Tai-hoon Kim
Tai-hoon Kim
Sungshin University
Verified email at daum.net
Title
Cited by
Cited by
Year
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
HL Yeh, TH Chen, PC Liu, TH Kim, HW Wei
Sensors 11 (5), 4767-4779, 2011
2792011
Use of artificial neural network in pattern recognition
JK Basu, D Bhattacharyya, T Kim
International journal of software engineering and its applications 4 (2), 2010
2752010
Applications, systems and methods in smart home technology: A
RJ Robles, T Kim
Int. Journal of Advanced Science And Technology 15, 37-48, 2010
2632010
A review on security in smart home development
RJ Robles, T Kim, D Cook, S Das
International Journal of Advanced Science and Technology 15, 2010
2592010
Application of genetic algorithm in software testing
PR Srivastava, T Kim
International Journal of software Engineering and its Applications 3 (4), 87-96, 2009
2532009
A comparative study of wireless sensor networks and their routing protocols
D Bhattacharyya, T Kim, S Pal
Sensors 10 (12), 10506-10523, 2010
1922010
Soccer robotics
JH Kim, DH Kim, YJ Kim, KT Seow
Springer Science & Business Media, 2004
1702004
Smart city and IoT
T Kim, C Ramos, S Mohammed
Future Generation Computer Systems 76, 159-162, 2017
1522017
IT security review: Privacy, protection, access control, assurance and system security
Y Sattarova Feruza, T Kim
International journal of multimedia and ubiquitous engineering 2 (2), 17-32, 2007
1022007
Data hiding in audio signal: A review
P Dutta, D Bhattacharyya, T Kim
International journal of database theory and application 2 (2), 1-8, 2009
942009
MHD stagnation-point flow of Casson fluid and heat transfer over a stretching sheet with thermal radiation
K Bhattacharyya
Journal of Thermodynamics 2013, 2013
892013
Context aware tools for smart home development
RJ Robles, T Kim
International Journal of Smart Home 4 (1), 1-12, 2010
852010
Face recognition using neural network: a review
MM Kasar, D Bhattacharyya, TH Kim
International Journal of Security and Its Applications 10 (3), 81-100, 2016
722016
Palm vein authentication system: a review
I Sarkar, F Alisherov, T Kim, D Bhattacharyya
682010
A survey of consistency checking techniques for UML models
M Usman, A Nadeem, T Kim, E Cho
2008 Advanced Software Engineering and Its Applications, 57-62, 2008
682008
Dynamic power management in new architecture of wireless sensor networks
C Lin, N Xiong, JH Park, T Kim
International Journal of communication systems 22 (6), 671-693, 2009
632009
Linear correlation-based feature selection for network intrusion detection model
HF Eid, AE Hassanien, T Kim, S Banerjee
International Conference on Security of Information and Communication …, 2013
572013
Wireless network security: Vulnerabilities, threats and countermeasures
MK Choi, RJ Robles, C Hong, T Kim
International Journal of Multimedia and Ubiquitous Engineering 3 (3), 77-86, 2008
552008
Breast cancer MRI diagnosis approach using support vector machine and pulse coupled neural networks
AE Hassanien, T Kim
Journal of Applied Logic 10 (4), 277-284, 2012
522012
Brain tumor detection using MRI image analysis
D Bhattacharyya, T Kim
International Conference on Ubiquitous Computing and Multimedia Applications …, 2011
512011
The system can't perform the operation now. Try again later.
Articles 1–20