Internet of drones (iod): Threats, vulnerability, and security perspectives G Choudhary, V Sharma, T Gupta, J Kim, I You arXiv preprint arXiv:1808.00203, 2018 | 102 | 2018 |
Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks D Shin, V Sharma, J Kim, S Kwon, I You IEEE Access 5, 11100-11117, 2017 | 95 | 2017 |
A security protocol for route optimization in DMM-based smart home IoT networks D Shin, K Yun, J Kim, PV Astillo, JN Kim, I You IEEE Access 7, 142531-142550, 2019 | 87 | 2019 |
Drone secure communication protocol for future sensitive applications in military zone Y Ko, J Kim, DG Duguma, PV Astillo, I You, G Pau Sensors 21 (6), 2057, 2021 | 85 | 2021 |
Security of 5G-mobile backhaul networks: A survey G Choudhary, J Kim, V Sharma arXiv preprint arXiv:1906.11427, 2019 | 48 | 2019 |
A Consensus Framework for Reliability and Mitigation of Zero‐Day Attacks in IoT V Sharma, K Lee, S Kwon, J Kim, H Park, K Yim, SY Lee Security and Communication Networks 2017 (1), 4749085, 2017 | 37 | 2017 |
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System PV Astillo, DG Duguma, H Park, J Kim, B Kim, I You Future Generation Computer Systems 128, 395-405, 2022 | 35 | 2022 |
MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks V Sharma, J Guan, J Kim, S Kwon, I You, F Palmieri, M Collotta Journal of Network and Computer Applications 125, 67-81, 2019 | 27 | 2019 |
A framework for mitigating zero-day attacks in IoT V Sharma, J Kim, S Kwon, I You, K Lee, K Yim arXiv preprint arXiv:1804.05549, 2018 | 26 | 2018 |
SGF-MD: behavior rule specification-based distributed misbehavior detection of embedded IoT devices in a closed-loop smart greenhouse farming system PV Astillo, J Kim, V Sharma, I You IEEE Access 8, 196235-196252, 2020 | 21 | 2020 |
DMM-SEP: Secure and efficient protocol for distributed mobility management based on 5G networks J Kim, PV Astillo, I You IEEE Access 8, 76028-76042, 2020 | 18 | 2020 |
TrMAps: Trust management in specification-based misbehavior detection system for IMD-enabled artificial pancreas system PV Astillo, G Choudhary, DG Duguma, J Kim, I You IEEE Journal of Biomedical and Health Informatics 25 (10), 3763-3775, 2021 | 17 | 2021 |
A formally verified security scheme for inter-gNB-DU handover in 5G vehicle-to-everything J Kim, DG Duguma, PV Astillo, HY Park, B Kim, I You, V Sharma IEEE Access 9, 119100-119117, 2021 | 12 | 2021 |
An overview of 802.21 a-2012 and its incorporation into IoT-fog networks using osmotic framework V Sharma, J Kim, S Kwon, I You, FY Leu IoT as a Service: Third International Conference, IoTaaS 2017, Taichung …, 2018 | 12 | 2018 |
MoTH: mobile terminal handover security protocol for HUB switching based on 5G and beyond (5GB) P2MP backhaul environment J Kim, PV Astillo, V Sharma, N Guizani, I You IEEE Internet of Things Journal 9 (16), 14667-14684, 2021 | 10 | 2021 |
5G wireless P2MP backhaul security protocol: An adaptive approach J Kim, G Choudhary, J Heo, DG Duguma, I You EURASIP Journal on Wireless Communications and Networking 2019 (1), 265, 2019 | 9 | 2019 |
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks DG Duguma, J Kim, S Lee, NS Jho, V Sharma, I You Connection Science 34 (1), 362-386, 2022 | 8 | 2022 |
Fuzzy-based protocol for secure remote diagnosis of iot devices in 5g networks V Sharma, J Kim, S Kwon, I You, HC Chen IoT as a Service: Third International Conference, IoTaaS 2017, Taichung …, 2018 | 6 | 2018 |
An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network T Kim, J Kim, I You Electronics 12 (17), 3543, 2023 | 4 | 2023 |
An optimal security management framework for backhaul-aware 5G-vehicle to everything (V2X) V Sharma, J Kim, Y Ko, I You, JT Seo arXiv preprint arXiv:1909.07568, 2019 | 4 | 2019 |