SNS disclosure of personal information in M2M environment threats and countermeasures JY Go, KH Lee Journal of the Korea Convergence Society 5 (1), 29-34, 2014 | 42 | 2014 |
Analysis of threats factor in IT convergence security KH Lee Journal of the Korea Convergence Society 1 (1), 49-55, 2010 | 42 | 2010 |
A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing JH Kim, JY Go, KH Lee Journal of the Korea Convergence Society 6 (1), 85-91, 2015 | 35 | 2015 |
Cloud computing for ubiquitous computing on M2M and IoT environment mobile application DB Seo, YB Jeon, SH Lee, KH Lee Cluster Computing 19, 1001-1013, 2016 | 29 | 2016 |
Fire alarm solutions through the convergence of image processing technology and M2M BS Kang, KH Lee Journal of the Korea Convergence Society 7 (1), 37-42, 2016 | 28 | 2016 |
A scheme of security drone convergence service using cam-shift algorithm JP Lee, JW Lee, KH Lee Journal of the Korea Convergence Society 7 (5), 29-34, 2016 | 24 | 2016 |
A Study of Security Threats in Bluetooth v4. 1 Beacon based Coupon Convergence Service KJ Lee, KH Lee Journal of the Korea Convergence Society 6 (2), 65-70, 2015 | 23 | 2015 |
A security threats in wireless charger systems in M2M KH Lee Journal of the Korea Convergence Society 4 (1), 27-31, 2013 | 23 | 2013 |
Measures to improve the work process through the convergence of social welfare based on IT JH Kim, KH Lee Journal of the Korea Convergence Society 5 (4), 33-38, 2014 | 21 | 2014 |
A study on countermeasures of convergence for big data and security threats to attack DRDoS in u-healthcare device YA Hur, KH Lee Journal of the Korea Convergence Society 6 (4), 243-248, 2015 | 19 | 2015 |
Authentication scheme using biometrics in intelligent vehicle network KJ Lee, KH Lee Journal of the Korea Convergence Society 4 (3), 15-20, 2013 | 18 | 2013 |
A method of defense and security threats in U-healthcare service KH Lee Journal of the Korea Convergence Society 3 (4), 1-5, 2012 | 18 | 2012 |
The Method of Digital Copyright Authentication for Contents of Collective Intelligence S Yun, K Lee, H Lim, D Kim, J Kim Journal of the Korea Convergence Society 6 (6), 185-193, 2015 | 17 | 2015 |
User authentication risk and countermeasure in intelligent vehicles SH Kim, KH Lee Journal of the Korea Convergence Society 3 (1), 7-11, 2012 | 17 | 2012 |
Attack Scenarios and Countermeasures using CoAP in IoT Environment JH Oh, KH Lee Journal of the Korea Convergence Society 7 (4), 33-38, 2016 | 11 | 2016 |
A Scheme on Anomaly Prevention for Systems in IoT Environment KH Lee Journal of Internet of Things and Convergence 5 (2), 95-101, 2019 | 10 | 2019 |
A Scheme on Energy Efficiency Through the Convergence of Micro-grid and Small Hydro Energy BS Kang, KH Lee Journal of the Korea Convergence Society 6 (1), 29-34, 2015 | 10 | 2015 |
M2M 기술 및 보안 동향 KH Lee Review of Korean Society for Internet Information 13 (1), 21-29, 2012 | 8 | 2012 |
Design of authentication system using biometrics for U-healthcare environment in M2M CG Song, KH Lee Journal of the Korea Convergence Society 3 (2), 13-17, 2012 | 8 | 2012 |
Authentication based on Cluster in Machine to Machine RG Sang Journal of Knowledge Information Technology and Systems 5 (6), 103-109, 2010 | 7 | 2010 |