Zobrazeno 1 - 10
of 106
pro vyhledávání: '"Ki-Chang Kim"'
Publikováno v:
Wireless Personal Communications. 118:1709-1731
Cooperative spectrum sensing allows users to detect available spectrum and utilize it. However, it is known that a few users can easily affect the cooperative decision at the fusion center by reporting falsified sensing data. The problem of detecting
Publikováno v:
Wireless Personal Communications. 112:2597-2609
Detecting ransomware is harder than general malware because of the ever-increasing number of ransomwares with different signatures, which makes traditional signature-based detection technique powerless against ransomware. Current ransomware detection
Publikováno v:
IEEE Access, Vol 8, Pp 48503-48514 (2020)
In the forthcoming era of IoT, where everything will be connected, mobile devices will play a key role in providing data sharing and user-centric services between devices. In such a service environment, if a mobile application is vulnerable to securi
Autor:
Sang-Hyun Kim, Keon Woong Moon, Ki Chang Kim, Byung Ryul Cho, Chang-Wook Nam, Jang Whan Bae, Doo Il Kim, Jin Ho Kim, June Hong Kim, Doo Soo Jeon, Jae-Sik Jang, Bum-Kee Hong, Woonggil Choi
Publikováno v:
Korean Circulation Journal
Background and objectives Intermediate coronary lesion that can be under- or over-estimated by visual estimation frequently results in stenting of functionally nonsignificant lesions or deferral of percutaneous coronary intervention (PCI) of signific
Autor:
Sangbong Yoo, Ki-Chang Kim
Publikováno v:
Wireless Personal Communications. 102:559-581
The IEEE 802.15.6 slotted Aloha protocol defines a contention based medium access mechanism for wireless body area network (WBAN). However the proposed scheme can cause a high collision rate when the number of nodes increases, thus decreasing overall
Publikováno v:
Wireless Personal Communications. 97:2053-2067
The IEEE 802.15.6 slotted Aloha based protocol for wireless body area network includes contention based medium access control to accommodate heterogeneous body sensor nodes. Current protocol has been designed to handle incoming packets from sensors h
Publikováno v:
iThings/GreenCom/CPSCom/SmartData
Java Virtual Machine relies on the SecurityManager class to prevent illegal system resource access by external Java code (e.g., Java Applet). The SecurityManager checks the access right of all Java classes in the call stack when a system resource is
Publikováno v:
Journal of the architectural institute of Korea planning & design. 31:231-238
This study aims to investigate optimized mechanical pressurization of each outdoor air temperature in order to resolve noise problems associated with stack effect. For this study, noise levels resulted by stack effect was measured during three months
Publikováno v:
Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology. 5:289-296
Java is an interpreted language that can run on a variety of platforms, also Java has a number of useful features for network. Due to theses features of Java language, Java is used in various fields. In this paper, we will talk about how the malware
Publikováno v:
Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology. 5:297-304
Zeus is one of the will-published malwares. Generally, it infects PC by executing a specific binary file downloaded on the internet. When infected, try to hook a particular Windows API of the currently running processes. If process runs hooked API, t