Seong-Moo Yoo - Publications

Affiliations: 
The University of Alabama in Huntsville, Huntsville, AL, United States 
Area:
Electronics and Electrical Engineering, Computer Science

30 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Elmahdi E, Yoo S, Sharshembiev K. Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks Journal of Information Security and Applications. 51: 102425. DOI: 10.1016/j.jisa.2019.102425  0.354
2018 Heydari V, Yoo S. Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks International Journal of Wireless Information Networks. 25: 15-29. DOI: 10.1007/S10776-017-0370-3  0.51
2017 Heydari V, Kim S, Yoo S. Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers Ieee Transactions On Information Forensics and Security. 12: 1113-1124. DOI: 10.1109/Tifs.2016.2647218  0.441
2016 Gupta JND, Kalaimannan E, Yoo SM. A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators Computers and Operations Research. 69: 1-9. DOI: 10.1016/J.Cor.2015.11.003  0.698
2014 Avula M, Lee SG, Yoo SM. Security framework for hybrid Wireless Mesh Protocol in Wireless Mesh Networks Ksii Transactions On Internet and Information Systems. 8: 1982-2004. DOI: 10.3837/Tiis.2014.06.010  0.804
2014 An YK, An C, Yoo SM, Wells BE. Noise mitigation for multiple target tracking in acoustic wireless sensor networks Proceedings - Ieee Military Communications Conference Milcom. 1127-1132. DOI: 10.1109/MILCOM.2014.190  0.622
2014 An YK, Yoo SM, An C, Earl Wells B. Rule-based multiple-target tracking in acoustic wireless sensor networks Computer Communications. 51: 81-94. DOI: 10.1016/J.Comcom.2014.05.011  0.664
2013 Tan WK, Lee SG, Lam JH, Yoo SM. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols. Sensors (Basel, Switzerland). 13: 11553-85. PMID 24002231 DOI: 10.3390/s130911553  0.415
2013 An YK, Yoo SM, An C, Wells E. Noise mitigation for target tracking in wireless acoustic sensor networks Ksii Transactions On Internet and Information Systems. 7: 1166-1179. DOI: 10.3837/tiis.2013.05.013  0.602
2013 An YK, Yoo SM, An C, Earl Wells B. Doppler effect on target tracking in wireless sensor networks Computer Communications. 36: 834-848. DOI: 10.1016/J.Comcom.2013.01.002  0.661
2013 Park S, Yoo S. An efficient reliable one-hop broadcast in mobile ad hoc networks Ad Hoc Networks. 11: 19-28. DOI: 10.1016/j.adhoc.2012.03.021  0.318
2012 Avula M, Yoo S, Park S. Constructing Minimum Connected Dominating Set In Mobile Ad Hoc Networks International Journal On Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks. 4: 15-27. DOI: 10.5121/Jgraphoc.2012.4202  0.778
2012 Sheldon FT, Weber JM, Yoo SM, Pan WD. The insecurity of wireless networks Ieee Security and Privacy. 10: 54-61. DOI: 10.1109/MSP.2012.60  0.396
2012 Lee JC, Yoo S. Intelligent cell selection satisfying user requirements for inter-system handover in heterogeneous networks Computer Communications. 35: 2106-2114. DOI: 10.1016/J.Comcom.2012.06.014  0.401
2012 Toutonji OA, Yoo SM, Park M. Stability analysis of VEISV propagation modeling for network worm attack Applied Mathematical Modelling. 36: 2751-2761. DOI: 10.1016/J.Apm.2011.09.058  0.756
2010 Toutonji OA, Yoo SM, Park M. Propagation modeling and analysis of network worm attack Acm International Conference Proceeding Series. DOI: 10.1145/1852666.1852719  0.778
2010 Al-Shurman M, Yoo S, Kim B, Park S. Two Distributive Key Management Schemes In Mobile Ad Hoc Networks Intelligent Automation and Soft Computing. 16: 593-605. DOI: 10.1080/10798587.2010.10643103  0.461
2009 Toutonji O, Yoo SM. Passive benign worm propagation modeling with dynamic quarantine defense Ksii Transactions On Internet and Information Systems. 3: 96-107. DOI: 10.3837/Tiis.2009.01.005  0.753
2008 Kanamori Y, Hoanca B, Yoo SM. Three-party quantum authenticated key distribution with partially trusted third party Globecom - Ieee Global Telecommunications Conference. 1831-1835. DOI: 10.1109/GLOCOM.2008.ECP.354  0.571
2006 Kanamori Y, Yoo S, Pan WD, Sheldon FT. A Short Survey On Quantum Computers International Journal of Computers and Applications. 28: 227-233. DOI: 10.2316/Journal.202.2006.3.202-1700  0.539
2006 Na'mneh RA, Pan WD, Yoo S. Two Parallel 1-D Fft Algorithms Without All-To-All Communication Parallel Processing Letters. 16: 153-164. DOI: 10.1142/S012962640600254X  0.307
2006 Kanamori Y, Yoo SM, Sheldon FT. Bank transfer over quantum channel with digital checks Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2006.317  0.527
2006 Choo H, Lee YJ, Yoo S. DIG: Degree of inter-reference gap for a dynamic buffer cache management Information Sciences. 176: 1032-1044. DOI: 10.1016/J.Ins.2005.01.018  0.344
2006 Park C, Yoo S, Choo H, Pan WD. Short communication: Multi-user data multiplexing for digital multimedia broadcasting Computer Communications. 29: 3970-3975. DOI: 10.1016/J.Comcom.2006.06.022  0.349
2006 Eisbrener J, Murphy G, Eade D, Pinnow CK, Begum K, Park S, Yoo SM, Youn JH. Recycled path routing in mobile ad hoc networks Computer Communications. 29: 1552-1560. DOI: 10.1016/j.comcom.2005.10.018  0.421
2005 Al-Shurman M, Yoo SM, Kanamori Y. Decreasing broadcast in route discovery using vectors in mobile ad hoc networks Proceedings of the Annual Southeast Conference. 2: 2103-2104. DOI: 10.1145/1167253.1167278  0.657
2005 Kanamori Y, Yoo SM, Al-Shurman M. A quantum no-key protocol for secure data communication Proceedings of the Annual Southeast Conference. 2: 292-293. DOI: 10.1145/1167253.1167274  0.561
2005 Park S, Yoo S, Al-Shurman M, VanVoorst B, Jo C. ARM: Anticipated route maintenance scheme in location-aided mobile ad hoc networks Journal of Communications and Networks. 7: 325-336. DOI: 10.1109/Jcn.2005.6389817  0.665
2005 Yoo SM, Kotturi D, Pan DW, Blizzard J. An AES crypto chip using a high-speed parallel pipelined architecture Microprocessors and Microsystems. 29: 317-326. DOI: 10.1016/J.Micpro.2004.12.001  0.366
2005 Thaduri M, Yoo S, Gaede RK. An efficient VLSI implementation of IDEA encryption algorithm using VHDL Microprocessors and Microsystems. 29: 1-7. DOI: 10.1016/J.Micpro.2004.06.002  0.405
Show low-probability matches.