Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Mungyu Bae"'
Autor:
Mungyu Bae, Hwangnam Kim
Publikováno v:
Sensors, Vol 19, Iss 9, p 2066 (2019)
As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators. If a drone is
Externí odkaz:
https://doaj.org/article/dc5c3955cf7d44d9808126cf5eab0116
Publikováno v:
Sensors, Vol 18, Iss 6, p 1939 (2018)
Most surveillance systems only contain CCTVs. CCTVs, however, provide only limited maneuverability against dynamic targets and are inefficient for short term surveillance. Such limitations do not raise much concern in some cases, but for the scenario
Externí odkaz:
https://doaj.org/article/6565feefb10e4d42b5b21bc9e8569451
Autor:
Mungyu Bae, Seungho Yoo, Jongtack Jung, Seongjoon Park, Kangho Kim, Joon Yeop Lee Kim, Hwangnam Kim
Publikováno v:
Sensors, Vol 18, Iss 2, p 624 (2018)
Vast applications and services have been enabled as the number of mobile or sensing devices with communication capabilities has grown. However, managing the devices, integrating networks or combining services across different networks has become a ne
Externí odkaz:
https://doaj.org/article/c559dc168b2b42d7a22d3abf4f8f90cf
Publikováno v:
Applied Sciences, Vol 7, Iss 10, p 1072 (2017)
The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing t
Externí odkaz:
https://doaj.org/article/21e3a55d46de400bb06bfcec2a0fadd5
Publikováno v:
Applied Sciences, Vol 7, Iss 10, p 978 (2017)
Much research has been conducted in the area of face and gesture recognition in order to classify one’s emotional state. Surprisingly, utilizing computerized algorithms which recognize emotional conditions based on body postures has not yet been sy
Externí odkaz:
https://doaj.org/article/248b59dae1494b97b2e558d6e1708517
Publikováno v:
IEEE Transactions on Mobile Computing. 16:2366-2378
The demand of mobile traffic increases tremendously as various Internet services are provided to mobile phones and computing devices, making mobile carriers increase the capacity of their cellular network. Since current cell towers and auxiliary devi
Autor:
Hwangnam Kim, Mungyu Bae
Publikováno v:
Sensors
Volume 19
Issue 9
Sensors (Basel, Switzerland)
Sensors, Vol 19, Iss 9, p 2066 (2019)
Volume 19
Issue 9
Sensors (Basel, Switzerland)
Sensors, Vol 19, Iss 9, p 2066 (2019)
As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators. If a drone is
Publikováno v:
Security and Communication Networks. 9:3412-3427
In this paper, we propose a novel anti-phishing scheme, image code-based anti-phishing scheme ICAP, for securing mobile access through an image code. The proposed scheme can protect mobile users from phishing attack and side-glance attack which are t
Publikováno v:
Journal of Network and Computer Applications. 59:333-344
Due to the evolution of smart grid technologies, the number of smart meters deployed in a consumer area is rapidly increasing. As a consequence, network traffic issues in advanced metering infrastructure (AMI) have been raised. In smart gird, satisfy
Publikováno v:
Sensors (Basel, Switzerland)
Sensors, Vol 18, Iss 6, p 1939 (2018)
Sensors
Volume 18
Issue 6
Sensors, Vol 18, Iss 6, p 1939 (2018)
Sensors
Volume 18
Issue 6
Most surveillance systems only contain CCTVs. CCTVs, however, provide only limited maneuverability against dynamic targets and are inefficient for short term surveillance. Such limitations do not raise much concern in some cases, but for the scenario