125 results on '"Yoo, Seong-Moo"'
Search Results
2. Protocol misbehavior detection framework using machine learning classification in vehicular Ad Hoc networks
3. Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks
4. Implementation and Evaluation of Flipped Classroom as IoT Element into Learning Process of Computer Network Education
5. Quantum Three-Pass protocol: Key distribution using quantum superposition states
6. A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator
7. Efficient data association to targets for tracking in passive wireless sensor networks
8. Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks
9. A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators
10. A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators
11. Extended self-reproducible Discrete Event System Specification (DEVS) formalism using hidden inheritance
12. E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs
13. Rule-based multiple-target tracking in acoustic wireless sensor networks
14. A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks
15. Doppler effect on target tracking in wireless sensor networks
16. An efficient reliable one-hop broadcast in mobile ad hoc networks
17. Dissecting a Network-Based Education System
18. Intelligent cell selection satisfying user requirements for inter-system handover in heterogeneous networks
19. LSM: A layer subdivision method for deformable object matching
20. Fuzzy Aggregation with Artificial Color filters
21. Secure Data Integrity in VANETs based on CS-DC Scheme
22. Efficient local transformation estimation using Lie operators
23. Best Practices in Running IT Hackathons Based on Paragon University Dataset
24. A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks
25. Recycled path routing in mobile ad hoc networks
26. DIG: Degree of inter-reference gap for a dynamic buffer cache management
27. Personality Classification by Applying k-Means Clustering
28. Quantum Computing: Principles and Applications
29. An efficient task allocation scheme for 2D mesh architectures
30. Artificial color image logic
31. Fail-Safe Mechanism Using Entropy Based Misbehavior Classification and Detection in Vehicular Ad Hoc Networks
32. Protecting Data Integrity for Multi-Application Environment in Wireless Sensor Networks
33. Verifiable Search Meets Blockchain: A Privacy-Preserving Framework for Outsourced Encrypted Data
34. Optimal Threshold Analysis for Triggering Fail-Safe Mechanism in Vehicular Ad Hoc Networks
35. Analysis of Data to Improve System of an Educational Organization
36. Securing data forwarding against blackhole attacks in mobile ad hoc networks
37. Broadcast storm mitigation from unintentional misbehavior in vehicular ad hoc networks
38. Securing SCADA Applications Using OpenPLC With End-To-End Encryption
39. Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks
40. Dissecting a network-based education system: the methods used to design the Alabama Learning Exchange can be replicated to create your own efficient, cost-effective, network-based education systems
41. Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
42. Secure VPN Using Mobile IPv6 Based Moving Target Defense
43. Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense
44. EACK: End-to-End Acknowledgement-Based Method for Reliable Data Collection in Wireless Sensor Networks
45. E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs
46. Noise Mitigation for Multiple Target Tracking in Acoustic Wireless Sensor Networks
47. Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense.
48. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols
49. Maximizing Investigation Effectiveness in Digital Forensic Cases
50. The Insecurity of Wireless Networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.