Follow
Jeong Nyeo Kim
Jeong Nyeo Kim
Verified email at etri.re.kr
Title
Cited by
Cited by
Year
A survey on activities of daily living and occupations of upper extremity amputees
CH Jang, HS Yang, HE Yang, SY Lee, JW Kwon, BD Yun, JY Choi, ...
Annals of rehabilitation medicine 35 (6), 907, 2011
1872011
LoRaWAN-based energy-efficient surveillance by drones for intelligent transportation systems
V Sharma, I You, G Pau, M Collotta, JD Lim, JN Kim
Energies 11 (3), 573, 2018
1072018
A security protocol for route optimization in DMM-based smart home IoT networks
D Shin, K Yun, J Kim, PV Astillo, JN Kim, I You
IEEE Access 7, 142531-142550, 2019
852019
Multimodal biometric method that combines veins, prints, and shape of a finger
BJ Kang, KR Park, JH Yoo, JN Kim
Optical Engineering 50 (1), 017201-017201-13, 2011
572011
Access control method using token having security attributes in computer system
SK Eun, JN Kim, JG Ko, SY Doo, JS Yu, JD Lim
US Patent 7,290,279, 2007
512007
Android mobile application system call event pattern analysis for determination of malicious attack
YJ Ham, D Moon, HW Lee, JD Lim, JN Kim
International Journal of Security and Its Applications 8 (1), 231-246, 2014
462014
Evaluation of DNA extraction methods and their clinical application for direct detection of causative bacteria in continuous ambulatory peritoneal dialysis culture fluids from …
SH Kim, HS Jeong, YH Kim, S Am Song, JY Lee, SH Oh, HR Kim, JN Lee, ...
Annals of laboratory medicine 32 (2), 119, 2012
402012
System and method of verifying integrity of software
SW Park, GL Kim, KS Lim, JD Lim, JN Kim
US Patent 9,867,051, 2018
352018
SACA: Self-aware communication architecture for IoT using mobile fog servers
V Sharma, JD Lim, JN Kim, I You
Mobile Information Systems 2017, 2017
352017
Design and implementation of integrated security engine for secure networking
JN Kim, K seok Lee, C Lee
The 6th International Conference on Advanced Communication Technology, 2004 …, 2004
222004
Self-enforcing game theory-based resource allocation for LoRaWAN assisted public safety communications
V Sharma, G Choudhary, I You, JD Lim, JN Kim
arXiv preprint arXiv:1804.07204, 2018
212018
Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas
M Kim, E Hwang, JN Kim
Wireless Networks 23, 355-369, 2017
212017
A practical implementation of fuzzy fingerprint vault for smart cards
D Moon, Y Chung, C Seo, SY Kim, JN Kim
Journal of intelligent Manufacturing 25, 293-302, 2014
202014
Technology trends of access control in IoT and requirements analysis
Y Lee, J Lim, Y Jeon, J Kim
2015 International conference on information and communication technology …, 2015
182015
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications
SR Kim, JN Kim, ST Kim, S Shin, JH Yi
The Journal of Supercomputing 74, 4261-4280, 2018
172018
A secure storage system for sensitive data protection based on mobile virtualization
SW Park, JD Lim, JN Kim
International Journal of Distributed Sensor Networks 11 (2), 929380, 2015
172015
Building secure execution environment for mobile platform
YH Kim, JN Kim
2011 First ACIS/JNU International Conference on Computers, Networks, Systems …, 2011
152011
Access control for secure freebsd operating system
JG Ko, JN Kim, KI Jeong
Proc. of WISA2001, The Second International Workshop on Information Security …, 2001
152001
Rooting attack detection method on the android-based smart phone
WJ Jang, SW Cho, HW Lee, H Ju, JN Kim
Proceedings of 2011 International Conference on Computer Science and Network …, 2011
132011
Deterministic task scheduling for embedded real-time operating systems
SJ Oh, JN Kim, YR Seong, CH Lee
IEICE TRANSACTIONS on Information and Systems 87 (2), 472-474, 2004
132004
The system can't perform the operation now. Try again later.
Articles 1–20