Name
Affiliation
Papers
HYUNG-JONG KIM
Sungkyunkwan Univ, Sch Elect & Comp Engn, Suwon 440746, South Korea
41
Collaborators
Citations 
PageRank 
71
278
27.13
Referers 
Referees 
References 
726
459
186
Search Limit
100726
Title
Citations
PageRank
Year
Wsn-Ses/Mb: System Entity Structure And Model Base Framework For Large-Scale Wireless Sensor Networks10.482021
Devs-Based Experimental Framework For Blockchain Services00.342021
A Study on Reflecting User Experience for Sensor-based Android IoT Services00.342020
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment00.342020
A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk)00.342018
A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress)00.342018
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development00.342017
Secure Password Translation for Document Protection of SOHO Companies10.482017
Enriching Security Education Hands-on Labs with Practical Exercises10.362017
Simulation model cost database.00.342016
Adaptive Add-On Output Regulator for Rejection of Sinusoidal Disturbances and Application to Optical Disc Drives.60.552014
Defining Security Primitives For Eliciting Flexible Attack Scenarios Through Capec Analysis00.342014
System Specification-based Design of Cloud Data Centre and DEVS Simulation for Availability Evaluatio.00.342014
Optimal Tone Space Selection Scheme for OFDMA-VTS in Carrier Aggregation.40.582013
Cognitive Radio Networks with Energy Harvesting.1083.522013
Privacy Level Indicating Data Leakage Prevention System.123.522013
Optimal Power Allocation and Outage Analysis for Cognitive Full Duplex Relay Systems741.962012
A modeling methodology for cyber-security simulation00.342012
OFDMA with variable tone spaces10.372012
Abstracted CPS model: a model for interworking between physical system and simulator for CPS simulation (WIP)10.352012
On the Impact of Outdated Channel Information on the Capacity of Secondary User in Spectrum Sharing Environments110.522012
Mean Value-Based Power Allocation without Instantaneous CSI Feedback in Spectrum Sharing Systems80.542012
Spectrum sharing in cognitive radio networks: impacts of interference power constraints10.372011
The data modeling considered correlation of information leakage detection and privacy violation11.092011
Adaptive Output Regulation for the Rejection of a Periodic Disturbance With an Unknown Frequency.130.962011
Design of internal information leakage detection system considering the privacy violation30.612010
Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.20.372010
Security Requirement Representation Method For Confidence Of Systems And Networks00.342010
DEVS-Based modeling of VoIP spam callers’ behavior for SPIT level calculation110.872009
New Pilot Designs and ICI Mitigation for OFDM Downlink Systems based on IEEE 802.16m Standards over High Speed Vehicular Channels00.342009
On the design of ZF and MMSE Tomlinson-Harashima precoding in multiuser MIMO amplify-and-forward relay system40.452009
User reputation based VoIP spam defense architecture00.342009
The Effect Of Spatial Diversity In Mimo System With Multiuser Diversity Scheduler00.342008
Modeling of distributed intrusion detection using fuzzy system00.342006
FTP Anomaly Detection Improvement by Indirection Relation and BF-XML Profiling10.402006
SITIS: scalable intrusion tolerance middleware for internet service survivability00.342004
Vulnerability modeling and simulation for DNS intrusion tolerance system construction71.042004
Defense Mechanism for Information and Communication Infrastructure00.342003
System specification based network modeling for survivability testing simulation30.872002
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies10.442002
Vulnerability Assessment Simulation for Information Infrastructure Protection30.682002