default search action
Kuinam J. Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j39]Hyunjoo Kim, Jonghyun Kim, Youngsoo Kim, Ikkyun Kim, Kuinam J. Kim, Hyuncheol Kim:
Improvement of malware detection and classification using API call sequence alignment and visualization. Clust. Comput. 22(Suppl 1): 921-929 (2019) - [j38]Nakhoon Baek, Kuinam J. Kim:
Design and implementation of OpenGL SC 2.0 rendering pipeline. Clust. Comput. 22(Suppl 1): 931-936 (2019) - [j37]Kuinam J. Kim, Nakhoon Baek:
Providing profiling information for OpenGL ES application programs. Clust. Comput. 22(Suppl 1): 937-941 (2019) - [j36]Nakhoon Baek, Kuinam J. Kim:
Prototype implementation of the OpenGL ES 2.0 shading language offline compiler. Clust. Comput. 22(Suppl 1): 943-948 (2019) - [j35]Donghwoon Kwon, Hyunjoo Kim, Jinoh Kim, Sang C. Suh, Ikkyun Kim, Kuinam J. Kim:
A survey of deep learning-based network anomaly detection. Clust. Comput. 22(Suppl 1): 949-961 (2019) - [j34]Hye-Young Kim, Kuinam J. Kim:
Optimized state update for mobile games in cloud networks. Clust. Comput. 22(Suppl 1): 1035-1041 (2019) - [j33]Hyunjoo Kim, Jonghyun Kim, Youngsoo Kim, Ikkyun Kim, Kuinam J. Kim:
Design of network threat detection and classification based on machine learning on cloud computing. Clust. Comput. 22(Suppl 1): 2341-2350 (2019) - [e3]Kuinam J. Kim, Nakhoon Baek:
Information Science and Applications 2018 - ICISA 2018, Hong Kong, China, June 25-27th, 2018. Lecture Notes in Electrical Engineering 514, Springer 2019, ISBN 978-981-13-1055-3 [contents] - 2017
- [j32]Nakhoon Baek, Wooseok Shin, Kuinam J. Kim:
Geometric primitive extraction from LiDAR-scanned point clouds. Clust. Comput. 20(1): 741-748 (2017) - [j31]Nakhoon Baek, Kuinam J. Kim:
An artifact detection scheme with CUDA-based image operations. Clust. Comput. 20(1): 749-755 (2017) - [j30]Buseung Cho, Kuinam J. Kim, Jin-Wook Chung:
CBR-based network performance management with multi-agent approach. Clust. Comput. 20(1): 757-767 (2017) - [j29]Soonchoul Kim, Moonhyun Kim, Kuinam J. Kim, Bumsuk Choi, Jinwook Chung:
A scheme of AR-based personalized interactive broadcasting service in terrestrial digital broadcasting system. Clust. Comput. 20(3): 2349-2354 (2017) - [j28]Kyong Ho Choi, Kuinam J. Kim:
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service. Wirel. Pers. Commun. 94(1): 5-16 (2017) - [j27]Je-Ho Park, Taeg Keun Whangbo, Kuinam J. Kim:
A Novel Image Identifier Generation Method Using Luminance and Location. Wirel. Pers. Commun. 94(1): 99-115 (2017) - [j26]Sanghyun Park, HoYong Ryu, Kuinam J. Kim, Jinsul Kim:
Cloud System for User-Customized Mobile Interface Sharing in Wireless Environment. Wirel. Pers. Commun. 94(2): 149-164 (2017) - [j25]Kuinam J. Kim, Min Su Kim:
A Study of Integrity on the Security Patches System Using PM-FTS. Wirel. Pers. Commun. 94(2): 165-173 (2017) - [j24]Dong Chun Lee, Kuinam J. Kim, Jong Chan Lee:
Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks. Wirel. Pers. Commun. 94(2): 187-208 (2017) - [j23]Youngseop Kim, Woori Han, Yong-Hwan Lee, Cheong Ghil Kim, Kuinam J. Kim:
Object Tracking and Recognition Based on Reliability Assessment of Learning in Mobile Environments. Wirel. Pers. Commun. 94(2): 267-282 (2017) - [j22]Kuinam J. Kim, JongMin Kim:
A Study on the Markov Chain Based Malicious Code Threat Estimation Model. Wirel. Pers. Commun. 94(3): 315-329 (2017) - [j21]Kuinam J. Kim, Dong Chun Lee:
Secure Route Optimization Scheme for Network Mobility Support in Heterogeneous Mobile Networks. Wirel. Pers. Commun. 94(3): 331-349 (2017) - [j20]Dong Chun Lee, Kuinam J. Kim:
Improved Authentication of Binding Update Protocol in Mobile IPv6 Networks. Wirel. Pers. Commun. 94(3): 351-367 (2017) - [c24]Chanjin Park, Wonhyuk Lee, Kuinam J. Kim, Hyuncheol Kim:
Research on Design of End Site Architecture to Connect LHCONE in KREONET. ICISA 2017: 745-750 - 2016
- [j19]Changhee Cho, Jisu Kim, Jinsul Kim, Sangjoon Lee, Kuinam J. Kim:
Detecting for high speed flying object using image processing on target place. Clust. Comput. 19(1): 285-292 (2016) - [j18]Hoyoung Cheong, Jonwon Eun, Hyuncheol Kim, Kuinam J. Kim:
Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes. Clust. Comput. 19(1): 309-314 (2016) - [j17]Seung-Ho Kang, Kuinam J. Kim:
A feature selection approach to find optimal feature subsets for the network intrusion detection system. Clust. Comput. 19(1): 325-333 (2016) - [j16]Kuinam J. Kim, Cheong Ghil Kim, Taeg Keun Whangbo, Kyoungro Yoon:
A continuous playing scheme on RESTful web service. Clust. Comput. 19(1): 379-387 (2016) - [c23]Wonhyuk Lee, Kuinam J. Kim, Hyuncheol Kim:
Hierarchical Cluster Network for Wellness Sports Industry. ICITCS 2016: 1-4 - 2015
- [j15]Chung-Pyo Hong, Cheong-Ghil Kim, Kuinam J. Kim, Shin-Dug Kim:
A polymorphic service management scheme based on virtual object for ubiquitous computing environment. Multim. Tools Appl. 74(16): 6183-6196 (2015) - [j14]Cheong Ghil Kim, Kuinam J. Kim, Jung-Hoon Lee:
NAND flash memory system based on the Harvard buffer architecture for multimedia applications. Multim. Tools Appl. 74(16): 6287-6302 (2015) - [j13]Xiyuan Yin, Dae-Hwan Kim, Chung-Pyo Hong, Cheong-Ghil Kim, Kuinam J. Kim, Shin-Dug Kim:
Advanced feature point transformation of corner points for mobile object recognition. Multim. Tools Appl. 74(16): 6541-6556 (2015) - 2014
- [j12]Dong Hwi Lee, Kuinam J. Kim:
A study on malicious codes pattern advanced analysis using visualization. Multim. Tools Appl. 68(2): 253-263 (2014) - [j11]Kyung-Yong Chung, Daesung Lee, Kuinam J. Kim:
Categorization for grouping associative items using data mining in item-based collaborative filtering. Multim. Tools Appl. 71(2): 889-904 (2014) - [j10]Dong Hwi Lee, Byunghun Kim, Kuinam J. Kim:
PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions. Multim. Tools Appl. 73(2): 601-615 (2014) - [j9]Kyung-Yong Chung, Junseok Yoo, Kuinam J. Kim:
Recent trends on mobile computing and future networks. Pers. Ubiquitous Comput. 18(3): 489-491 (2014) - [j8]Cheong Ghil Kim, Kuinam J. Kim:
Implementation of a cost-effective home lighting control system on embedded Linux with OpenWrt. Pers. Ubiquitous Comput. 18(3): 535-542 (2014) - [j7]Roy C. Park, Hoill Jung, Kyung-Yong Chung, Kuinam J. Kim:
Performance analysis of LTE downlink system using relay-based selective transmission. Pers. Ubiquitous Comput. 18(3): 543-551 (2014) - [c22]Dong Chun Lee, Kuinam J. Kim:
Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 Networks. ICITCS 2014: 1-4 - 2013
- [j6]Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim:
A study on abnormal event correlation analysis for convergence security monitor. Clust. Comput. 16(2): 219-227 (2013) - [j5]Joong-Kyung Ryu, Junseok Yoo, Jung-Soo Han, Sang Yeob Oh, Kuinam J. Kim:
Special Issue on "Recent Trends on Convergence Personal Wireless System" - Selected Topics from the ICITCS Conference on December 5-7 2012 in Pyeongchang, Korea. Wirel. Pers. Commun. 73(2): 169-174 (2013) - [j4]Min Su Kim, Dong Hwi Lee, Kui-Nam J. Kim:
A Study on Convergence Security System for Preventing Leakage of Internal Information. Wirel. Pers. Commun. 73(2): 175-185 (2013) - [c21]Min Su Kim, Dong Hwi Lee, Kuinam J. Kim:
A Study on the NFC-Based Mobile Parking Management System. ICISA 2013: 1-5 - [c20]Jong-Min Kim, Dong Hwi Lee, Kui-Nam J. Kim:
A Study on Modeling to Predict Security Threat of Smart Phones. ICISA 2013: 1-5 - [c19]Ji Woong Kim, Min Su Kim, Seung-Jae Yoo, Kuinam J. Kim:
The Efficient Security Management Measures Using K2-SMS in Case of Security Transport. ICITCS 2013: 1-2 - [c18]Byung Seok Kong, Min Su Kim, Kuinam J. Kim:
A Study on Improvement Measures of Unmanned Security System against Security Threats. ICITCS 2013: 1-3 - [c17]Young Ho Lee, Min Su Kim, Kuinam J. Kim:
A Study on Improvement Measures of Remote Diligence / Laziness Management Applying NFC. ICITCS 2013: 1-3 - [e2]Kuinam J. Kim, Kyung-Yong Chung:
Proceedings of the International Conference on IT Convergence and Security, ICITCS 2012, Pyeong Chang, Korea, December 5-7, 2012. Lecture Notes in Electrical Engineering 215, Springer 2013, ISBN 978-94-007-5859-9 [contents] - 2012
- [j3]Intae Kim, Daesung Lee, Kuinam J. Kim, Junghyun Lee:
Flexible authorization in home network environments. Clust. Comput. 15(1): 3-15 (2012) - [j2]Daesung Lee, Kuinam J. Kim:
Improving web cache server performance through arbitral thread and delayed caching. Clust. Comput. 15(1): 17-25 (2012) - [j1]Daesung Lee, Kuinam J. Kim:
Enabling Lego robots to communicate via infrared routing. Telecommun. Syst. 51(2-3): 125-136 (2012) - [c16]Kuinam J. Kim, Kyung-Yong Chung:
Erratum to: IT Convergence and Security 2012. ICITCS 2012 - [c15]Min Su Kim, Dong Hwi Lee, Kui-Nam J. Kim:
A Study on the Real-Time Location Tracking Systems Using Passive RFID. ICITCS 2012: 441-448 - [e1]Kuinam J. Kim, Seong-Jin Ahn:
Proceedings of the International Conference on IT Convergence and Security, ICITCS 2011, Suwon, Korea, December 14-16, 2011. Lecture Notes in Electrical Engineering 120, Springer 2012, ISBN 978-94-007-2910-0 [contents]
2000 – 2009
- 2007
- [c14]Gang Taek Lee, Dong Hwi Lee, Kuinam J. Kim:
Simulation Based Nodal Analysis for Effects Based Operations. ICCSA (2) 2007: 166-176 - [c13]Yong-Ho Kim, Dong Hwi Lee, Kuinam J. Kim:
A Stable Evidence Collection Procedure of a Volatile Data in Research. ICCSA (2) 2007: 177-184 - [c12]Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim:
Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique. ICCSA (2) 2007: 185-194 - [c11]Kyong Ho Choi, Dong Hwi Lee, Kuinam J. Kim:
Design and Implementation of Security Structure for Interactive Web Environment. ICCSA Workshops 2007: 237-244 - 2006
- [c10]Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim:
HOIDS-Based Detection Method of Vicious Event in Large Networks. EUC Workshops 2006: 998-1005 - [c9]Seung-Jae Yoo, Kuinam J. Kim:
Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks. ICCSA (2) 2006: 1025-1032 - [c8]Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park:
Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. ISPA Workshops 2006: 917-926 - [c7]Sangho Lee, Dong Hwi Lee, Kuinam J. Kim:
A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. ISPA Workshops 2006: 1006-1017 - 2004
- [c6]Si Choon Noh, Dong Chun Lee, Kuinam J. Kim:
Multi-level Protection Building for Virus Protection Infrastructure. International Conference on Computational Science 2004: 631-634 - 2003
- [c5]Jongchan Lee, Hongjin Kim, Kuinam J. Kim:
Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks. International Conference on Computational Science 2003: 555-565 - [c4]Sukwoo Han, Kuinam J. Kim, Young-Sung Kim:
Efficient Migration Algorithm for Mobile Agents in Wired/Wireless Internets. International Conference on Computational Science 2003: 626-636 - [c3]Dong Chun Lee, Jeom Goo Kim, Kuinam J. Kim:
Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks. ICCSA (2) 2003: 50-59 - [c2]Si Choon Noh, Dong Chun Lee, Kuinam J. Kim:
Improved Structure Management of Gateway Firewall Systems for Effective Networks Security. ISCIS 2003: 1076-1083 - [c1]Jae-Myung Kim, Kyu-Ho Lee, Jong-Seob Kim, Kuinam J. Kim:
Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database. ISCIS 2003: 1098-1105
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint