Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
rod adams
Jhonathan Pinzon
Liangliang Shang
Giovanni Venturelli
Chen Ma
Jing-Sheng Wong
Euiyoung Park
Radu Timofte
Ikram El Azami
Home
/
Author
/
HYUNG-JONG KIM
Author Info
Open Visualization
Name
Affiliation
Papers
HYUNG-JONG KIM
Sungkyunkwan Univ, Sch Elect & Comp Engn, Suwon 440746, South Korea
41
Collaborators
Citations
PageRank
71
278
27.13
Referers
Referees
References
726
459
186
Search Limit
100
726
Publications (41 rows)
Collaborators (71 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Wsn-Ses/Mb: System Entity Structure And Model Base Framework For Large-Scale Wireless Sensor Networks
1
0.48
2021
Devs-Based Experimental Framework For Blockchain Services
0
0.34
2021
A Study on Reflecting User Experience for Sensor-based Android IoT Services
0
0.34
2020
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment
0
0.34
2020
A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk)
0
0.34
2018
A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress)
0
0.34
2018
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development
0
0.34
2017
Secure Password Translation for Document Protection of SOHO Companies
1
0.48
2017
Enriching Security Education Hands-on Labs with Practical Exercises
1
0.36
2017
Simulation model cost database.
0
0.34
2016
Adaptive Add-On Output Regulator for Rejection of Sinusoidal Disturbances and Application to Optical Disc Drives.
6
0.55
2014
Defining Security Primitives For Eliciting Flexible Attack Scenarios Through Capec Analysis
0
0.34
2014
System Specification-based Design of Cloud Data Centre and DEVS Simulation for Availability Evaluatio.
0
0.34
2014
Optimal Tone Space Selection Scheme for OFDMA-VTS in Carrier Aggregation.
4
0.58
2013
Cognitive Radio Networks with Energy Harvesting.
108
3.52
2013
Privacy Level Indicating Data Leakage Prevention System.
12
3.52
2013
Optimal Power Allocation and Outage Analysis for Cognitive Full Duplex Relay Systems
74
1.96
2012
A modeling methodology for cyber-security simulation
0
0.34
2012
OFDMA with variable tone spaces
1
0.37
2012
Abstracted CPS model: a model for interworking between physical system and simulator for CPS simulation (WIP)
1
0.35
2012
On the Impact of Outdated Channel Information on the Capacity of Secondary User in Spectrum Sharing Environments
11
0.52
2012
Mean Value-Based Power Allocation without Instantaneous CSI Feedback in Spectrum Sharing Systems
8
0.54
2012
Spectrum sharing in cognitive radio networks: impacts of interference power constraints
1
0.37
2011
The data modeling considered correlation of information leakage detection and privacy violation
1
1.09
2011
Adaptive Output Regulation for the Rejection of a Periodic Disturbance With an Unknown Frequency.
13
0.96
2011
Design of internal information leakage detection system considering the privacy violation
3
0.61
2010
Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.
2
0.37
2010
Security Requirement Representation Method For Confidence Of Systems And Networks
0
0.34
2010
DEVS-Based modeling of VoIP spam callers’ behavior for SPIT level calculation
11
0.87
2009
New Pilot Designs and ICI Mitigation for OFDM Downlink Systems based on IEEE 802.16m Standards over High Speed Vehicular Channels
0
0.34
2009
On the design of ZF and MMSE Tomlinson-Harashima precoding in multiuser MIMO amplify-and-forward relay system
4
0.45
2009
User reputation based VoIP spam defense architecture
0
0.34
2009
The Effect Of Spatial Diversity In Mimo System With Multiuser Diversity Scheduler
0
0.34
2008
Modeling of distributed intrusion detection using fuzzy system
0
0.34
2006
FTP Anomaly Detection Improvement by Indirection Relation and BF-XML Profiling
1
0.40
2006
SITIS: scalable intrusion tolerance middleware for internet service survivability
0
0.34
2004
Vulnerability modeling and simulation for DNS intrusion tolerance system construction
7
1.04
2004
Defense Mechanism for Information and Communication Infrastructure
0
0.34
2003
System specification based network modeling for survivability testing simulation
3
0.87
2002
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies
1
0.44
2002
Vulnerability Assessment Simulation for Information Infrastructure Protection
3
0.68
2002
1