Publications

Kyong Ho Choi, Kuinam J. Kim, "A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service", Wireless Personal Communications 94(1): 5-16 (2017)
Je-Ho Park, Taeg Keun Whangbo, Kuinam J. Kim, "A Novel Image Identifier Generation Method Using Luminance and Location", Wireless Personal Communications 94(1): 99-115 (2017)
Sanghyun Park, HoYong Ryu, Kuinam J. Kim, Jinsul Kim, "Cloud System for User-Customized Mobile Interface Sharing in Wireless Environment", Wireless Personal Communications 94(2): 149-164 (2017)
Kuinam J. Kim, Minsu Kim, "A Study of Integrity on the Security Patches System Using PM-FTS", Wireless Personal Communications 94(2): 165-173 (2017)
Dong Chun Lee, Kuinam J. Kim, Jong Chan Lee, "Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks", Wireless Personal Communications 94(2): 187-208 (2017)
Youngseop Kim, Woori Han, Yong-Hwan Lee, Cheong Ghil Kim, Kuinam J. Kim, "Object Tracking and Recognition Based on Reliability Assessment of Learning in Mobile Environments", Wireless Personal Communications 94(2): 267-282 (2017)
Nakhoon Baek, Kuinam J. Kim, "An artifact detection scheme with CUDA-based image operations", Cluster Computing 20(1): 749-755 (2017)
Chanjin Park, Wonhyuk Lee, Kuinam J. Kim, and Hyuncheol Kim, "Research on Design of End Site Architecture to Connect LHCONE in KREONET", Lecture Notes in Electrical Engineering 424: 745-750(2017)
Buseung Cho, Kuinam J. Kim, Jin-Wook Chung, "CBR-based network performance management with multi-agent approach", Cluster Computing 20(1): 757-767 (2017
Nakhoon Baek, Woo-seok Shin, Kuinam J. Kim, "Geometric primitive extraction from LiDAR-scanned point clouds", Cluster Computing 20(1): 741-748 (2017)
Changhee Cho, Jisu Kim, Jinsul Kim, Sang-Joon Lee, Kuinam J. Kim, "Detecting for high speed flying object using image processing on target place", Cluster Computing 19(1): 285-292 (2016)
Hoyoung Cheong, Jonwon Eun, Hyuncheol Kim, Kuinam J. Kim, "Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes", Cluster Computing 19(1): 309-314 (2016)
Seung-Ho Kang, Kuinam J. Kim, "A feature selection approach to find optimal feature subsets for the network intrusion detection system", Cluster Computing 19(1): 325-333 (2016)
Kuinam J. Kim, Cheong Ghil Kim, Taeg Keun Whangbo, Kyoungro Yoon, "A continuous playing scheme on RESTful web service", Cluster Computing 19(1): 379-387 (2016)
Wonhyuk Lee, Kuinam J. Kim, Hyuncheol Kim, "Hierarchical Cluster Network for Wellness Sports Industry", ICITCS 2016: 1-4
Chung-Pyo Hong, Cheong-Ghil Kim, Kuinam J. Kim, Shin-Dug Kim, "A polymorphic service management scheme based on virtual object for ubiquitous computing environment",  multimedia tools and applications 74(16): 6183-6196 (2015)
Cheong Ghil Kim, Kuinam J. Kim, Jung-Hoon Lee, "NAND flash memory system based on the Harvard buffer architecture for multimedia applications",  multimedia tools and applications. 74(16): 6287-6302 (2015)
Xiyuan Yin, Dae-Hwan Kim, Chung-Pyo Hong, Cheong-Ghil Kim, Kuinam J. Kim, Shin-Dug Kim, "Advanced feature point transformation of corner points for mobile object recognition", multimedia tools and applications 74(16): 6541-6556 (2015)
Dong Hwi Lee, Kuinam J. Kim, "A study on malicious codes pattern advanced analysis using visualization", multimedia tools and applications 68(2): 253-263 (2014)
Dong Hwi Lee, Byunghun Kim, Kuinam J. Kim, "PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions", multimedia tools and applications 73(2): 601-615 (2014)
Kyung-Yong Chung, Junseok Yoo, Kuinam J. Kim, "Recent trends on mobile computing and future networks", Personal and Ubiquitous Computing 18(3): 489-491 (2014)
Kyung-Yong Chung, Daesung Lee, Kuinam J. Kim, "Categorization for grouping associative items using data mining in item-based collaborative filtering", multimedia tools and applications 71(2): 889-904 (2014)
Cheong Ghil Kim, Kuinam J. Kim, "Implementation of a cost-effective home lighting control system on embedded Linux with OpenWrt", Personal and Ubiquitous Computing 18(3): 535-542 (2014)
Roy C. Park, Hoill Jung, Kyung-Yong Chung, Kuinam J. Kim, "Performance analysis of LTE downlink system using relay-based selective transmission", Personal and Ubiquitous Computing 18(3): 543-551 (2014)
Dong Chun Lee, Kuinam J. Kim, "Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 Networks", ICITCS 2014: 1-4
Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim, "A study on abnormal event correlation analysis for convergence security monitor", Cluster Computing 16(2): 219-227 (2013)
Joong-Kyung Ryu, Junseok Yoo, Jung-Soo Han, Sang Yeob Oh, Kuinam J. Kim, "Recent Trends on Convergence Personal Wireless System", Wireless Personal Communications 73(2): 169-174 (2013)
Ji Woong Kim, Min Su Kim, Seung Jae Yoo, Kuinam J. Kim, "The Efficient Security Management Measures Using K2-SMS in Case of Security Transport", ICITCS 2013: 1-2
Byung Seok Kong, Min Su Kim, Kuinam J. Kim, "A Study on Improvement Measures of Unmanned Security System against Security Threats", ICITCS 2013: 1-3
Young Ho Lee, Min Su Kim, Kuinam J. Kim, "A Study on Improvement Measures of Remote Diligence / Laziness Management Applying NFC. ICITCS 2013: 1-3
Cheong Ghil Kim, Jeom Goo Kim and Kuinam J. Kim "Improving the Run-time Performance of Subword Parallel Gaussian Filter using Loop Unrolling," Information-An International Interdisciplinary Journal, Vol.16, No.8(A), pp.5637-5646
Kyongho Choi, DongHwi Lee, Kuinam J. Kim "A Study of Detection System for SPA (Sophisticated Phishing Attack)," Information-An International Interdisciplinary Journal  Vol. 16, No.8(A), pp.5625-5636.
Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim "A study on abnormal event correlation analysis for convergence security monitor," Cluster Computing  Vol.16,No.2, pp.219-227
Roy C. Park, Hoill Jung, Kyung-Yong Chung, Kuinam J. Kim "Performance analysis of LTE downlink system using relay-based selective transmission," Personal and Ubiquitous Computing (on-line, May, 2013), springer
Min Su Kim, DongHwi Lee, Kuinam J. Kim "A Study on Convergence Security System for Preventing Leakage of Internal Information," Wireless Personal Communications (on-line, July, 2013), springer
Kyung-Yong Chung, Kuinam J. Kim "Recent trends on mobile computing and future networks," Personal and Ubiquitous Computing (on-line, May, 2013), springer
Cheing Ghil Kim, Kuinam J. Kim "Implementation of a cost-effective home lighting control system on embedded Linux with OpenWrt," Personal and Ubiquitous Computing (on-line, May, 2013), springer
Joong-Kyung Ryu, Jung-Soo Han, Sang Yeob Oh, Kuinam J. Kim "Recent Trends on Convergence Personal Wireless System," Wireless Personal Communications (on-line, August, 2013), springer
Kuinam J. Kim, Kyung-Yong Chung (Eds.) "Proceedings of the International Conference on IT Convergence and Security" ICITCS 2012, Pyeong Chang, Korea, December 5-7, 2012. Lecture Notes in Electrical Engineering 215, Springer 2013, ISBN 978-94-007-5859-9
Min Su Kim, DongHwi Lee, Kuinam J. Kim "A Study on the Real-Time Location Tracking Systems Using Passive RFID," Lecture Notes in Electrical Engineering Vol215, pp.441-448
Jong Min Kim, Dong Hwi Lee, Kuinam J. Kim "A Study on modeling to predict Security Threat of Smart Phones," IEEE International Conference on Information Science and Applications, Pattaya, Thailand, pp.18-22, June, 2013
Min Su Kim, DongHwi Lee, Kuinam J. Kim "A Study on the NFC-based Mobile Parking Management System," IEEE International Conference on Information Science and Applications, Pattaya, Thailand, pp.23-27, June, 2013
Min-Su Kim, Sang-IL Shin, Jong Min Kim, KyongHo Choi, Daesung Lee, Dong Hwi Lee, Kuinam J. Kim "Multi-Vector Defense System using Reverse Proxy Group," Convergence Security Journal, Vol.13, No.1, pp.72-79
Kyong-Ho Choi, Dong Hwi Lee, Minsu Kim, Jong Min Kim, Kuinam J. Kim "A Study about Practical Model of Meteorological Information for Convergence Security Service Science," Convergence Security Journal, Vol.13, No.3, pp.72-79
Min Su Kim, Sang Il Shin, Dong Hwi Lee, Kuinam J. Kim "A Study on NAS-Linked Network Separation System Using AHP," Convergence Security Journal, Vol.13, No.3, pp.80-85
Min Su Kim, Dong Hwi Lee, Kuinam J. Kim "Study on the Effective Management Plans of Mobilization Security Business which utilizes NFC," Convergence Security Journal, Vol.13, No.2, pp.86-95
Min Su Kim, SangIl Shin, Chung Joon Ahn, Kuinam J. Kim " A Study of Logical Network Partition and Behavior-based Detection System using FTS," Convergence Security Journal, Vol.13, No.4, pp.101-109
Intae Kim, Daesung Lee, Kuinam J. Kim, Junghyun Lee "Flexible authorization in home network environments," Cluster Computing  Vol.15, No.1, pp.3-15
SeungKeun Lee, Kuinam J. Kim "Mobile agent based framework for mobile ubiquitous application development," Telecommunication Systems  Vol.51, No2-3, pp.137-146
Daesung Lee, Kuinam J. Kim "Improving web cache server performance through arbitral thread and delayed caching," Cluster Computing  Vol.15, No1, pp.17-25
Daesung Lee, Kuinam J. Kim "Enabling Lego robots to communicate via infrared routing," Telecommunication Systems  Vol.51, No2-3, pp.125-136
Kuinam J. Kim, Seong-Jin Ahn (Eds.) "Proceedings of the International Conference on IT Convergence and Security" ICITCS 2011, Suwon, Korea, December 14-16, 2011. Lecture Notes in Electrical Engineering 120, Springer 2012, ISBN 978-94-007-2910-0
Kyong-Ho Choi, Won Hyung Park; Kim, K.J., "A Study of ESMTC(Enterprise Security Management System Based on Threshold Classification)," IEEE International Conference on Information Science and Applications, Suwon, June, 2012
Min Su Kim, DongHwi Lee, Kim, K.J., "A Plan to Improve Security Service of Money Transport Vehicle Applying K-Smart Module System," IEEE International Conference on Information Science and Applications, Suwon, June, 2012
Jong Min Kim, DongHwi Lee, Kim, K.J., "The Study for Application of ZigBee Location Tracing Monitoring System for ATM Device Theft," IEEE International Conference on Information Science and Applications, Suwon, June, 2012
DongHwi Lee, Kuinam J. Kim "A study on malicious codes pattern advanced analysis using visualization," Multimedia Tools and Applications (November, 2011)
Kichang Kim, Kuinam J. Kim "Design of Secure Network Protocol to Defend against Fragmented Packet Attacks," Information-An International Interdisciplinary Journal Vol14, No11, pp.3759-3771
Kyung-Yong Chung, Daesung Lee, Kuinam J. Kim "Categorization for grouping associative items using data mining in item-based Interollaborative filtering," Multimedia Tools and Applications (November, 2011)
Daesung Lee, Kim, K.J., Ki Chang Kim, "A Study on Network Security Protocol to Defend against Fragmented Packet Attacks Using Biometrics," IEEE International Conference on Information Science and Applications, Jeju Island, Korea, May, 2011
Seung Pyo Huh, DongHwi Lee, Kim, K.J.; Sang Min Park, "A Study on the Leak of Core Business Technologies Using Preventative Security Methods Such as Data Mining," IEEE International Conference on Information Science and Applications, Jeju Island, Korea, May, 2011
Won Hyung Park, DongHwi Lee, Kim, K.J., "A Study on Improvement of the Evidence Collection Module in Windows Forensic," IEEE International Conference on Information Science and Applications, Jeju Island, Korea, May, 2011
DongHwi Lee, In Soo Song, Kim, K.J.; Jun-hyeon Jeong, "A Study on Malicious Codes Pattern Analysis Using Visualization," IEEE International Conference on Information Science and Applications, Jeju Island, Korea, May, 2011
DongHwi Lee, Won Hyung Park, Kim, K.J., "A Study on Analysis of Malicious Codes Similarity Using N-Gram and Vector Space Model," IEEE International Conference on Information Science and Applications, Jeju Island, Korea, May, 2011
Daesung Lee, Kim, K.J., "How to Reduce Network Interrupt Latency for Real-Time Processing," IEEE International Conference on Information Science and Applications, Jeju Island, Korea, May, 2011
Seung Pyo Huh, Daesung Lee, Kuinam J. Kim "A study on the Prediction of Security Treat using Open Vulnerability List," Journal of Information and Security, Vol.11, No.3, pp3-10
Seung Pyo Huh, Daesung Lee, Kuinam J. Kim "A study on the Improvement of User Authentication using the Facial Recognition and OPT Technique in the Mobile Environment," Journal of Information and Security, Vol.11, No.3, pp75-84
Daesung Lee; Kim, K.J., "Enabling Lego Robots to Communicate Routing," IEEE International Conference on Information Science and Applications, Seoul, Korea, April, 2010
DongHwi Lee; Byong Hun Kim; Kim, K.J., "Detecting Method on Illegal Use Using PCA under HER Environment," IEEE International Conference on Information Science and Applications, Seoul, Korea, April, 2010
Daesung Lee; Kim, K.J., "A Study on Improving Web Cache Server Performance Using Delayed Caching," IEEE International Conference on Information Science and Applications, Seoul, Korea, April, 2010
Yong-Ho Kim; Kim, K.J., "A Forensic Model on Deleted-File Verification for Securing Digital Evidence," IEEE International Conference on Information Science and Applications, Seoul, Korea, April, 2010
Min Jun Kim, Kuinam J. Kim "A Study on Information Security Governance Frame Wook," Journal of Information and Security, Vol.10, No.4, pp13-20
Jae Hoon Sun, Kuinam J. Kim "Cloud Computing in the Vulnerability Analysis for Personal Information Security," Journal of Information and Security, Vol.10, No.4, pp77-82
Daesung Lee; Kim, K.J.; Ki Chang Kim, "Extending IPBio Network Security Protocol to Handle Fragmented Packet Attacks," Computer Science and its Applications, 2009. CSA '09. 2nd International Conference on , vol., no., pp.1,6, 10-12 Dec. 2009
Kyong-Ho Choi, Dong Hwi Lee, Jeom-Goo Kim, Cheol-Won Lee; Hyung-Jun Seo, Kim, K.J. "A Study on the Optimal Model for Information Security Management Level," IEEE International Conference on Information Science and Security, Jan. 2008
Yong-Ho KimD, ong Hwi Lee, Kim, K.J. "KMFM Realization for Real-Time P2P Messenger IP Trace," IEEE International Conference on Information Science and Security, Jan. 2008
Gangtaek Lee; Kim, K.J., "Computer Networks and Information Warfare: Implications for Air Operations," IEEE International Conference on Information Science and Security, Jan. 2008
Dong Hwi Lee, Jae Myung Kim, Kyong-Ho Choi, Kim, K.J. "The Study of Response Model & Mechanism Against Windows Kernel Compromises," IEEE International Conference on Convergence and Hybrid Information Technology, Aug. 2008
Hyun Seok Yoon; Dong Hwi Lee; Gangtaek Lee; Kim, K.J., "A Study on the Information Superiority of Network Centric Warfare for Future Battlefield," Information Science and Security, 2008. ICISS. International Conference on , vol., no., pp.224,231, 10-12 Jan. 2008
Ji-Won Kang; Bierng-Chearl Ahn; Kim, K.J., "Evaluation of Safety for the 900MHz RFID Reader of Defense Ammunition Management System," Information Science and Security, 2008. ICISS. International Conference on , vol., no., pp.220,223, 10-12 Jan. 2008
Dong Hwi Lee; Kyong-Ho Choi; Jeom-Goo Kim; Kim, K.J., "Standardization Model and Implementation of Event Type in Real Time Cyber Threats," IEEE International Conference on Convergence and Hybrid Information Technology, Aug. 2008
Iliyev, D.; Kyong-Ho Choi; Kim, K.J., "Dangers of Applying Web 2.0 Technologies in E-commerce Solutions," Information Science and Security, 2008. ICISS. International Conference on , vol., no., pp.17,25, 10-12 Jan. 2008
Gang Taek Lee, Dong Hwi Lee, Kuinam J. Kim "Simulation Based Nodal Analysis for Effects Based Operations," Lecture Notes in Computer Science (2) 2007: 166-176
Yong-Ho Kim, Dong Hwi Lee, Kuinam J. Kim "A Stable Evidence Collection Procedure of a Volatile Data in Research," Lecture Notes in Computer Science(2) 2007: 177-184
Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim "Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique," Lecture Notes in Computer Science (2) 2007: 185-194
Kyong Ho Choi, Dong Hwi Lee, Kuinam J. Kim "Design and Implementation of Security Structure for Interactive Web Environment," Lecture Notes in Computer Science2007: 237-244
Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim "HOIDS-Based Detection Method of Vicious Event in Large Networks," Lecture Notes in Computer Science 2006: 998-1005
Seung-Jae Yoo, Kuinam J. Kim "Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks," Lecture Notes in Computer Science 2006: 1025-1032
Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park "Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks," Lecture Notes in Computer Science(ISPA) 2006: 917-926
Sangho Lee, Dong Hwi Lee, Kuinam J. Kim "A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System," Lecture Notes in Computer Science (ISPA) 2006: 1006-1017
Si Choon Noh, Dong Chun Lee, Kuinam J. Kim "Multi-level Protection Building for Virus Protection Infrastructure,"  Lecture Notes in Computer Science 2004: 631-634
Jongchan Lee, Hongjin Kim, Kuinam J. Kim "Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks," Lecture Notes in Computer Science 2003: 555-565
Sukwoo Han, Kuinam J. Kim, Young-Sung Kim "Efficient Migration Algorithm for Mobile Agents in Wired/Wireless Internets," Lecture Notes in Computer Science 2003: 626-636
Dong Chun Lee, Jeom Goo Kim, Kuinam J. Kim "Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks," Lecture Notes in Computer Science 2003: 50-59
Si Choon Noh, Dong Chun Lee, Kuinam J. Kim "Improved Structure Management of Gateway Firewall Systems for Effective Networks Security," Lecture Notes in Computer Science 2003: 1076-1083
Jae-Myung Kim, Kyu-Ho Lee, Jong-Seob Kim, Kuinam J. Kim "Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database,"  Lecture Notes in Computer Science 2003: 1098-1105424

Book

Information Science and Applications 2017

Kim, K. (Ed), Joukov, N. (Ed) (2017)

This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues …

Information Science and Applications

Information Science and Applications

Kim, K. J. (Ed) (2015)

This proceedings volume provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology.  It explores how information science …

Information Science and Applications (ICISA) 2016

Information Science and Applications (ICISA) 2016

Kim, K. J. (Ed), Joukov, N. (Ed) (2016)

This book contains selected papers from the 7th International Conference on Information Science and Applications (ICISA 2016) and provides a snapshot of the latest issues …

Mobile and Wireless Technology 2015

Mobile and Wireless Technology 2015

Kim, K. J. (Ed), Wattanapongsakorn, N. (Ed) (2015)

This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications.  The proceedings of the 2nd International …

Mobile and Wireless Technologies 2016

Mobile and Wireless Technologies 2016

Kim, K. J. (Ed), Wattanapongsakorn, N. (Ed), Joukov, N. (Ed) (2016)

This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia …

IT Convergence and Security 2012

IT Convergence and Security 2012

Kim, K. J. (Ed), Chung, K. (Ed) (2013)

The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues …

Proceedings of the International Conference on IT Convergence and Security 2011

Proceedings of the International Conference on IT Convergence and Security 2011

Kim, K. J. (Ed), Ahn, S. J. (Ed) (2012)

As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the …

Industrial Engineering, Management Science and Applications 2015

Industrial Engineering, Management Science and Applications 2015

Gen, M. (Ed), Kim, K. J. (Ed), Huang, X. (Ed), Hiroshi, Y. (Ed) (2015)

This volume provides a complete record of presentations made at Industrial Engineering, Management Science and Applications 2015 (ICIMSA 2015), and provides the reader with a …

Leave a Reply

Your email address will not be published. Required fields are marked *