Name
Affiliation
Papers
BYUNGRAE CHA
Honam Univ, Dept Comp Eng, Kwangju, South Korea
35
Collaborators
Citations 
PageRank 
29
51
14.59
Referers 
Referees 
References 
134
244
120
Search Limit
100244
Title
Citations
PageRank
Year
Draft Design of Fruit Object Recognition using Transfer Learning in Smart Farm.00.342020
Prototype of Strawberry Maturity-level Classification to Determine Harvesting Time of Strawberry.00.342020
Survey and Performance Test of Python-based Libraries for Parallel Processing.00.342020
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework00.342018
Draft Design of Distributed Ledger Based Peer-to-Peer Business Platform.00.342018
Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacks.10.352017
Performance Testing of Mass Distributed Abyss Storage Prototype for SMB.10.632017
Design and Verification of Software-Defined RAID for Hybrid Cloud Storage10.402016
A Study of Determining Abnormal Behaviors by Using System for Preventing Agricultural Product Theft.00.342016
Availability analysis and case study of mobile-OTP key generation using skip sampling of voice.00.342016
Preparing and Inter-Connecting Hyper-Converged SmartX Boxes for IoT-Cloud Testbed20.362015
Secured mVoIP Service over Cloud and Container-Based Improvement10.642015
Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments20.382013
Design of NFC Based Micro-payment to Support MD Authentication and Privacy for Trade Safety in NFC Applications00.342013
Security tactics for secured cloud computing resources00.342013
Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet30.462011
Design of Attribute-Based Access Control in Cloud Computing Environment.50.522011
Handling Fake Multimedia Contents Threat with Collective Intelligence in P2P File Sharing Environments20.402010
CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme00.342009
Query-Based Multi-Document Summarization Using Non-Negative Semantic Feature and NMF Clustering10.352008
Copyrights Expression and Secure Container of Software Source Code10.412008
Access Control of Software Source Code by CRYPTEX Model00.342008
Random Password Generation Of Otp System Using Changed Location And Angle Of Fingerprint Features20.432008
Energy Efficient Location-Based Clustering for Skewed-Topology Wireless Sensor Networks20.422008
Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation60.572007
A Topology Control Scheme for Avoiding Sensing Hole in Wireless Sensor Networks00.342007
Improvement of anomaly intrusion detection performance by indirect relation for FTP service10.402007
Study of digital license search for intellectual property rights of S/W source code20.532007
Business Model and Comparasion of S/W Source Code vs. Digital License for IPRs30.812007
A study for monitoring technique for home server based on web camera00.342006
Comparison of S/W Source Code vs Digital License for IPR00.342006
FTP Anomaly Detection Improvement by Indirection Relation and BF-XML Profiling10.402006
Neural network techniques for host anomaly intrusion detection using fixed pattern transformation40.482005
Host anomaly detection performance analysis based on system call of neuro-fuzzy using Soundex algorithm and N-gram technique30.432005
Anomaly intrusion detection for system call using the soundex algorithm and neural networks70.512005