Tai-hoon Kim
Tai-hoon Kim
Sungshin University
Dirección de correo verificada de daum.net
Citado por
Citado por
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
HL Yeh, TH Chen, PC Liu, TH Kim, HW Wei
Sensors 11 (5), 4767-4779, 2011
Use of artificial neural network in pattern recognition
JK Basu, D Bhattacharyya, T Kim
International journal of software engineering and its applications 4 (2), 2010
A review on security in smart home development
RJ Robles, T Kim, D Cook, S Das
International Journal of Advanced Science and Technology 15, 2010
Applications, systems and methods in smart home technology: A
RJ Robles, T Kim
Int. Journal of Advanced Science And Technology 15, 37-48, 2010
Application of genetic algorithm in software testing
PR Srivastava, T Kim
International Journal of software Engineering and its Applications 3 (4), 87-96, 2009
A comparative study of wireless sensor networks and their routing protocols
D Bhattacharyya, T Kim, S Pal
Sensors 10 (12), 10506-10523, 2010
Smart city and IoT
T Kim, C Ramos, S Mohammed
Future Generation Computer Systems 76, 159-162, 2017
Data hiding in audio signal: A review
P Dutta, D Bhattacharyya, T Kim
International journal of database theory and application 2 (2), 1-8, 2009
IT security review: Privacy, protection, access control, assurance and system security
Y Sattarova Feruza, TH Kim
International journal of multimedia and ubiquitous engineering 2 (2), 17-32, 2007
Context aware tools for smart home development
RJ Robles, T Kim
International Journal of Smart Home 4 (1), 1-12, 2010
MHD stagnation-point flow of Casson fluid and heat transfer over a stretching sheet with thermal radiation
K Bhattacharyya
Journal of Thermodynamics 2013, 2013
A survey of consistency checking techniques for UML models
M Usman, A Nadeem, T Kim, E Cho
2008 Advanced Software Engineering and Its Applications, 57-62, 2008
Palm vein authentication system: a review
I Sarkar, F Alisherov, T Kim, D Bhattacharyya
Face recognition using neural network: a review
MM Kasar, D Bhattacharyya, TH Kim
International Journal of Security and Its Applications 10 (3), 81-100, 2016
Linear correlation-based feature selection for network intrusion detection model
HF Eid, AE Hassanien, T Kim, S Banerjee
International Conference on Security of Information and Communication …, 2013
Text steganography: a novel approach
D Bhattacharyya, P Das, SK Bandyopadhyay, T Kim
International Journal of Advanced Science and Technology 3 (1), 79-85, 2009
Wireless network security: Vulnerabilities, threats and countermeasures
MK Choi, RJ Robles, C Hong, T Kim
International Journal of Multimedia and Ubiquitous Engineering 3 (3), 77-86, 2008
Brain tumor detection using MRI image analysis
D Bhattacharyya, T Kim
International Conference on Ubiquitous Computing and Multimedia Applications …, 2011
Breast cancer MRI diagnosis approach using support vector machine and pulse coupled neural networks
AE Hassanien, T Kim
Journal of Applied Logic 10 (4), 277-284, 2012
Dynamic power management in new architecture of wireless sensor networks
C Lin, N Xiong, JH Park, T Kim
International Journal of communication systems 22 (6), 671-693, 2009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20