关注
Jiyoon Kim
标题
引用次数
引用次数
年份
Internet of drones (iod): Threats, vulnerability, and security perspectives
G Choudhary, V Sharma, T Gupta, J Kim, I You
arXiv preprint arXiv:1808.00203, 2018
1022018
Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks
D Shin, V Sharma, J Kim, S Kwon, I You
IEEE Access 5, 11100-11117, 2017
952017
A security protocol for route optimization in DMM-based smart home IoT networks
D Shin, K Yun, J Kim, PV Astillo, JN Kim, I You
IEEE Access 7, 142531-142550, 2019
872019
Drone secure communication protocol for future sensitive applications in military zone
Y Ko, J Kim, DG Duguma, PV Astillo, I You, G Pau
Sensors 21 (6), 2057, 2021
852021
Security of 5G-mobile backhaul networks: A survey
G Choudhary, J Kim, V Sharma
arXiv preprint arXiv:1906.11427, 2019
482019
A Consensus Framework for Reliability and Mitigation of Zero‐Day Attacks in IoT
V Sharma, K Lee, S Kwon, J Kim, H Park, K Yim, SY Lee
Security and Communication Networks 2017 (1), 4749085, 2017
372017
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System
PV Astillo, DG Duguma, H Park, J Kim, B Kim, I You
Future Generation Computer Systems 128, 395-405, 2022
352022
MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks
V Sharma, J Guan, J Kim, S Kwon, I You, F Palmieri, M Collotta
Journal of Network and Computer Applications 125, 67-81, 2019
272019
A framework for mitigating zero-day attacks in IoT
V Sharma, J Kim, S Kwon, I You, K Lee, K Yim
arXiv preprint arXiv:1804.05549, 2018
262018
SGF-MD: behavior rule specification-based distributed misbehavior detection of embedded IoT devices in a closed-loop smart greenhouse farming system
PV Astillo, J Kim, V Sharma, I You
IEEE Access 8, 196235-196252, 2020
212020
DMM-SEP: Secure and efficient protocol for distributed mobility management based on 5G networks
J Kim, PV Astillo, I You
IEEE Access 8, 76028-76042, 2020
182020
TrMAps: Trust management in specification-based misbehavior detection system for IMD-enabled artificial pancreas system
PV Astillo, G Choudhary, DG Duguma, J Kim, I You
IEEE Journal of Biomedical and Health Informatics 25 (10), 3763-3775, 2021
172021
A formally verified security scheme for inter-gNB-DU handover in 5G vehicle-to-everything
J Kim, DG Duguma, PV Astillo, HY Park, B Kim, I You, V Sharma
IEEE Access 9, 119100-119117, 2021
122021
An overview of 802.21 a-2012 and its incorporation into IoT-fog networks using osmotic framework
V Sharma, J Kim, S Kwon, I You, FY Leu
IoT as a Service: Third International Conference, IoTaaS 2017, Taichung …, 2018
122018
MoTH: mobile terminal handover security protocol for HUB switching based on 5G and beyond (5GB) P2MP backhaul environment
J Kim, PV Astillo, V Sharma, N Guizani, I You
IEEE Internet of Things Journal 9 (16), 14667-14684, 2021
102021
5G wireless P2MP backhaul security protocol: An adaptive approach
J Kim, G Choudhary, J Heo, DG Duguma, I You
EURASIP Journal on Wireless Communications and Networking 2019 (1), 265, 2019
92019
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks
DG Duguma, J Kim, S Lee, NS Jho, V Sharma, I You
Connection Science 34 (1), 362-386, 2022
82022
Fuzzy-based protocol for secure remote diagnosis of iot devices in 5g networks
V Sharma, J Kim, S Kwon, I You, HC Chen
IoT as a Service: Third International Conference, IoTaaS 2017, Taichung …, 2018
62018
An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network
T Kim, J Kim, I You
Electronics 12 (17), 3543, 2023
42023
An optimal security management framework for backhaul-aware 5G-vehicle to everything (V2X)
V Sharma, J Kim, Y Ko, I You, JT Seo
arXiv preprint arXiv:1909.07568, 2019
42019
系统目前无法执行此操作,请稍后再试。
文章 1–20