Zobrazeno 1 - 10
of 169
pro vyhledávání: '"Yoohwan Kim"'
Autor:
Tejaswini Goli, Yoohwan Kim
Publikováno v:
International Journal of Networked and Distributed Computing (IJNDC), Vol 9, Iss 2-3 (2021)
The rapid growth of Internet-of-Things (IoT) devices and the large network of interconnected devices pose new security challenges and privacy threats that would put those devices at high risk and cause harm to the affiliated users. This paper emphasi
Externí odkaz:
https://doaj.org/article/14723699c77e4df382391e6d0dc2cb7d
Publikováno v:
International Journal of Networked and Distributed Computing (IJNDC), Vol 9, Iss 2-3 (2021)
Bug Bounty Programs (BBPs) play an important role in providing and maintaining security in software applications. These programs allow testers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread
Externí odkaz:
https://doaj.org/article/8b3cbc4077e048ab851925b9a1e8179f
Autor:
Yoohwan Kim, Ju-Yeon Jo
Publikováno v:
International Journal of Networked and Distributed Computing (IJNDC), Vol 6, Iss 1 (2017)
Many cryptocurrencies rely on Blockchain for its operation. Blockchain serves as a public ledger where all the completed transactions can be looked up. To place transactions in the Blockchain, a mining operation must be performed. However, due to a l
Externí odkaz:
https://doaj.org/article/55b3cf18f7154d9ea92a68cf3da874c1
Publikováno v:
Information, Vol 10, Iss 7, p 222 (2019)
Background: Hadoop has become the base framework on the big data system via the simple concept that moving computation is cheaper than moving data. Hadoop increases a data locality in the Hadoop Distributed File System (HDFS) to improve the performan
Externí odkaz:
https://doaj.org/article/04950a2d10a34e769271909aa1a6cedf
Publikováno v:
Journal of Computer Science. 16:72-91
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one th
Autor:
Silafu Yiliyaer, Yoohwan Kim
Publikováno v:
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC).
Autor:
Samuel Black, Yoohwan Kim
Publikováno v:
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC).
Publikováno v:
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC).
Publikováno v:
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC).
Publikováno v:
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC).