Tai-hoon Kim
Tai-hoon Kim
Sungshin University
Verified email at daum.net
Title
Cited by
Cited by
Year
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
HL Yeh, TH Chen, PC Liu, TH Kim, HW Wei
Sensors 11 (5), 4767-4779, 2011
2922011
Use of artificial neural network in pattern recognition
JK Basu, D Bhattacharyya, T Kim
International journal of software engineering and its applications 4 (2), 2010
2852010
Applications, systems and methods in smart home technology: A
RJ Robles, T Kim
Int. Journal of Advanced Science And Technology 15, 37-48, 2010
2762010
A review on security in smart home development
RJ Robles, T Kim, D Cook, S Das
International Journal of Advanced Science and Technology 15, 2010
2742010
Application of genetic algorithm in software testing
PR Srivastava, T Kim
International Journal of software Engineering and its Applications 3 (4), 87-96, 2009
2562009
A comparative study of wireless sensor networks and their routing protocols
D Bhattacharyya, T Kim, S Pal
Sensors 10 (12), 10506-10523, 2010
1932010
Smart city and IoT
T Kim, C Ramos, S Mohammed
Future Generation Computer Systems 76, 159-162, 2017
1882017
Soccer robotics
JH Kim, DH Kim, YJ Kim, KT Seow
Springer Science & Business Media, 2004
1692004
IT security review: Privacy, protection, access control, assurance and system security
Y Sattarova Feruza, T Kim
International journal of multimedia and ubiquitous engineering 2 (2), 17-32, 2007
1042007
MHD stagnation-point flow of Casson fluid and heat transfer over a stretching sheet with thermal radiation
K Bhattacharyya
Journal of Thermodynamics 2013, 2013
972013
Data hiding in audio signal: A review
P Dutta, D Bhattacharyya, T Kim
International journal of database theory and application 2 (2), 1-8, 2009
922009
Context aware tools for smart home development
RJ Robles, T Kim
International Journal of Smart Home 4 (1), 1-12, 2010
872010
Face recognition using neural network: a review
MM Kasar, D Bhattacharyya, TH Kim
International Journal of Security and Its Applications 10 (3), 81-100, 2016
792016
Dynamic power management in new architecture of wireless sensor networks
C Lin, N Xiong, JH Park, T Kim
International Journal of communication systems 22 (6), 671-693, 2009
782009
Palm vein authentication system: a review
I Sarkar, F Alisherov, T Kim, D Bhattacharyya
702010
A survey of consistency checking techniques for UML models
M Usman, A Nadeem, T Kim, E Cho
2008 Advanced Software Engineering and Its Applications, 57-62, 2008
682008
Linear correlation-based feature selection for network intrusion detection model
HF Eid, AE Hassanien, T Kim, S Banerjee
International Conference on Security of Information and Communication …, 2013
632013
Mobile Queries in GIS
D Bhattacharya, D Chakraborty, P Das, SK Bandyopadhyay, TH Kim
International Journal of Grid and Distributed Computing 2 (2), EJ 1-10, 2009
582009
Breast cancer MRI diagnosis approach using support vector machine and pulse coupled neural networks
AE Hassanien, T Kim
Journal of Applied Logic 10 (4), 277-284, 2012
562012
Wireless network security: Vulnerabilities, threats and countermeasures
M Choi, RJ Robles, C Hong, T Kim
International Journal of Multimedia and Ubiquitous Engineering 3 (3), 77-86, 2008
562008
The system can't perform the operation now. Try again later.
Articles 1–20