Treat-before-trick: Free-riding prevention for bittorrent-like peer-to-peer networks K Shin, DS Reeves, I Rhee 2009 IEEE International Symposium on Parallel & Distributed Processing, 1-12, 2009 | 61 | 2009 |
T-Chain: A General Incentive Scheme for Cooperative Computing K Shin, C Joe-Wong, S Ha, Y Yi, I Rhee, DS Reeves IEEE/ACM Transactions on Networking 25 (4), 2122-2137, 2017 | 26 | 2017 |
Simplified clique detection for collusion-resistant reputation management scheme in p2p networks HY Lee, JW Kim, K Shin 2010 10th International Symposium on Communications and Information …, 2010 | 17 | 2010 |
Developing an XR based hyper-realistic counter-terrorism, education, training, and evaluation system K Shin, S Lee Convergence Security Journal 20 (5), 65-74, 2020 | 15 | 2020 |
SVC-TChain: Incentivizing good behavior in layered P2P video streaming P Rahimzadeh, C Joe-Wong, K Shin, Y Im, J Lee, S Ha IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 14 | 2017 |
The current applications and future directions of artificial intelligence for military logistics KY Shin, JK Lee, KH Kang, WG Hong, CH Han Journal of Digital Contents Society 20 (12), 2433-2444, 2019 | 13 | 2019 |
Winnowing: Protecting P2P systems against pollution through cooperative index filtering K Shin, DS Reeves Journal of Network and Computer Applications 35 (1), 72-84, 2012 | 12 | 2012 |
Developing a digital twin and extended reality based future integrated combat training platform under 5g K Shin, HJ Choi, S Park Journal of Digital Contents Society 22 (4), 727-735, 2021 | 11 | 2021 |
Preventing misbehavior in cooperative distributed systems K Shin North Carolina State University, 2009 | 11 | 2009 |
A performance analysis of incentive mechanisms for cooperative computing C Joe-Wong, Y Im, K Shin, S Ha 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 10 | 2016 |
A Methodology of Decision Making Condition-based Data Modeling for Constructing AI Staff C Han, K Shin, S Choi, S Moon, C Lee, J Lee Journal of Internet Computing and Services 21 (1), 237-246, 2020 | 6 | 2020 |
A study on building a cyber attack database using Open Source Intelligence (OSINT) K Shin, J Yoo, C Han, KM Kim, S Kang, M Moon, J Lee Convergence Security Journal 19 (2), 113-121, 2019 | 6 | 2019 |
A study on the concept of social engineering cyber kill chain for social engineering based cyber operations K Shin, KM Kim, J Lee Journal of The Korea Institute of Information Security & Cryptology 28 (5 …, 2018 | 6 | 2018 |
A Study on the Relationship between Social Engineering and Cyberspace Operations J Kang, K Shin, J Yoo, J Kim, S Kang, H Lim, Y Kim Ministry of Defense, 2017 | 6 | 2017 |
Developing an Augmented Reality-based Integrated Command and Control Platform under 5G Technologies and Its Applications K Shin, W Lee, D Kim Journal of Digital Contents Society 21 (5), 855-864, 2020 | 5 | 2020 |
A Study on the Concept of Social Engineering based Cyber Operations K Shin, J Kang, J Yoo, J Kim, S Kang, H Lim, Y Kim Journal of The Korea Institute of Information Security & Cryptology 28 (3 …, 2018 | 5 | 2018 |
Winnowing: Protecting p2p systems against pollution by cooperative index filtering K Shin, DS Reeves, I Rhee, Y Song North Carolina State University. Dept. of Computer Science, 2009 | 4 | 2009 |
A study on priority analysis of evaluation factors for cyber threats using open source intelligence (OSINT) S Kang, M Moon, K Shin, J Lee Convergence security journal 20 (1), 49-57, 2020 | 3 | 2020 |
Design and implementation of the repository for archiving educational resources J Lee, K Shin, J Yoo The Journal of Korean association of computer education 16 (6), 95-102, 2013 | 3 | 2013 |
Cyber threats prediction model based on artificial neural networks using quantification of open source intelligence (osint) J Lee, M Moon, K Shin, S Kang Convergence Security Journal 20 (3), 115-123, 2020 | 2 | 2020 |