An agile manufacturing workcell design RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ... IIE transactions 29 (10), 901-909, 1997 | 101 | 1997 |
EECCR: An energy-efficient -coverage and -connectivity routing algorithm under border effects in heterogeneous sensor networks Y Jin, L Wang, JY Jo, Y Kim, M Yang, Y Jiang IEEE Transactions on Vehicular Technology 58 (3), 1429-1442, 2009 | 61 | 2009 |
SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography Y Kim, W Ren, JY Jo, M Yang, Y Jiang, J Zheng 2007 IEEE International Conference on Communications, 1570-1575, 2007 | 60 | 2007 |
ADS-B vulnerabilities and a security solution with a timestamp Y Kim, JY Jo, S Lee IEEE Aerospace and Electronic Systems Magazine 32 (11), 52-61, 2017 | 59 | 2017 |
Design of an agile manufacturing workcell for light mechanical applications RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ... Proceedings of IEEE international conference on robotics and automation 1 …, 1996 | 54 | 1996 |
ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks Y Jin, JY Jo, L Wang, Y Kim, X Yang Computer Communications 31 (10), 2398-2407, 2008 | 49 | 2008 |
A framework for environmental monitoring with Arduino-based sensors using Restful web service S Lee, J Jo, Y Kim, H Stephen 2014 IEEE International Conference on Services Computing, 275-282, 2014 | 45 | 2014 |
Internet traffic load balancing using dynamic hashing with flow volume JY Jo, Y Kim, HJ Chao, FL Merat Internet Performance and Control of Network Systems III 4865, 154-165, 2002 | 43 | 2002 |
Defeating distributed denial-of-service attack with deterministic bit marking Y Kim, JY Jo, FL Merat GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 42 | 2003 |
Baseline Profile Stability for Network Anomaly Detection Y Kim, JY Jo, K Suh International Journal of Network Security, 6 (1), 60 - 66, 2008 | 41 | 2008 |
Text mining for security threat detection discovering hidden information in unstructured log messages C Suh-Lee, JY Jo, Y Kim 2016 IEEE Conference on Communications and Network Security (CNS), 252-260, 2016 | 39 | 2016 |
Virtual testing of agile manufacturing software using 3D graphical simulation JY Jo, Y Kim, A Podgurski, WS Newman Proceedings of International Conference on Robotics and Automation 2, 1223-1228, 1997 | 31 | 1997 |
Advances in agile manufacturing FL Merat, NA Barendt, RD Quinn, GC Causey, WS Newman, VB Velasco, ... Proceedings of International Conference on Robotics and Automation 2, 1216-1222, 1997 | 31 | 1997 |
Application of NTRU cryptographic algorithm for SCADA security AP Premnath, JY Jo, Y Kim 2014 11th international conference on information technology: new …, 2014 | 29 | 2014 |
Mindmetrics: Identifying users without their login IDs J Jo, Y Kim, S Lee 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2014 | 27 | 2014 |
A secure location verification method for ADS-B Y Kim, JY Jo, S Lee 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 1-10, 2016 | 26 | 2016 |
A flexible software architecture for agile manufacturing Y Kim, JY Jo, VB Velasco, NA Barendt, A Podgurski, G Ozsoyoglu, ... Proceedings of International Conference on Robotics and Automation 4, 3043-3047, 1997 | 26 | 1997 |
Performance testing of web-based data visualization S Lee, JY Jo, Y Kim 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2014 | 23 | 2014 |
Method for secure RESTful web service S Lee, JY Jo, Y Kim 2015 IEEE/ACIS 14th International Conference on Computer and Information …, 2015 | 22 | 2015 |
High-speed router filter for blocking TCP flooding under DDoS attack Y Kim, JY Jo, HJ Chao, F Merat Conference Proceedings of the 2003 IEEE International Performance, Computing …, 2003 | 22 | 2003 |