Drone secure communication protocol for future sensitive applications in military zone Y Ko, J Kim, DG Duguma, PV Astillo, I You, G Pau Sensors 21 (6), 2057, 2021 | 108 | 2021 |
A security protocol for route optimization in DMM-based smart home IoT networks D Shin, K Yun, J Kim, PV Astillo, JN Kim, I You IEEE Access 7, 142531-142550, 2019 | 95 | 2019 |
Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices S Rahmadika, PV Astillo, G Choudhary, DG Duguma, V Sharma, I You IEEE Journal of Biomedical and Health Informatics 27 (2), 710-721, 2022 | 62 | 2022 |
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System PV Astillo, DG Duguma, H Park, J Kim, B Kim, I You Future Generation Computer Systems 128, 395-405, 2022 | 49 | 2022 |
Lightweight misbehavior detection management of embedded IoT devices in medical cyber physical systems G Choudhary, PV Astillo, I You, K Yim, R Chen, JH Cho IEEE Transactions on Network and Service Management 17 (4), 2496-2510, 2020 | 36 | 2020 |
SGF-MD: behavior rule specification-based distributed misbehavior detection of embedded IoT devices in a closed-loop smart greenhouse farming system PV Astillo, J Kim, V Sharma, I You IEEE Access 8, 196235-196252, 2020 | 30 | 2020 |
DMM-SEP: Secure and efficient protocol for distributed mobility management based on 5G networks J Kim, PV Astillo, I You IEEE Access 8, 76028-76042, 2020 | 21 | 2020 |
Predicting cotton yield of small field plots in a cotton breeding program using UAV imagery data JMJ Maja, T Campbell, JC Neto, P Astillo Autonomous Air and Ground Sensing Systems for Agricultural Optimization and …, 2016 | 21 | 2016 |
TrMAps: Trust Management in Specification-based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System PV Astillo, G Choudhary, DG Duguma, J Kim, I You IEEE Journal of Biomedical and Health Informatics 25 (10), 3763 - 3775, 2021 | 20 | 2021 |
A formally verified security scheme for inter-gNB-DU handover in 5G vehicle-to-everything J Kim, DG Duguma, PV Astillo, HY Park, B Kim, I You, V Sharma IEEE Access 9, 119100-119117, 2021 | 17 | 2021 |
MoTH: mobile terminal handover security protocol for HUB switching based on 5G and beyond (5GB) P2MP backhaul environment J Kim, PV Astillo, V Sharma, N Guizani, I You IEEE Internet of Things Journal 9 (16), 14667-14684, 2021 | 13 | 2021 |
SMDAps: A specification-based misbehavior detection system for implantable devices in artificial pancreas system PV Astillo, J Jeong, WC Chien, B Kim, JS Jang, I You Journal of Internet Technology 22 (1), 1-11, 2021 | 13 | 2021 |
A Cloud-Linked Ambient Air Quality Monitoring Apparatus for Gaseous Pollutants in Urban Areas. EM Culpa, JI Mendoza, JG Ramirez, AL Yap, E Fabian, PV Astillo J. Internet Serv. Inf. Secur. 11 (1), 64-79, 2021 | 9 | 2021 |
A multi-controller authentication approach for SDN C Bhatt, V Sihag, G Choudhary, PV Astillo, I You 2021 International Conference on Electronics, Information, and Communication …, 2021 | 9 | 2021 |
APSec1. 0: innovative security protocol design with formal security analysis for the artificial pancreas system J Kim, J Oh, D Son, H Kwon, PV Astillo, I You Sensors 23 (12), 5501, 2023 | 5 | 2023 |
Numerical Analysis of the Ultimate Bearing Capacity of Strip Footing Constructed on Sand-over-Clay Sediment S Banu, M Attom, F Abed, R Vandanapu, PV Astillo, N Al-Lozi, A Khalil Buildings 14 (4), 1164, 2024 | 4 | 2024 |
Ilsun You D Shin, K Yun, J Kim, PV Astillo, JN Kim A Security Protocol for Route Optimization in DMM-Based Smart Home IoT …, 0 | 4 | |
Prediction of internal erosion parameters of clay soils using initial physical properties MF Attom, R Vandanapu, Z Khan, M Yamin, PV Astillo, A Eltayeb, A Khalil Water 16 (2), 232, 2024 | 3 | 2024 |
SMDFbs: Specification-Based Misbehavior Detection for False Base Stations H Park, PVB Astillo, Y Ko, Y Park, T Kim, I You Sensors 23 (23), 9504, 2023 | 3 | 2023 |
Software-Defined Network Based Secure Internet-Enabled Video Surveillance System M Del Castillo, H Hermosa, PV Astillo, G Choudhary, N Dragoni International Conference on Information Security Applications, 89-101, 2022 | 3 | 2022 |