关注
Keun-Ho Lee
Keun-Ho Lee
BaekSeok University
在 bu.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
SNS disclosure of personal information in M2M environment threats and countermeasures
JY Go, KH Lee
Journal of the Korea Convergence Society 5 (1), 29-34, 2014
422014
Analysis of threats factor in IT convergence security
KH Lee
Journal of the Korea Convergence Society 1 (1), 49-55, 2010
422010
A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing
JH Kim, JY Go, KH Lee
Journal of the Korea Convergence Society 6 (1), 85-91, 2015
352015
Cloud computing for ubiquitous computing on M2M and IoT environment mobile application
DB Seo, YB Jeon, SH Lee, KH Lee
Cluster Computing 19, 1001-1013, 2016
292016
Fire alarm solutions through the convergence of image processing technology and M2M
BS Kang, KH Lee
Journal of the Korea Convergence Society 7 (1), 37-42, 2016
282016
A scheme of security drone convergence service using cam-shift algorithm
JP Lee, JW Lee, KH Lee
Journal of the Korea Convergence Society 7 (5), 29-34, 2016
242016
A Study of Security Threats in Bluetooth v4. 1 Beacon based Coupon Convergence Service
KJ Lee, KH Lee
Journal of the Korea Convergence Society 6 (2), 65-70, 2015
232015
A security threats in wireless charger systems in M2M
KH Lee
Journal of the Korea Convergence Society 4 (1), 27-31, 2013
232013
Measures to improve the work process through the convergence of social welfare based on IT
JH Kim, KH Lee
Journal of the Korea Convergence Society 5 (4), 33-38, 2014
212014
A study on countermeasures of convergence for big data and security threats to attack DRDoS in u-healthcare device
YA Hur, KH Lee
Journal of the Korea Convergence Society 6 (4), 243-248, 2015
192015
Authentication scheme using biometrics in intelligent vehicle network
KJ Lee, KH Lee
Journal of the Korea Convergence Society 4 (3), 15-20, 2013
182013
A method of defense and security threats in U-healthcare service
KH Lee
Journal of the Korea Convergence Society 3 (4), 1-5, 2012
182012
The Method of Digital Copyright Authentication for Contents of Collective Intelligence
S Yun, K Lee, H Lim, D Kim, J Kim
Journal of the Korea Convergence Society 6 (6), 185-193, 2015
172015
User authentication risk and countermeasure in intelligent vehicles
SH Kim, KH Lee
Journal of the Korea Convergence Society 3 (1), 7-11, 2012
172012
Attack Scenarios and Countermeasures using CoAP in IoT Environment
JH Oh, KH Lee
Journal of the Korea Convergence Society 7 (4), 33-38, 2016
112016
A Scheme on Anomaly Prevention for Systems in IoT Environment
KH Lee
Journal of Internet of Things and Convergence 5 (2), 95-101, 2019
102019
A Scheme on Energy Efficiency Through the Convergence of Micro-grid and Small Hydro Energy
BS Kang, KH Lee
Journal of the Korea Convergence Society 6 (1), 29-34, 2015
102015
M2M 기술 및 보안 동향
KH Lee
Review of Korean Society for Internet Information 13 (1), 21-29, 2012
82012
Design of authentication system using biometrics for U-healthcare environment in M2M
CG Song, KH Lee
Journal of the Korea Convergence Society 3 (2), 13-17, 2012
82012
Authentication based on Cluster in Machine to Machine
RG Sang
Journal of Knowledge Information Technology and Systems 5 (6), 103-109, 2010
72010
系统目前无法执行此操作,请稍后再试。
文章 1–20