Name
Affiliation
Papers
DONG SEONG KIM
Computer Engineering Department, Hankuk Aviation University
194
Collaborators
Citations 
PageRank 
211
866
93.34
Referers 
Referees 
References 
1800
3108
1776
Search Limit
1001000
Title
Citations
PageRank
Year
Accurate LPI Radar Waveform Recognition With CWD-TFA for Deep Convolutional Network10.352021
Prioritized-MAC Model for Intelligent UAV-to-BS Communication in Industrial-WSN Systems00.342021
Analysis And Prediction Of Hourly Energy Consumption Based On Long Short-Term Memory Neural Network00.342021
Hybrid MAC Protocol for UAV-Assisted Data Gathering in a Wireless Sensor Network00.342021
Evaluating The Effectiveness Of Shuffle And Redundancy Mtd Techniques In The Cloud00.342021
Task Priority-Based Resource Allocation Algorithm For Task Offloading In Fog-Enabled Iot Systems00.342021
IoT-Based Vibration Sensor Data Collection and Emergency Detection Classification using Long Short Term Memory (LSTM)10.352021
On the Performance Evaluations of Cooperative Retransmission Scheme for Cell-Edge Users of URLLC in Multi-Carrier Downlink NOMA Systems00.342021
Edge Ai Prospect Using The Neuroedge Computing System: Introducing A Novel Neuromorphic Technology00.342021
Decentralized Latency-aware Edge Node Grouping with Fault Tolerance for Internet of Battlefield Things00.342020
3GPP Release-16 for Industrial Internet of Things and Mission Critical Communications00.342020
Anti-Drone System: A Visual-based Drone Detection using Neural Networks00.342020
Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense10.362020
Distributed Computing Architecture for Logistic Job Allocation in Smart Factory00.342020
Adaptive Essential Matrix Based Stereo Visual Odometry with Joint Forward-Backward Translation Estimation.00.342020
Tactical Remodeling of Unrecoverable Packets in MIL-STD-1553 Network-bus for Industrial-IoBT00.342020
Integrated Proactive Defense for Software Defined Internet of Things under Multi-Target Attacks00.342020
Optimal Sensing and Interference Suppression in 5G Cognitive Radio Networks.00.342020
Attack Graph-Based Moving Target Defense in Software-Defined Networks10.392020
Double Deep Q-Learning Based Channel Estimation for Industrial Wireless Networks00.342020
Learning Geometric Features with Dual-stream CNN for 3D Action Recognition.00.342020
Multi-shuffled Convolutional Blocks for Low-complex Modulation Recognition00.342020
Bio-inspired Relay Selection Algorithm Using Finite Blocklength Regime for URLLC00.342020
IoT-Based HVAC Monitoring System for Smart Factory00.342020
A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things00.342020
Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms00.342020
Evaluation of a Backup-as-a-Service Environment for Disaster Recovery00.342019
Systematic identification of threats in the cloud: A survey.30.392019
An Automated Security Analysis Framework and Implementation for Cloud.00.342019
Malware Detection with Malware Images using Deep Learning Techniques10.352019
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks00.342019
SAGA: Secure Auto-Configurable Gateway Architecture for Smart Home00.342019
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks10.352019
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing00.342019
Security and Performance Modeling and Optimization for Software Defined Networking00.342019
SDN-Based IP Shuffling Moving Target Defense with Multiple SDN Controllers20.362019
A Hardware Implementation of SHA3 Hash Processor using Cortex-M010.392019
Comprehensive Security Assessment of Combined MTD Techniques for the Cloud.20.402018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques.00.342018
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud00.342018
A systematic evaluation of cybersecurity metrics for dynamic networks.00.342018
Android Malware Detection Using Feature Selections and Random Forest00.342018
Stateless Security Risk Assessment for Dynamic Networks00.342018
A framework for automating security analysis of the internet of things.250.852017
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches00.342017
Discovering and Mitigating New Attack Paths Using Graphical Security Models00.342017
Security Modeling And Analysis Of Cross-Protocol Iot Devices00.342017
TDMA-based efficient cooperative relaying selection scheme in multi-hop wireless networks.10.372017
Detrended fluctuation analysis on ECG device for home environment10.362017
Towards scalable security analysis using multi-layered security models.130.642016
  • 1
  • 2