Cyber security of critical infrastructures LA Maglaras, KH Kim, H Janicke, MA Ferrag, S Rallis, P Fragkou, ... Ict Express 4 (1), 42-45, 2018 | 215 | 2018 |
Ubiquitous sensor network system and method of configuring the same KH Kim, CS Lim, J Park US Patent 8,756,299, 2014 | 129 | 2014 |
Implementation of IoT system using block chain with authentication and data protection CH Lee, KH Kim 2018 International Conference on Information Networking (ICOIN), 936-940, 2018 | 122 | 2018 |
Scenario and countermeasure for replay attack using join request messages in LoRaWAN SJ Na, DY Hwang, WS Shin, KH Kim 2017 international conference on information networking (ICOIN), 718-720, 2017 | 119 | 2017 |
Route-over vs Mesh-under Routing in 6LoWPAN AH Chowdhury, M Ikram, HS Cha, H Redwan, SMS Shams, KH Kim, ... Proceedings of the 2009 international conference on wireless communications …, 2009 | 108 | 2009 |
LoWMob: Intra-PAN mobility support schemes for 6LoWPAN G Bag, MT Raza, KH Kim, SW Yoo Sensors 9 (7), 5844-5877, 2009 | 99 | 2009 |
An OAuth based authentication mechanism for IoT networks S Emerson, YK Choi, DY Hwang, KS Kim, KH Kim 2015 International Conference on Information and Communication Technology …, 2015 | 93 | 2015 |
Risk analysis and countermeasure for bit-flipping attack in LoRaWAN JW Lee, DY Hwang, JH Park, KH Kim 2017 International conference on information networking (ICOIN), 549-551, 2017 | 73 | 2017 |
Security analysis survey and framework design for ip connected lowpans R Riaz, KH Kim, HF Ahmed 2009 international symposium on autonomous decentralized systems, 1-6, 2009 | 71 | 2009 |
A real-time fall detection system based on the acceleration sensor of smartphone Y Lee, H Yeh, KH Kim, O Choi International Journal of Engineering Business Management 10, 1847979017750669, 2018 | 70 | 2018 |
SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN) HR Hussen, GA Tizazu, M Ting, T Lee, Y Choi, KH Kim 2013 Fifth international conference on ubiquitous and future networks (ICUFN …, 2013 | 69 | 2013 |
Survey of security requirements, attacks and network integration in wireless mesh networks H Redwan, KH Kim 2008 New Technologies, Mobility and Security, 1-5, 2008 | 68 | 2008 |
Power sharing and control in distributed generation with wireless sensor networks R Majumder, G Bag, KH Kim IEEE Transactions on Smart Grid 3 (2), 618-634, 2012 | 63 | 2012 |
Efficient distributed simulation of hierarchical DEVS models: transforming model structure into a non-hierarchical one K Kim, W Kang, B Sagong, H Seo Proceedings 33rd Annual Simulation Symposium (SS 2000), 227-233, 2000 | 63 | 2000 |
LNMP-Management architecture for IPv6 based low-power wireless Personal Area Networks (6LoWPAN) H Mukhtar, K Kang-Myo, SA Chaudhry, AH Akbar, K Ki-Hyung, SW Yoo NOMS 2008-2008 IEEE Network operations and management symposium, 417-424, 2008 | 61 | 2008 |
Block chain based data security enhanced IoT server platform JH Jeon, KH Kim, JH Kim 2018 International Conference on Information Networking (ICOIN), 941-944, 2018 | 57 | 2018 |
CORBA-based, multi-threaded distributed simulation of hierarchical DEVS models: transforming model structure into a non-hierarchical one KH Kim, WS Kang International Conference on Computational Science and Its Applications, 167-176, 2004 | 52 | 2004 |
A TOTP-based two factor authentication scheme for hyperledger fabric blockchain WS Park, DY Hwang, KH Kim 2018 Tenth international conference on ubiquitous and future networks (ICUFN …, 2018 | 51 | 2018 |
Wormhole attack prevention mechanism for RPL based LLN network FI Khan, T Shon, T Lee, K Kim 2013 Fifth international conference on ubiquitous and future networks (ICUFN …, 2013 | 51 | 2013 |
Distributed simulation of hierarchical DEVS models: Hierarchical scheduling locally and time warp globally KH Kim, YR Seong, TG Kim, KH Park Transactions of the Society for Computer Simulation International 13 (3 …, 1996 | 50 | 1996 |