Zobrazeno 1 - 10
of 64
pro vyhledávání: '"Jinkeun Hong"'
Autor:
Jinkeun Hong
Publikováno v:
Journal of the Korea Convergence Society. 6:33-38
백석대학교 정보통신학부Abstract In a V2X convergence service environment, the principal service among infotainment services and driver management services must be supported centering on critical information of the driver, maintenance manag
Autor:
Jinkeun Hong
Publikováno v:
Journal of Digital Convergence. 12:323-328
D-MAC protocol is used convergence network, which is designed to connect wireless link between things. This protocol is supported to local data exchange and aggregation among neighbor nodes, and distributed control packet from sink to sensor node. In
Autor:
Jinkeun Hong
Publikováno v:
Journal of Digital Convergence. 12:309-316
Autor:
Jinkeun Hong
Publikováno v:
The Journal of Digital Policy and Management. 12:599-605
In this paper, we analyzed academic curriculum of information security major in domestic university and in center of education contents, reviewed about eduction distinction direction in each university. Also in center of domestic information security
Autor:
Jinkeun Hong
Publikováno v:
The Journal of Digital Policy and Management. 11:447-452
Berkley Media Access Control (B-MAC) protocol is one of the well-known MAC protocols, which uses adaptive preamble sampling scheme and is designed for wireless sensor networks (WSN). In this paper, we are reviewed about security vulnerability in B-MA
Autor:
Jinkeun Hong
Publikováno v:
The Journal of Digital Policy and Management. 11:435-441
Autor:
Jinkeun Hong
Publikováno v:
International Journal of Advancements in Computing Technology. 5:377-383
Publikováno v:
Journal of Central South University. 20:1889-1895
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can
Autor:
Jinkeun Hong
Publikováno v:
Indian Journal of Science and Technology. 9
Objectives: The autonomous vehicle and driverless research is an interesting issue. Even companies like Google are participating in and leading led this project and research. This paper describes examples of connected vehicle project and it is requir
Autor:
Jinkeun Hong
Publikováno v:
Indian Journal of Science and Technology. 9
Background/Objectives: Requirement for security and safety with interest and growth to C-ITS application is increased. It is needed to security threat issue and risk consideration in the connected vehicle environment. Methods/Statistical Analysis: Fo