Follow
Yoohwan Kim
Yoohwan Kim
Department of Computer Science, College of Engineering, University of Nevada Las Vegas
Verified email at unlv.edu - Homepage
Title
Cited by
Cited by
Year
PacketScore: Statistics-based overload control against distributed denial-of-service attacks
Y Kim, WC Lau, MC Chuah, HJ Chao
IEEE INFOCOM 2004 4, 2594-2604, 2004
2332004
A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks
Y Kim, WC Lau, MC Chuah, HJ Chao
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 3 (2), 0141-155, 2006
2162006
EEMC: An energy-efficient multi-level clustering algorithm for large-scale wireless sensor networks
Y Jin, L Wang, Y Kim, X Yang
Computer networks 52 (3), 542-562, 2008
1912008
Method and apparatus for information delivery on the internet
Y Kim, D Chung
US Patent App. 09/940,923, 2002
1642002
Performance analysis of error control codes for wireless sensor networks
G Balakrishnan, M Yang, Y Jiang, Y Kim
Fourth international conference on information technology (ITNG'07), 876-879, 2007
1352007
Implementation of detection and tracking mechanism for small UAS
SR Ganti, Y Kim
2016 International Conference on Unmanned Aircraft Systems (ICUAS), 1254-1260, 2016
1222016
Distributed architecture for statistical overload control against distributed denial of service attacks
HHJ Chao, MC Chuah, Y Kim, WC Lau
US Patent 7,526,807, 2009
1202009
An agile manufacturing workcell design
RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ...
Iie Transactions 29 (10), 901-909, 1997
941997
A survey on IoT communication and computation frameworks: An industrial perspective
S Tayeb, S Latifi, Y Kim
2017 IEEE 7th annual Computing and Communication Workshop and Conference …, 2017
782017
Implementation and comparison of M2M protocols for Internet of Things
P Thota, Y Kim
2016 4th Intl Conf on Applied Computing and Information Technology/3rd Intl …, 2016
632016
EECCR: An energy-efficient-coverage and-connectivity routing algorithm under border effects in heterogeneous sensor networks
Y Jin, L Wang, JY Jo, Y Kim, M Yang, Y Jiang
IEEE Transactions on Vehicular Technology 58 (3), 1429-1442, 2009
602009
SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography
Y Kim, W Ren, JY Jo, M Yang, Y Jiang, J Zheng
2007 IEEE International Conference on Communications, 1570-1575, 2007
582007
Design of an agile manufacturing workcell for light mechanical applications
RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ...
Proceedings of IEEE international conference on robotics and automation 1 …, 1996
541996
Design lessons for building agile manufacturing systems
WS Newman, A Podgurski, RD Quinn, FL Merat, MS Branicky, NA Barendt, ...
IEEE Transactions on Robotics and Automation 16 (3), 228-238, 2000
532000
ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks
Y Jin, JY Jo, L Wang, Y Kim, X Yang
Computer Communications 31 (10), 2398-2407, 2008
452008
ADS-B vulnerabilities and a security solution with a timestamp
Y Kim, JY Jo, S Lee
IEEE Aerospace and Electronic Systems Magazine 32 (11), 52-61, 2017
432017
Defeating distributed denial-of-service attack with deterministic bit marking
Y Kim, JY Jo, FL Merat
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
412003
Baseline Profile Stability for Network Anomaly Detection
Y Kim, JY Jo, K Suh
International Journal of Network Security 6 (1), 60-66, 2008
402008
Internet traffic load balancing using dynamic hashing with flow volume
JY Jo, Y Kim, HJ Chao, FL Merat
Internet Performance and Control of Network Systems III 4865, 154-165, 2002
402002
Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications
R Harkanson, Y Kim
Proceedings of the 12th annual conference on cyber and information security …, 2017
382017
The system can't perform the operation now. Try again later.
Articles 1–20