An agile manufacturing workcell design RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ...
IIE transactions 29 (10), 901-909, 1997
101 1997 EECCR: An energy-efficient -coverage and -connectivity routing algorithm under border effects in heterogeneous sensor networks Y Jin, L Wang, JY Jo, Y Kim, M Yang, Y Jiang
IEEE Transactions on Vehicular Technology 58 (3), 1429-1442, 2009
60 2009 SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography Y Kim, W Ren, JY Jo, M Yang, Y Jiang, J Zheng
2007 IEEE International Conference on Communications, 1570-1575, 2007
60 2007 ADS-B vulnerabilities and a security solution with a timestamp Y Kim, JY Jo, S Lee
IEEE Aerospace and Electronic Systems Magazine 32 (11), 52-61, 2017
58 2017 Design of an agile manufacturing workcell for light mechanical applications RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ...
Proceedings of IEEE international conference on robotics and automation 1 …, 1996
54 1996 ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks Y Jin, JY Jo, L Wang, Y Kim, X Yang
Computer Communications 31 (10), 2398-2407, 2008
49 2008 A framework for environmental monitoring with Arduino-based sensors using Restful web service S Lee, J Jo, Y Kim, H Stephen
2014 IEEE International Conference on Services Computing, 275-282, 2014
44 2014 Defeating distributed denial-of-service attack with deterministic bit marking Y Kim, JY Jo, FL Merat
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
42 2003 Internet traffic load balancing using dynamic hashing with flow volume JY Jo, Y Kim, HJ Chao, FL Merat
Internet Performance and Control of Network Systems III 4865, 154-165, 2002
42 2002 Baseline Profile Stability for Network Anomaly Detection Y Kim, JY Jo, K Suh
International Journal of Network Security, 6 (1), 60 - 66, 2008
40 2008 Text mining for security threat detection discovering hidden information in unstructured log messages C Suh-Lee, JY Jo, Y Kim
2016 IEEE Conference on Communications and Network Security (CNS), 252-260, 2016
38 2016 Virtual testing of agile manufacturing software using 3D graphical simulation JY Jo, Y Kim, A Podgurski, WS Newman
Proceedings of International Conference on Robotics and Automation 2, 1223-1228, 1997
31 1997 Advances in agile manufacturing FL Merat, NA Barendt, RD Quinn, GC Causey, WS Newman, VB Velasco, ...
Proceedings of International Conference on Robotics and Automation 2, 1216-1222, 1997
31 1997 Application of NTRU cryptographic algorithm for SCADA security AP Premnath, JY Jo, Y Kim
2014 11th international conference on information technology: new …, 2014
28 2014 A flexible software architecture for agile manufacturing Y Kim, JY Jo, VB Velasco, NA Barendt, A Podgurski, G Ozsoyoglu, ...
Proceedings of International Conference on Robotics and Automation 4, 3043-3047, 1997
26 1997 A secure location verification method for ADS-B Y Kim, JY Jo, S Lee
2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 1-10, 2016
25 2016 Performance testing of web-based data visualization S Lee, JY Jo, Y Kim
2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2014
24 2014 Method for secure RESTful web service S Lee, JY Jo, Y Kim
2015 IEEE/ACIS 14th International Conference on Computer and Information …, 2015
22 2015 High-speed router filter for blocking TCP flooding under DDoS attack Y Kim, JY Jo, HJ Chao, F Merat
Conference Proceedings of the 2003 IEEE International Performance, Computing …, 2003
22 2003 A server-based real-time privacy protection scheme against video surveillance by unmanned aerial systems Y Kim, J Jo, S Shrestha
2014 International Conference on Unmanned Aircraft Systems (ICUAS), 684-691, 2014
21 2014