survey on Standards for Interoperability and Security in the Internet of Things. IEEE Commun. Surv. Tutorials 23(2): 1020-1047 (2021) - [j36]Young-Duk Seo, Young-Gab Kim, Euijong Lee, Hyungjin Kim:
Group recommender system based on genre preference focusing on reducing the clustering cost. Expert Syst. Appl. 183: 115396 (2021) - [j35]Sang-Min Park, Young-Gab Kim:
Survey and challenges of story generation models - A multimodal perspective with five steps: Data embedding, topic modeling, storyline generation, draft story generation, and story evaluation. Inf. Fusion 67: 41-63 (2021) - [c30]Jahoon Koo, Young-Gab Kim:
Interoperability requirements for a smart city. SAC 2021: 690-698 - 2020
- [j34]Jin-Yong Yu, Euijong Lee, Se-Ra Oh, Young-Duk Seo, Young-Gab Kim:
A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security. IEEE Access 8: 45304-45324 (2020) - [j33]Young-Duk Seo, Euijong Lee, Young-Gab Kim:
Video on demand recommender system for internet protocol television service based on explicit information fusion. Expert Syst. Appl. 143 (2020) - [j32]Se-Ra Oh, Young-Gab Kim:
AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth. Int. J. Distributed Sens. Networks 16(2) (2020) - [j31]Aamir Shahzad, Kaiwen Zhang, René Landry Jr., Neal N. Xiong, Young-Gab Kim:
An efficient emerging network and secured hopping scheme employed over the unsecured public channels. Int. J. Distributed Sens. Networks 16(4) (2020) - [j30]Abhijeet Thakare, Euijong Lee, Ajay Kumar, Valmik B. Nikam, Young-Gab Kim:
PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud. IEEE Internet Things J. 7(4): 2890-2900 (2020) - [j29]Euijong Lee, Young-Duk Seo, Young-Gab Kim:
A Cache-Based Model Abstraction and Runtime Verification for the Internet-of-Things Applications. IEEE Internet Things J. 7(9): 8886-8901 (2020)
2010 – 2019
- 2019
- [j28]Jahoon Koo, Se-Ra Oh, Young-Gab Kim:
Device Identification Interoperability in Heterogeneous IoT Platforms. Sensors 19(6): 1433 (2019) - [j27]Se-Ra Oh, Young-Gab Kim, Sanghyun Cho:
An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role. Sensors 19(8): 1884 (2019) - [j26]Euijong Lee, Young-Duk Seo, Young-Gab Kim:
Self-Adaptive Framework Based on MAPE Loop for Internet of Things. Sensors 19(13): 2996 (2019) - 2018
- [j25]Kwangsoo Seol, Young-Gab Kim, Euijong Lee, Young-Duk Seo, Doo-Kwon Baik:
Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System. IEEE Access 6: 9114-9128 (2018) - [j24]Young-Duk Seo, Young-Gab Kim, Euijong Lee, Kwangsoo Seol, Doo-Kwon Baik:
An enhanced aggregation method considering deviations for a group recommendation. Expert Syst. Appl. 93: 299-312 (2018) - [j23]Euijong Lee, Young-Gab Kim, Young-Duk Seo, Kwangsoo Seol, Doo-Kwon Baik:
RINGA: Design and verification of finite state machine for self-adaptive software at runtime. Inf. Softw. Technol. 93: 200-222 (2018) - [j22]Aamir Shahzad, Yang Sun Lee, Malrey Lee, Young-Gab Kim, Naixue Xiong:
Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients. J. Sensors 2018: 3202787:1-3202787:15 (2018) - [j21]Aamir Shahzad, Jae-Young Choi, Naixue Xiong, Young-Gab Kim, Malrey Lee:
Centralized Connectivity for Multiwireless Edge Computing and Cellular Platform: A Smart Vehicle Parking System. Wirel. Commun. Mob. Comput. 2018 (2018) - [c29]Young-Duk Seo, Young-Gab Kim, Euijong Lee, Kwangsoo Seol, Doo-Kwon Baik:
Design of a smart greenhouse system based on MAPE-K and ISO/IEC-11179. ICCE 2018: 1-2 - [c28]Euijong Lee, Young-Gab Kim, Young-Duk Seo, Doo-Kwon Baik:
Self-Adaptive Framework with Game Theoretic Decision Making for Internet of Things. TENCON 2018: 2092-2097 - 2017
- [j20]Young-Duk Seo, Young-Gab Kim, Euijong Lee, Doo-Kwon Baik:
Personalized recommender system based on friendship strength in social network services. Expert Syst. Appl. 69: 135-148 (2017) - [j19]Euijong Lee, Young-Gab Kim, Young-Duk Seo, Kwangsoo Seol, Doo-Kwon Baik:
An Evaluation Method for Content Analysis Based on Twitter Content Influence. Int. J. Softw. Eng. Knowl. Eng. 27(5): 841- (2017) - [j18]Sung-Bong Jang, Young-Gab Kim, Young Woong Ko:
Mobile video communication based on augmented reality. Multim. Tools Appl. 76(16): 16893-16909 (2017) - [c27]Euijong Lee, Young-Gab Kim, Young-Duk Seo, Kwangsoo Seol, Doo-Kwon Baik:
Runtime verification method for self-adaptive software using reachability of transition system model. SAC 2017: 65-68 - 2016
- [j17]Sundeuk Kim, Hyun-Taek Oh, Young-Gab Kim:
Certificate sharing system for secure certificate distribution in mobile environment. Expert Syst. Appl. 44: 67-77 (2016) - [j16]Sang-Min Park, Young-Gab Kim, Doo-Kwon Baik:
Sentiment Root Cause Analysis Based on Fuzzy Formal Concept Analysis and Fuzzy Cognitive Map. J. Comput. Inf. Sci. Eng. 16(3) (2016) - [j15]Sang-Min Park, Young-Gab Kim, Doo-Kwon Baik:
User-centric product recommendation on heterogeneous IoT device platform. J. Supercomput. 72(12): 4810-4825 (2016) - [c26]Sang-Min Park, Doo-Kwon Baik, Young-Gab Kim:
Sentiment user profile analysis based on forgetting curve in mobile environments. ICCI*CC 2016: 207-211 - [c25]Young-Gab Kim, Yonghan Lee:
Context Information-based Application Access Control Model. IMCOM 2016: 75:1-75:5 - [c24]Sang-Min Park, Young-Gab Kim, Doo-Kwon Baik:
Poster: Sentiment User Profile System based on Polarity Comparison. MobiSys (Companion Volume) 2016: 142 - 2014
- [j14]Do-Hoon Kim, Jungbean Lee, Young-Gab Kim, Byungsik Yoon, Hoh Peter In:
3G IP Multimedia Subsystem based framework for lawful interception. Ann. des Télécommunications 69(7-8): 347-361 (2014) - 2012
- [j13]Myeongjin Oh, Young-Gab Kim, Seungpyo Hong, Sung Deok Cha:
ASA: Agent-based secure ARP cache management. IET Commun. 6(7): 685-693 (2012) - [j12]Shinil Kwon, Young-Gab Kim, Sung Deok Cha:
Web robot detection based on pattern-matching technique. J. Inf. Sci. 38(2): 118-126 (2012) - [j11]Young-Gab Kim, Sung Deok Cha:
Threat scenario-based security risk analysis using use case modeling in information systems. Secur. Commun. Networks 5(3): 293-300 (2012) - [j10]Young-Gab Kim, Min-Soo Lee, Sanghyun Cho, Sung Deok Cha:
A quantitative approach to estimate a website security risk using whitelist. Secur. Commun. Networks 5(10): 1181-1192 (2012) - 2011
- [j9]Do-Hoon Kim, Young-Gab Kim, Hoh Peter In:
Mobile user-preference-based data dissemination on mobile P2P networks. EURASIP J. Wirel. Commun. Netw. 2011: 118 (2011) - [j8]Young-Gab Kim, Seok Kee Lee, Sung-Bong Jang:
Variability Management for Software Product-Line Architecture Development. Int. J. Softw. Eng. Knowl. Eng. 21(7): 931-956 (2011) - [j7]Sung-Bong Jang, Young-Gab Kim:
An energy-efficient delay reduction technique for supporting WLAN-based VoIP in SmartPhone. J. Syst. Archit. 57(10): 934-944 (2011) - [c23]Sung Deok Cha, Sehun Jeong, Junbeom Yoo, Young-Gab Kim:
Testing of Safety-Critical Software Embedded in an Artificial Heart. SSS 2011: 143-153 - 2010
- [j6]Sung-Bong Jang, Young-Gab Kim:
Power saving and delay reduction for supporting WLAN-based fixed-mobile convergence service in smartphone. IEEE Trans. Consumer Electron. 56(4): 2747-2755 (2010)
2000 – 2009
- 2009
- [j5]Sung-Bong Jang, Young-Gab Kim, Hong-Seok Na, Doo-Kwon Baik:
Embedded system architecture for an WLAN-based dual mode mobile phone. IEEE Trans. Consumer Electron. 55(3): 1623-1630 (2009) - 2008
- [c22]Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim:
Method for Evaluating the Security Risk of a Website Against Phishing Attacks. ISI Workshops 2008: 21-31 - [c21]Sung-Bong Jang, Young-Gab Kim, Doo-Kwon Baik:
Embedded System Architecture for an FMC Mobile Handset. NCM (1) 2008: 383-390 - 2007
- [c20]Young-Gab Kim, Jongin Lim:
Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study. International Conference on Computational Science (3) 2007: 1040-1047 - [c19]Young-Gab Kim, Jongin Lim:
HMM-Based Approach for Evaluating Risk Propagation. PAISI 2007: 325-326 - 2006
- [j4]Dongwon Jeong, Young-Gab Kim, Soo-Hyun Park:
An Integrity Checking Mechanism of Mobile Agents under a Closed Environment with Trusted Hosts. Int. J. Softw. Eng. Knowl. Eng. 16(1): 141-151 (2006) - [j3]Young-Gab Kim, Chang-Joo Moon, Dongwon Jeong, Doo-Kwon Baik:
Formal Verification of Bundle Authentication Mechanism in Osgi Service Platform: Ban Logic. Int. J. Softw. Eng. Knowl. Eng. 16(2): 153-174 (2006) - [j2]Jin-Woo Kim, JuHum Kwon, Young-Gab Kim, Chee-Yang Song, Hyun Seok Kim, Doo-Kwon Baik:
EAFoC: Enterprise Architecture Framework Based on Commonality. J. Comput. Sci. Technol. 21(6): 952-964 (2006) - [c18]Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik:
Modeling and Simulation for Security Risk Propagation in Critical Information Systems. CIS 2006: 858-868 - [c17]Sung-Won Moon, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik:
Password-Based User Authentication Protocol for Mobile Environment. ICOIN 2006: 743-753 - [c16]Young-Gab Kim, Jin-Woo Kim, Sung-Ook Shin, Doo-Kwon Baik:
Managing Variability for Software Product-Line. SERA 2006: 74-81 - 2005
- [j1]Dongwon Jeong, Hoh Peter In, Fran Jarnjak, Young-Gab Kim, Doo-Kwon Baik:
A message conversion system, XML-based metadata semantics description language and metadata repository. J. Inf. Sci. 31(5): 394-406 (2005) - [c15]Hee-Young Lim, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik:
Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform. ACIS-ICIS 2005: 502-507 - [c14]Young-Gab Kim, Chang-Joo Moon, Dongwon Jeong, Jeong-Oog Lee, Chee-Yang Song, Doo-Kwon Baik:
Context-Aware Access Control Mechanism for Ubiquitous Applications. AWIC 2005: 236-242 - [c13]Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon:
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. CISC 2005: 265-278 - [c12]Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, InJung Kim, Doo-Kwon Baik:
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. ICISC 2005: 175-185 - [c11]Jin-Woo Kim, Young-Gab Kim, JuHum Kwon, Sung-Ho Hong, Chee-Yang Song, Doo-Kwon Baik:
An enterprise architecture framework based on a common information technology domain (EAFIT) for improving interoperability among heterogeneous information systems. SERA 2005: 198-205 - 2004
- [c10]Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik:
A Service Bundle Authentication Mechanism in the OSGi Service Platform. AINA (1) 2004: 420-425 - [c9]Dongwon Jeong, Young-Gab Kim, Hoh Peter In:
SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing. APSEC 2004: 738-739 - [c8]Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik:
Design and Implementation of an SSL Component Based on CBD. AsiaSim 2004: 478-486 - [c7]Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo Moon, Yoon-Jung Jung, InJung Kim:
A Security Risk Analysis Model for Information Systems. AsiaSim 2004: 505-513 - [c6]Jeong-Oog Lee, Myeong-Cheol Ko, Jinsoo Kim, Chang-Joo Moon, Young-Gab Kim, Hoh Peter In:
Analyzing Web Interfaces of Databases for Retrieving Web Information. AWCC 2004: 331-336 - [c5]Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik:
A MAC-Based Service Bundle Authentication Mechanism in the OSGi Service Platform. DASFAA 2004: 137-145 - [c4]Dongwon Jeong, Young-Gab Kim, Young-Shil Kim, Lee-Sub Lee, Soo-Hyun Park, Doo-Kwon Baik:
A Secure Migration Mechanism of Mobile Agents Under Mobile Agent Environments. PARA 2004: 974-982 - [c3]Dongwon Jeong, Young-Gab Kim, Soo-Hyun Park, Doo-Kwon Baik:
Uniformly Handling Metadata Registries. SERA 2004: 81-91 - [c2]Dongwon Jeong, Young-Gab Kim, Doo-Kwon Baik:
SQL/MDR: Query Language for Consistent Access of Metadata Registries Based on SQL3. WAIM 2004: 239-248 - [c1]Young-Gab Kim, Dongwon Jeong, Doo-Kwon Baik:
Verifying a MAC-Based Service Bundle Authentication Mechanism for the OSGi Service Platform. WAIM 2004: 684-689
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint