Folgen
Ju-Yeon Jo
Ju-Yeon Jo
Bestätigte E-Mail-Adresse bei unlv.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
An agile manufacturing workcell design
RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ...
IIE transactions 29 (10), 901-909, 1997
1011997
EECCR: An energy-efficient -coverage and -connectivity routing algorithm under border effects in heterogeneous sensor networks
Y Jin, L Wang, JY Jo, Y Kim, M Yang, Y Jiang
IEEE Transactions on Vehicular Technology 58 (3), 1429-1442, 2009
602009
SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography
Y Kim, W Ren, JY Jo, M Yang, Y Jiang, J Zheng
2007 IEEE International Conference on Communications, 1570-1575, 2007
602007
ADS-B vulnerabilities and a security solution with a timestamp
Y Kim, JY Jo, S Lee
IEEE Aerospace and Electronic Systems Magazine 32 (11), 52-61, 2017
582017
Design of an agile manufacturing workcell for light mechanical applications
RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ...
Proceedings of IEEE international conference on robotics and automation 1 …, 1996
541996
ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks
Y Jin, JY Jo, L Wang, Y Kim, X Yang
Computer Communications 31 (10), 2398-2407, 2008
492008
A framework for environmental monitoring with Arduino-based sensors using Restful web service
S Lee, J Jo, Y Kim, H Stephen
2014 IEEE International Conference on Services Computing, 275-282, 2014
442014
Defeating distributed denial-of-service attack with deterministic bit marking
Y Kim, JY Jo, FL Merat
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
422003
Internet traffic load balancing using dynamic hashing with flow volume
JY Jo, Y Kim, HJ Chao, FL Merat
Internet Performance and Control of Network Systems III 4865, 154-165, 2002
422002
Baseline Profile Stability for Network Anomaly Detection
Y Kim, JY Jo, K Suh
International Journal of Network Security, 6 (1), 60 - 66, 2008
402008
Text mining for security threat detection discovering hidden information in unstructured log messages
C Suh-Lee, JY Jo, Y Kim
2016 IEEE Conference on Communications and Network Security (CNS), 252-260, 2016
382016
Virtual testing of agile manufacturing software using 3D graphical simulation
JY Jo, Y Kim, A Podgurski, WS Newman
Proceedings of International Conference on Robotics and Automation 2, 1223-1228, 1997
311997
Advances in agile manufacturing
FL Merat, NA Barendt, RD Quinn, GC Causey, WS Newman, VB Velasco, ...
Proceedings of International Conference on Robotics and Automation 2, 1216-1222, 1997
311997
Application of NTRU cryptographic algorithm for SCADA security
AP Premnath, JY Jo, Y Kim
2014 11th international conference on information technology: new …, 2014
282014
A flexible software architecture for agile manufacturing
Y Kim, JY Jo, VB Velasco, NA Barendt, A Podgurski, G Ozsoyoglu, ...
Proceedings of International Conference on Robotics and Automation 4, 3043-3047, 1997
261997
A secure location verification method for ADS-B
Y Kim, JY Jo, S Lee
2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 1-10, 2016
252016
Performance testing of web-based data visualization
S Lee, JY Jo, Y Kim
2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2014
242014
Method for secure RESTful web service
S Lee, JY Jo, Y Kim
2015 IEEE/ACIS 14th International Conference on Computer and Information …, 2015
222015
High-speed router filter for blocking TCP flooding under DDoS attack
Y Kim, JY Jo, HJ Chao, F Merat
Conference Proceedings of the 2003 IEEE International Performance, Computing …, 2003
222003
A server-based real-time privacy protection scheme against video surveillance by unmanned aerial systems
Y Kim, J Jo, S Shrestha
2014 International Conference on Unmanned Aircraft Systems (ICUAS), 684-691, 2014
212014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20