Year |
Citation |
Score |
2020 |
Elmahdi E, Yoo S, Sharshembiev K. Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks Journal of Information Security and Applications. 51: 102425. DOI: 10.1016/j.jisa.2019.102425 |
0.354 |
|
2018 |
Heydari V, Yoo S. Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks International Journal of Wireless Information Networks. 25: 15-29. DOI: 10.1007/S10776-017-0370-3 |
0.51 |
|
2017 |
Heydari V, Kim S, Yoo S. Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers Ieee Transactions On Information Forensics and Security. 12: 1113-1124. DOI: 10.1109/Tifs.2016.2647218 |
0.441 |
|
2016 |
Gupta JND, Kalaimannan E, Yoo SM. A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators Computers and Operations Research. 69: 1-9. DOI: 10.1016/J.Cor.2015.11.003 |
0.698 |
|
2014 |
Avula M, Lee SG, Yoo SM. Security framework for hybrid Wireless Mesh Protocol in Wireless Mesh Networks Ksii Transactions On Internet and Information Systems. 8: 1982-2004. DOI: 10.3837/Tiis.2014.06.010 |
0.804 |
|
2014 |
An YK, An C, Yoo SM, Wells BE. Noise mitigation for multiple target tracking in acoustic wireless sensor networks Proceedings - Ieee Military Communications Conference Milcom. 1127-1132. DOI: 10.1109/MILCOM.2014.190 |
0.622 |
|
2014 |
An YK, Yoo SM, An C, Earl Wells B. Rule-based multiple-target tracking in acoustic wireless sensor networks Computer Communications. 51: 81-94. DOI: 10.1016/J.Comcom.2014.05.011 |
0.664 |
|
2013 |
Tan WK, Lee SG, Lam JH, Yoo SM. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols. Sensors (Basel, Switzerland). 13: 11553-85. PMID 24002231 DOI: 10.3390/s130911553 |
0.415 |
|
2013 |
An YK, Yoo SM, An C, Wells E. Noise mitigation for target tracking in wireless acoustic sensor networks Ksii Transactions On Internet and Information Systems. 7: 1166-1179. DOI: 10.3837/tiis.2013.05.013 |
0.602 |
|
2013 |
An YK, Yoo SM, An C, Earl Wells B. Doppler effect on target tracking in wireless sensor networks Computer Communications. 36: 834-848. DOI: 10.1016/J.Comcom.2013.01.002 |
0.661 |
|
2013 |
Park S, Yoo S. An efficient reliable one-hop broadcast in mobile ad hoc networks Ad Hoc Networks. 11: 19-28. DOI: 10.1016/j.adhoc.2012.03.021 |
0.318 |
|
2012 |
Avula M, Yoo S, Park S. Constructing Minimum Connected Dominating Set In Mobile Ad Hoc Networks International Journal On Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks. 4: 15-27. DOI: 10.5121/Jgraphoc.2012.4202 |
0.778 |
|
2012 |
Sheldon FT, Weber JM, Yoo SM, Pan WD. The insecurity of wireless networks Ieee Security and Privacy. 10: 54-61. DOI: 10.1109/MSP.2012.60 |
0.396 |
|
2012 |
Lee JC, Yoo S. Intelligent cell selection satisfying user requirements for inter-system handover in heterogeneous networks Computer Communications. 35: 2106-2114. DOI: 10.1016/J.Comcom.2012.06.014 |
0.401 |
|
2012 |
Toutonji OA, Yoo SM, Park M. Stability analysis of VEISV propagation modeling for network worm attack Applied Mathematical Modelling. 36: 2751-2761. DOI: 10.1016/J.Apm.2011.09.058 |
0.756 |
|
2010 |
Toutonji OA, Yoo SM, Park M. Propagation modeling and analysis of network worm attack Acm International Conference Proceeding Series. DOI: 10.1145/1852666.1852719 |
0.778 |
|
2010 |
Al-Shurman M, Yoo S, Kim B, Park S. Two Distributive Key Management Schemes In Mobile Ad Hoc Networks Intelligent Automation and Soft Computing. 16: 593-605. DOI: 10.1080/10798587.2010.10643103 |
0.461 |
|
2009 |
Toutonji O, Yoo SM. Passive benign worm propagation modeling with dynamic quarantine defense Ksii Transactions On Internet and Information Systems. 3: 96-107. DOI: 10.3837/Tiis.2009.01.005 |
0.753 |
|
2008 |
Kanamori Y, Hoanca B, Yoo SM. Three-party quantum authenticated key distribution with partially trusted third party Globecom - Ieee Global Telecommunications Conference. 1831-1835. DOI: 10.1109/GLOCOM.2008.ECP.354 |
0.571 |
|
2006 |
Kanamori Y, Yoo S, Pan WD, Sheldon FT. A Short Survey On Quantum Computers International Journal of Computers and Applications. 28: 227-233. DOI: 10.2316/Journal.202.2006.3.202-1700 |
0.539 |
|
2006 |
Na'mneh RA, Pan WD, Yoo S. Two Parallel 1-D Fft Algorithms Without All-To-All Communication Parallel Processing Letters. 16: 153-164. DOI: 10.1142/S012962640600254X |
0.307 |
|
2006 |
Kanamori Y, Yoo SM, Sheldon FT. Bank transfer over quantum channel with digital checks Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2006.317 |
0.527 |
|
2006 |
Choo H, Lee YJ, Yoo S. DIG: Degree of inter-reference gap for a dynamic buffer cache management Information Sciences. 176: 1032-1044. DOI: 10.1016/J.Ins.2005.01.018 |
0.344 |
|
2006 |
Park C, Yoo S, Choo H, Pan WD. Short communication: Multi-user data multiplexing for digital multimedia broadcasting Computer Communications. 29: 3970-3975. DOI: 10.1016/J.Comcom.2006.06.022 |
0.349 |
|
2006 |
Eisbrener J, Murphy G, Eade D, Pinnow CK, Begum K, Park S, Yoo SM, Youn JH. Recycled path routing in mobile ad hoc networks Computer Communications. 29: 1552-1560. DOI: 10.1016/j.comcom.2005.10.018 |
0.421 |
|
2005 |
Al-Shurman M, Yoo SM, Kanamori Y. Decreasing broadcast in route discovery using vectors in mobile ad hoc networks Proceedings of the Annual Southeast Conference. 2: 2103-2104. DOI: 10.1145/1167253.1167278 |
0.657 |
|
2005 |
Kanamori Y, Yoo SM, Al-Shurman M. A quantum no-key protocol for secure data communication Proceedings of the Annual Southeast Conference. 2: 292-293. DOI: 10.1145/1167253.1167274 |
0.561 |
|
2005 |
Park S, Yoo S, Al-Shurman M, VanVoorst B, Jo C. ARM: Anticipated route maintenance scheme in location-aided mobile ad hoc networks Journal of Communications and Networks. 7: 325-336. DOI: 10.1109/Jcn.2005.6389817 |
0.665 |
|
2005 |
Yoo SM, Kotturi D, Pan DW, Blizzard J. An AES crypto chip using a high-speed parallel pipelined architecture Microprocessors and Microsystems. 29: 317-326. DOI: 10.1016/J.Micpro.2004.12.001 |
0.366 |
|
2005 |
Thaduri M, Yoo S, Gaede RK. An efficient VLSI implementation of IDEA encryption algorithm using VHDL Microprocessors and Microsystems. 29: 1-7. DOI: 10.1016/J.Micpro.2004.06.002 |
0.405 |
|
Show low-probability matches. |