Name
Papers
Collaborators
YOOHWAN KIM
58
97
Citations 
PageRank 
Referers 
373
35.90
901
Referees 
References 
1019
474
Search Limit
1001000
Title
Citations
PageRank
Year
Performance and Cost Analysis of Sia, a Blockchain-Based Storage Platform00.342021
CoviReader: Using IOTA and QR Code Technology to Control Epidemic Diseases across the US00.342021
A Framework for Decentralized Private Random State Generation and Maintenance for Multiplayer Gaming Over Blockchain00.342020
Secure IoT Data Management in a Private Ethereum Blockchain10.432020
UAS-based object tracking via Deep Learning00.342019
Survey of Data Locality in Apache Hadoop00.342019
Aging-Aware Design Verification Methods Under Real Product Operating Conditions00.342019
Hadoop Performance Analysis Model With Deep Data Locality00.342019
AutoEncoded Domains with Mean Activation for DGA Botnet Detection00.342019
Implementation of a Blockchain-Based Event Reselling System00.342019
Understanding the Effects of TCP Tunneling on Approaching High Performance HAIPE-Encrypted Satellite Communication Systems00.342019
Investigation of BTI characteristics and its behavior on 10 nm SRAM with high-k/metal gate FinFET technology having multi-VT gate stack.00.342018
Dynamically Adjusting The Mining Capacity In Cryptocurrency With Binary Blockchain00.342018
A survey on IoT communication and computation frameworks: An industrial perspective130.822017
Text mining for security threat detection discovering hidden information in unstructured log messages00.342016
Big Data Analysis with Hadoop on Personalized Incentive Model with Statistical Hotel Customer Data.20.382016
Performance Improvement of MapReduce Process by Promoting Deep Data Locality10.382016
Vertebrae Detection Algorithm in CT Scout Images.00.342016
Vulnerability Analysis of Iframe Attacks on Websites.10.372016
Utilizing NFC to secure identification00.342015
Method for secure RESTful web service30.412015
Restful Web Service And Web-Based Data Visualization For Environmental Monitoring20.412015
A Framework for Environmental Monitoring with Arduino-Based Sensors Using Restful Web Service50.502014
Mindmetrics: Identifying users without their login IDs10.372014
Performance testing of web-based data visualization40.482014
New power saving algorithm considering associated STAs and consecutive traffics in WLAN AP00.342013
The energy saving strategy using the network coding in the wireless mesh network10.352012
Preface to KOCSEA Special Issue.00.342012
A Secure Credit Card Transaction Method Based on Kerberos.00.342011
Anomaly detection in multiple scale for insider threat analysis00.342011
SignatureCheck: a protocol to detect man-in-the-middle attack in SSL40.512011
Coverage and connectivity problems under border effects in wireless sensor networks00.342010
EECCR: An energy-efficient m-Coverage and n-Connectivity routing algorithm under border effects in heterogeneous sensor networks170.752009
HTSMA: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme in Heterogeneous Wireless Mesh Networks10.352009
Energy Efficient Non-uniform Clustering Division Scheme in Wireless Sensor Networks60.512008
ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks170.702008
EEMC: An energy-efficient multi-tier clustering algorithm for large-scale wireless sensor networks471.332008
EECCP: an energy-efficient coverage- and connectivity preserving algorithm under border effects in wireless sensor networks30.402008
Baseline Profile Stability for Network Anomaly Detection90.562008
IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks00.342007
An Improved Multi-Layered Architecture and its Rotational Scheme for Large-Scale Wireless Sensor Networks40.482007
Performance Analysis of Error Control Codes for Wireless Sensor Networks381.992007
PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks602.422006
An Efficient Defense against Distributed Denial-of-Service Attacks using Congestion Path Marking10.372006
A Hybrid Evolutionary Analogue Module Placement Algorithm For Integrated Circuit Layout Designs60.512005
Coordinated robust routing by dual cluster heads in layered wireless sensor networks60.492005
Macro-cell placement for analog physical designs using a hybrid genetic algorithm with simulated annealing20.432005
Hash-Based Internet Traffic Load Balancing10.352004
Packetscore: statistics-based overload control against distributed denial-of-service attacks572.942004
Transient performance of PacketScore for blocking DDoS attacks60.612004
  • 1
  • 2