146 results on '"Kim, Young-Gab"'
Search Results
102. Interoperable OAuth 2.0 Framework
103. Analysis of IoT Platform Security: A Survey
104. Security Requirements for Cloud-based C4I Security Architecture
105. Security Analysis of Smart Speaker: Security Attacks and Mitigation
106. Self-Adaptive Framework with Game Theoretic Decision Making for Internet of Things
107. Secure SCADA-IoT Platform for Industrial Automation and Control: A Collaborative-Communication Designed Model
108. Enhanced and Optimal Development Contributed in Finding Unknown Sources of Interference in Wireless Communication
109. Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System
110. Design of a smart greenhouse system based on MAPE-K and ISO/IEC-11179
111. Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients
112. Centralized Connectivity for Multiwireless Edge Computing and Cellular Platform: A Smart Vehicle Parking System
113. GPC: Ad Injection Detection Tool for Mobile Application
114. Development of IoT security component for interoperability
115. Interoperability of device identification in heterogeneous IoT platforms
116. HXD: Hybrid XSS detection by using a headless browser
117. An Evaluation Method for Content Analysis Based on Twitter Content Influence
118. A Study on Internet Advertisement Injection
119. Runtime verification method for self-adaptive software using reachability of transition system model
120. Study on Enhancing National Defense Security based on RFID and Internet of Things Technology
121. Analysis of Security Standardization for the Internet of Things
122. Security Requirements Analysis for the IoT
123. Sentiment Root Cause Analysis Based on Fuzzy Formal Concept Analysis and Fuzzy Cognitive Map
124. Sentiment user profile analysis based on forgetting curve in mobile environments
125. Poster
126. Mobile video communication based on augmented reality
127. Context Information-based Application Access Control Model
128. HMM-Based Approach for Evaluating Risk Propagation
129. 3G IP Multimedia Subsystem based framework for lawful interception
130. Web robot detection based on pattern-matching technique
131. A quantitative approach to estimate a website security risk using whitelist
132. VARIABILITY MANAGEMENT FOR SOFTWARE PRODUCT-LINE ARCHITECTURE DEVELOPMENT
133. Threat scenario-based security risk analysis using use case modeling in information systems
134. Power saving and delay reduction for supporting WLAN-based fixed-mobile convergence service in smartphone
135. Embedded System Architecture for an FMC Mobile Handset
136. Dynamic Activation of Role on RBAC for Ubiquitous Applications
137. Simulation of Risk Propagation Model in Information Systems
138. FORMAL VERIFICATION OF BUNDLE AUTHENTICATION MECHANISM IN OSGi SERVICE PLATFORM: BAN LOGIC
139. A message conversion system, XML-based metadata semantics description language and metadata repository
140. Quantitative Evaluations on the Query Modeling and System Integrating Cost of SQL/MDR
141. A Secure Migration Mechanism of Mobile Agents Under Mobile Agent Environments.
142. Context-Aware Access Control Mechanism for Ubiquitous Applications.
143. Threat scenario-based security risk analysis using use case modeling in information systems.
144. AN INTEGRITY CHECKING MECHANISM OF MOBILE AGENTS UNDER A CLOSED ENVIRONMENT WITH TRUSTED HOSTS.
145. Certificate sharing system for secure certificate distribution in mobile environment.
146. Video on demand recommender system for internet protocol television service based on explicit information fusion.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.