Information

Dear user, the application need JavaScript support. Please enable JavaScript in your browser.

You search for a phrase ""Kim, Dong Seong"" according to the criterion: All Text


Showing 1-76 from 76 results
Title:
An Overview on Industrial Control Networks
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :3-16
eBook
Title:
FlexRay Protocol: Objectives and Features
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :17-30
eBook
Title:
Communication Using Controller Area Network Protocol
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :31-41
eBook
Title:
Distributed Control System for Ship Engines Using Dual Fieldbus
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :43-64
eBook
Title:
Implementing Modbus and CAN Bus Protocol Conversion Interface
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :65-72
eBook
Title:
MIL-STD-1553 Protocol in High Data Rate Applications
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :73-88
eBook
Title:
Research and Design of 1553B Protocol Bus Control Unit
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :89-98
eBook
Title:
An Overview on Wireless Sensor Networks
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :101-113
eBook
Title:
Wireless Fieldbus for Industrial Networks
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :115-125
eBook
Title:
Wireless Sensor Networks for Industrial Applications
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :127-140
eBook
Title:
MAC Protocols for Energy-Efficient Wireless Sensor Networks
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :141-159
eBook
Title:
Cooperative Multi-channel Access for Industrial Wireless Networks Based 802.11 Standard
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :161-172
eBook
Title:
802.11 Medium Access Control DCF and PCF: Performance Comparison
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :173-179
eBook
Title:
An Overview of Ultra-Wideband Technology and Its Applications
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :181-196
eBook
Title:
Ultra-Wideband Technology for Military Applications
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :197-204
eBook
Title:
An Overview on Industrial Internet of Things
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :207-216
eBook
Title:
Energy-Aware Real-Time Routing for Large-Scale Industrial Internet of Things
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :217-239
eBook
Title:
3D Perception Framework for Stacked Container Layout in the Physical Internet
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :241-258
eBook
Title:
An Information Framework of Internet of Things Services for Physical Internet
Authors:
Kim, Dong-Seong
Tran-Dang, Hoa
Show more
Source:
Industrial Sensors and Controls in Communication Networks : From Wired Technologies to Cloud Computing and the Internet of Things. :259-281
eBook
Title:
A Game Theoretic Approach for Cloud Computing Security Assessment Using Moving Target Defense Mechanisms
Authors:
El Mir, Iman
Haqiq, Abdelkrim
Kim, Dong Seong
Show more
Source:
Innovations in Smart Cities and Applications : Proceedings of the 2nd Mediterranean Symposium on Smart City Applications. 37:242-254
eBook
Title:
Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems
Authors:
Kedziora, Michal
Chow, Yang-Wai
Susilo, Willy
Show more
Source:
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings. 719:3-13
eBook
Title:
Rounding Technique’s Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce
Authors:
Qin, Wenjie
Lv, Kewei
Show more
Source:
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings. 719:48-57
eBook
Title:
RESTful Is Not Secure
Authors:
Yarygina, Tetiana
Show more
Source:
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings. 719:141-153
eBook
Title:
Low-Complexity Signature-Based Malware Detection for IoT Devices
Authors:
Abbas, Muhamed Fauzi Bin
Srikanthan, Thambipillai
Show more
Source:
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings. 719:181-189
eBook
Title:
De-anonymous and Anonymous Technologies for Network Traffic Release
Authors:
Tian, XiangAff14, Aff15, Aff16
Wang, Yu
Zhu, YujiaAff15, Aff16
Sun, YongAff15, Aff16
Liu, QingyunAff15, Aff16
Show more
Source:
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings. 719:193-200
eBook
Title:
Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems
Authors:
Yoo, Sang GuunAff14, Aff15
Barriga, Jhonattan J.
Show more
Source:
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings. 719:201-213
eBook
Title:
On the Effectiveness of Non-readable Executable Memory Against BROP
Authors:
Otterstad, Christian
Show more
Source:
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings. 719:214-221
eBook
Title:
Performance Analysis and Security Based on Intrusion Detection and Prevention Systems in Cloud Data Centers
Authors:
El Mir, Iman
Haqiq, Abdelkrim
Kim, Dong Seong
Show more
Source:
Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016). 552:456-465
eBook
Title:
A Bottom-Up Approach to Applying Graphical Models in Security Analysis
Authors:
Ou, Xinming
Show more
Source:
Graphical Models for Security : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. 9987:1-24
eBook
Title:
On the Soundness of Attack Trees
Authors:
Audinot, Maxime
Pinchinat, Sophie
Show more
Source:
Graphical Models for Security : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. 9987:25-38
eBook
Title:
Enterprise Architecture-Based Risk and Security Modelling and Analysis
Authors:
Jonkers, Henk
Quartel, Dick A. C.
Show more
Source:
Graphical Models for Security : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. 9987:94-101
eBook
Title:
From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation
Authors:
Li, EricAff16, Aff17
Barendse, Jeroen
Brodbeck, Frederic
Tanner, Axel
Show more
Source:
Graphical Models for Security : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. 9987:102-118
eBook
Title:
Confining Adversary Actions via Measurement
Authors:
Rowe, Paul D.
Show more
Source:
Graphical Models for Security : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. 9987:150-166
eBook
Title:
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Authors:
Hong, Jin B.
Chung, Chun-Jen
Huang, Dijiang
Kim, Dong Seong
Show more
Source:
Algorithms and Architectures for Parallel Processing : ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings. 9532:582-592
eBook
Title:
Scalable Security Model Generation and Analysis Using k-importance Measures
Authors:
Hong, Jin B.
Kim, Dong Seong
Show more
Source:
Security and Privacy in Communication Networks : 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers. 127:270-287
eBook
Title:
Performance Analysis of Scalable Attack Representation Models
Authors:
Hong, Jin B.
Kim, Dong Seong
Show more
Source:
Security and Privacy Protection in Information Processing Systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings. 405:330-343
eBook
Title:
Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec
Authors:
Moon, Misun
Kim, Dong Seong
Park, Jong Sou
Show more
Source:
Computational Intelligence and Security : International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papers. 4456:743-749
eBook
Title:
A Secure Data Aggregation Scheme for Wireless Sensor Networks
Authors:
Ren, Shu Qin
Kim, Dong Seong
Park, Jong Sou
Show more
Source:
Frontiers of High Performance Computing and Networking ISPA 2007 Workshops : ISPA 2007 International Workshops SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN Niagara Falls, Canada, August 28-September 1, 2007 Proceedings. 4743:32-40
eBook
Title:
A Key Revocation Scheme for Mobile Sensor Networks
Authors:
Kim, Dong Seong
Sadi, Mohammed Golam
Park, Jong Sou
Show more
Source:
Frontiers of High Performance Computing and Networking ISPA 2007 Workshops : ISPA 2007 International Workshops SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN Niagara Falls, Canada, August 28-September 1, 2007 Proceedings. 4743:41-49
eBook
Title:
Building Lightweight Intrusion Detection System Based on Random Forest
Authors:
Kim, Dong Seong
Lee, Sang Min
Park, Jong Sou
Show more
Source:
Advances in Neural Networks - ISNN 2006 : Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part III. 3973:224-230
eBook
Title:
A Survivable Distributed Sensor Networks Through Stochastic Models
Authors:
Kim, Dong Seong
Park, Jong Sou
Show more
Source:
Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops : ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006. Proceedings. 4331:185-194
eBook
Title:
Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification
Authors:
Kim, Dong Seong
Lee, Sang Min
Park, Jong Sou
Show more
Source:
Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops : ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006. Proceedings. 4331:981-989
eBook
Title:
A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security
Authors:
Park, Jong Sou
Kim, Sung-Hwan
Kim, Dong Seong
Show more
Source:
Knowledge-Based Intelligent Information and Engineering Systems : 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part I. 4251:935-942
eBook
Title:
Toward Lightweight Detection and Visualization for Denial of Service Attacks
Authors:
Kim, Dong Seong
Lee, Sang Min
Park, Jong Sou
Show more
Source:
MICAI 2006: Advances in Artificial Intelligence : 5th Mexican International Conference on Artificial Intelligence, Apizaco, Mexico, November 13-17, 2006. Proceedings. 4293:632-640
eBook
Title:
Design of Intelligent Security Management System Using Simulation-Based Analysis
Authors:
Lee, Jang-Se
Kim, Dong Seong
Park, Jong Sou
Chi, Sung-Do
Show more
Source:
AI 2005: Advances in Artificial Intelligence : 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005. Proceedings. 3809:766-775
eBook
Title:
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection
Authors:
Park, Jong Sou
Shazzad, Khaja Mohammad
Kim, Dong Seong
Show more
Source:
Information Security and Cryptology : First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings. 3822:279-289
eBook
Title:
Intrusion Detection System for Securing Geographical Information System Web Servers
Authors:
Park, Jong Sou
Jin, Hong Tae
Kim, Dong Seong
Show more
Source:
Web and Wireless Geographical Information Systems : 4th International Workshop, W2GIS 2004, Goyang, Korea, November 26-27, 2004, Revised Selected Papers. 3428:110-119
eBook
Title:
Network-Based Intrusion Detection with Support Vector Machines
Authors:
Kim, Dong Seong
Park, Jong Sou
Show more
Source:
Information Networking : International Conference, ICOIN 2003, Cheju Island, Korea, February 12-14, 2003.Revised Selected Papers. 2662:747-756
eBook
    Showing 1-76 from 76 results

    We use cookies to help identify your computer so we can tailor your user experience, track shopping basket contents and remember where you are in the order process.