default search action
Seoksoo Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j11]Donghyun Kim, Sungmo Jung, Dae-Joon Hwang, Seoksoo Kim:
Mobile-Based DoS Attack Security Agent in Sensor Networking. Wirel. Pers. Commun. 86(1): 91-107 (2016) - 2012
- [j10]Sungmo Jung, Jae Young Ahn, Dae-Joon Hwang, Seoksoo Kim:
An Optimization Scheme for M2M-Based Patient Monitoring in Ubiquitous Healthcare Domain. Int. J. Distributed Sens. Networks 8 (2012) - [j9]Sungmo Jung, Jong hyun Kim, Seoksoo Kim:
Network Modeling and Energy-Efficiency Optimization for Advanced Machine-to-Machine Sensor Networks. Sensors 12(11): 14851-14861 (2012) - 2011
- [c52]Sungmo Jung, Jong hyun Kim, Seoksoo Kim:
A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment. ACN 2011: 31-35 - [c51]Jae-gu Song, Seoksoo Kim:
Mapping Based on Three Cameras for 3D Face Modeling. ACN 2011: 36-41 - [c50]Giovanni Cagalaban, Seoksoo Kim:
A SOA-Based Service Composition for Interactive Ubiquitous Entertainment Applications. UCMA (1) 2011: 1-6 - [c49]Sungmo Jung, Seoksoo Kim:
A Study on Safe Reproduction of Reference Points for Recognition on Screen. UCMA (1) 2011: 7-10 - 2010
- [j8]Sungmo Jung, Jaegu Song, Dae-Joon Hwang, Jae Young Ahn, Seoksoo Kim:
A Study on Software-based Sensing Technology for Multiple Object Control in AR Video. Sensors 10(11): 9857-9871 (2010) - [j7]Jaegu Song, Sungmo Jung, Jong hyun Kim, Dongil Seo, Seoksoo Kim:
Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment. Sensors 10(11): 10376-10386 (2010) - [c48]Giovanni Cagalaban, Seoksoo Kim:
Multiple Object Tracking in Unprepared Environments Using Combined Feature for Augmented Reality Applications. FGIT-FGCN (1) 2010: 1-9 - [c47]Seoksoo Kim:
Eye Tracking Technique for Product Information Provision. FGIT-SIP/MulGraB 2010: 1-7 - [c46]Sungmo Jung, Jaegu Song, Seoksoo Kim:
A Study on Marker Overlapping Control for M2M-Based Augmented Reality Multiple Object Loading Using Bresenham Algorithm. FGIT-SIP/MulGraB 2010: 8-15 - [c45]Jaegu Song, Sungmo Jung, Seoksoo Kim:
Study on the Future Internet System through Analysis of SCADA Systems. FGIT-FGCN (1) 2010: 10-14 - [c44]Seoksoo Kim:
Design of an Unattended Monitoring System Using Context-Aware Technologies Based on 3 Screen. FGIT-ASEA 2010: 23-29 - [c43]Jae Young Ahn, Jaegu Song, Dae-Joon Hwang, Seoksoo Kim:
Trends in M2M Application Services Based on a Smart Phone. FGIT-ASEA 2010: 50-56 - [c42]Giovanni Cagalaban, Seoksoo Kim:
Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks. FGIT-SIP/MulGraB 2010: 196-203 - [c41]E.-Jung Choi, Seoksoo Kim:
Fusion Render Cloud System for 3D Contents Using a Super Computer. FGIT-SIP/MulGraB 2010: 204-211 - [c40]Jaegu Song, Jong hyun Kim, Dongil Seo, Wooyoung Soh, Seoksoo Kim:
Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm. FGIT-FGCN (2) 2010: 268-275 - [c39]Sungmo Jung, Jong hyun Kim, Giovanni Cagalaban, Ji-hoon Lim, Seoksoo Kim:
Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring. FGIT-FGCN (2) 2010: 276-283 - [c38]Giovanni Cagalaban, Seoksoo Kim:
Towards a Service-Oriented Architecture for Interactive Ubiquitous Entertainment Systems. ICEC 2010: 419-421 - [c37]Giovanni Cagalaban, Seoksoo Kim:
Context-Aware Service Framework for Decision-Support Applications Using Ontology-Based Modeling. PKAW 2010: 103-110 - [c36]Giovanni Cagalaban, Seoksoo Kim:
Projective Illumination Technique in Unprepared Environments for Augmented Reality Applications. SUComS 2010: 17-23 - [c35]Jaegu Song, Jong hyun Kim, Dongil Seo, Seoksoo Kim:
Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks. SUComS 2010: 34-38 - [c34]Jaegu Song, Jae Young Ahn, Seoksoo Kim:
A Study on M2M-based System for Hygienic Meteorology Service. SUComS 2010: 39-45 - [c33]Ji-hoon Lim, Seoksoo Kim:
A Study on Markerless AR-Based Infant Education System Using CBIR. SUComS 2010: 52-58 - [c32]Seoksoo Kim:
Web-Based Media Contents Editor for UCC Websites. SUComS 2010: 65-71 - [c31]Sungmo Jung, Seoksoo Kim:
A Study on AR 3D Objects Shading Method Using Electronic Compass Sensor. SUComS 2010: 72-76
2000 – 2009
- 2009
- [j6]Soongohn Kim, Seoksoo Kim, Geuk Lee:
Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment. Future Gener. Comput. Syst. 25(3): 352-357 (2009) - [j5]Seoksoo Kim, Soongohn Kim, Geuk Lee:
Structure design and test of enterprise security management system with advanced internal security. Future Gener. Comput. Syst. 25(3): 358-363 (2009) - [j4]Jaegu Song, Seoksoo Kim:
A study on applying context-aware technology on hypothetical shopping advertisement. Inf. Syst. Frontiers 11(5): 561-567 (2009) - [j3]Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seoksoo Kim, KiSung Yang, Sung-Eon Cho:
Protecting Your Privacy with a Mobile Agent Device in RFID Environment. Wirel. Pers. Commun. 51(1): 165-178 (2009) - [c30]Jaegu Song, Sungmo Jung, Seoksoo Kim:
Research on Rule-Based AR System for Users' Situation Awareness. FGIT-FGCN 2009: 188-192 - 2008
- [j2]Chang Sun, Hongjun Wang, Seoksoo Kim, Young-Sil Kim, Seung-youn Lee, Xin-Bo Yu:
Content-Based Distortion Control Scheme for High-Quality Wireless Multimedia Services. EURASIP J. Wirel. Commun. Netw. 2008 (2008) - [c29]Rosslin John Robles, Sang-Soo Yeo, Young-Deuk Moon, Gilcheol Park, Seoksoo Kim:
Online Games and Security Issues. FGCN (2) 2008: 145-148 - [c28]Sungmo Jung, Seoksoo Kim:
The Study of Metal Resource Management Module and Process by Analyzing Information. MUE 2008: 448-453 - [c27]Jaegu Song, Seoksoo Kim:
A Study on Composite System Vulnerability through CC Analysis. MUE 2008: 454-459 - 2007
- [c26]Tai-Hoon Kim, Seoksoo Kim, Gilcheol Park:
Block Model Application for Decision Support Systems. BLISS 2007: 25-28 - [c25]Jaegu Song, Seoksoo Kim, Gilcheol Park:
Towards a Mobile and Context-Aware Technology Based Healthcare System. FBIT 2007: 591-594 - [c24]Sonho Kim, Gil Cheol Park, Seoksoo Kim:
Usability Evaluation of Humanoid-Animation Avatar with Physiological Signals. FBIT 2007: 628-636 - [c23]Seoksoo Kim, Jaegu Song:
A Study on Ontology Based Medical Information System for Home Healthcare. IPC 2007: 364-367 - [c22]Seoksoo Kim:
A Study on Image Based Multimedia Reader System for Diagnosing Uterine Cancer. IPC 2007: 368-371 - [c21]Minseong Ju, Seoksoo Kim, Tai-Hoon Kim:
A Study on Digital Media Security by Hopfield Neural Network. ISNN (3) 2007: 140-146 - [c20]Jaegu Song, Seoksoo Kim:
A Study on How to Classify the Security Rating of Medical Information Neural Network. ISNN (2) 2007: 1090-1096 - [c19]Jaegu Song, Seoksoo Kim:
A Study on Application of Cyber Shopping Service with Utilization of Context Awareness in Smart Home Environment. ISPA Workshops 2007: 144-152 - [c18]Jaegu Song, Gilcheol Park, Minseong Ju, Seoksoo Kim:
Designing Tag Based Status Identification Control System to Provide Information From uHealthcare Environment. MUE 2007: 1239-1243 - 2006
- [c17]Yang Sok Kim, Byeong Ho Kang, Young Ju Choi, Sung Sik Park, Gil Cheol Park, Seoksoo Kim:
User Behavior Analysis of the Open-Ended Document Classification System. Australian Conference on Artificial Intelligence 2006: 1089-1095 - [c16]Minseong Ju, Seoksoo Kim, Yeong-Deok Kim, Sukhoon Kang:
A Noble Structural Model for e-Learning Services in Ubiquitous Environment. ICCSA (4) 2006: 271-278 - [c15]Gilcheol Park, Seoksoo Kim:
Web Document Classification Using Changing Training Data Set. ICCSA (5) 2006: 565-574 - [c14]Jaekoo Song, Mingyun Kang, Seoksoo Kim:
Study on Contents Protection in M-Learning Environment. ICCSA (5) 2006: 575-583 - [c13]Seoksoo Kim, Kunhee Han:
Design of Security Session Reuse in Content-Based Load Distribution Server. ICCSA (5) 2006: 584-590 - [c12]Seoksoo Kim, Gilcheol Park:
Design of POC System in Ubiquitous Environment. ICCSA (5) 2006: 591-599 - [c11]Tai-Hoon Kim, Seoksoo Kim, Hee-Un Park, Myoung-sub Kim:
Analysis of Security Session Reusing in Distribution Server System. ICCSA (5) 2006: 700-707 - [c10]Sukhoon Kang, Seoksoo Kim, Geuk Lee:
A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems. ICCSA (2) 2006: 1060-1065 - [c9]Gilcheol Park, Seoksoo Kim:
U-Logistic Services in Military Using RFID and Mobile Sensor Network. ICIC (1) 2006: 1158-1163 - [c8]Seoksoo Kim:
Web Based Learning Application for LMS. ICIC (1) 2006: 1164-1169 - [c7]Gil Cheol Park, Seoksoo Kim, Gun Tae Bae, Yang Sok Kim, Byeong Ho Kang:
An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services. ITNG 2006: 382-387 - [c6]Gilcheol Park, Seoksoo Kim:
Design of a Intelligent SOAP Message Service Processor for Enhancing Mobile Web Service. KES (2) 2006: 694-700 - [c5]Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil:
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. KES (2) 2006: 701-708 - [c4]Seoksoo Kim:
Class Based Intelligent Community System for Ubiquitous Education and Medical Information System. KES (2) 2006: 718-725 - [c3]Mingyun Kang, Seoksoo Kim, Gilcheol Park, Geuk Lee, Min Wook Kil:
Design of DRM-LMS Model in M-Learning Environment. KES (3) 2006: 1075-1082 - 2005
- [j1]Seoksoo Kim, Gil Cheol Park:
An Enhanced SOAP Message Processing System for Mobile Web Services. J. Inform. and Commun. Convergence Engineering 3(3): 157-162 (2005) - 2001
- [c2]Seoksoo Kim, Dae-Joon Hwang:
CSCW Based Telemedicine on the Internet. CSCWD 2001: 554-557 - [c1]Seoksoo Kim, Dae-Joon Hwang:
An Algorithm for Formation and Confirmation of Password for Paid Members on the Internet-Based Telemedicine. Human.Society@Internet 2001: 334-340
Coauthor Index
aka: Gil Cheol Park
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint