关注
Kyuyong Shin
Kyuyong Shin
Professor in the Department of Computer Science, Korea Military Academy
在 kma.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Treat-before-trick: Free-riding prevention for bittorrent-like peer-to-peer networks
K Shin, DS Reeves, I Rhee
2009 IEEE International Symposium on Parallel & Distributed Processing, 1-12, 2009
612009
T-Chain: A General Incentive Scheme for Cooperative Computing
K Shin, C Joe-Wong, S Ha, Y Yi, I Rhee, DS Reeves
IEEE/ACM Transactions on Networking 25 (4), 2122-2137, 2017
262017
Simplified clique detection for collusion-resistant reputation management scheme in p2p networks
HY Lee, JW Kim, K Shin
2010 10th International Symposium on Communications and Information …, 2010
172010
Developing an XR based hyper-realistic counter-terrorism, education, training, and evaluation system
K Shin, S Lee
Convergence Security Journal 20 (5), 65-74, 2020
152020
SVC-TChain: Incentivizing good behavior in layered P2P video streaming
P Rahimzadeh, C Joe-Wong, K Shin, Y Im, J Lee, S Ha
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
142017
The current applications and future directions of artificial intelligence for military logistics
KY Shin, JK Lee, KH Kang, WG Hong, CH Han
Journal of Digital Contents Society 20 (12), 2433-2444, 2019
132019
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
K Shin, DS Reeves
Journal of Network and Computer Applications 35 (1), 72-84, 2012
122012
Developing a digital twin and extended reality based future integrated combat training platform under 5g
K Shin, HJ Choi, S Park
Journal of Digital Contents Society 22 (4), 727-735, 2021
112021
Preventing misbehavior in cooperative distributed systems
K Shin
North Carolina State University, 2009
112009
A performance analysis of incentive mechanisms for cooperative computing
C Joe-Wong, Y Im, K Shin, S Ha
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
102016
A Methodology of Decision Making Condition-based Data Modeling for Constructing AI Staff
C Han, K Shin, S Choi, S Moon, C Lee, J Lee
Journal of Internet Computing and Services 21 (1), 237-246, 2020
62020
A study on building a cyber attack database using Open Source Intelligence (OSINT)
K Shin, J Yoo, C Han, KM Kim, S Kang, M Moon, J Lee
Convergence Security Journal 19 (2), 113-121, 2019
62019
A study on the concept of social engineering cyber kill chain for social engineering based cyber operations
K Shin, KM Kim, J Lee
Journal of The Korea Institute of Information Security & Cryptology 28 (5 …, 2018
62018
A Study on the Relationship between Social Engineering and Cyberspace Operations
J Kang, K Shin, J Yoo, J Kim, S Kang, H Lim, Y Kim
Ministry of Defense, 2017
62017
Developing an Augmented Reality-based Integrated Command and Control Platform under 5G Technologies and Its Applications
K Shin, W Lee, D Kim
Journal of Digital Contents Society 21 (5), 855-864, 2020
52020
A Study on the Concept of Social Engineering based Cyber Operations
K Shin, J Kang, J Yoo, J Kim, S Kang, H Lim, Y Kim
Journal of The Korea Institute of Information Security & Cryptology 28 (3 …, 2018
52018
Winnowing: Protecting p2p systems against pollution by cooperative index filtering
K Shin, DS Reeves, I Rhee, Y Song
North Carolina State University. Dept. of Computer Science, 2009
42009
A study on priority analysis of evaluation factors for cyber threats using open source intelligence (OSINT)
S Kang, M Moon, K Shin, J Lee
Convergence security journal 20 (1), 49-57, 2020
32020
Design and implementation of the repository for archiving educational resources
J Lee, K Shin, J Yoo
The Journal of Korean association of computer education 16 (6), 95-102, 2013
32013
Cyber threats prediction model based on artificial neural networks using quantification of open source intelligence (osint)
J Lee, M Moon, K Shin, S Kang
Convergence Security Journal 20 (3), 115-123, 2020
22020
系统目前无法执行此操作,请稍后再试。
文章 1–20