[1]

Sungmin Choe, Yongjin Kim, Jangkyung Kim, Kijoon Chae, Youngsong Mun, "Rerouting Scheme for handoff in wireless ATM," IEEE ELECTRONICS LETTERS, Vol. 34, No. 11, pp. 1076-1077, May. 1998. (SCI 저널)

[2]

Won Kim, Kijoon Chae, Dongsub Cho, Byoungju Choi, Myung Kim, Kiho Lee, Meejeong Lee, Sangho Lee, Seoungsoo Park, Hwanseung Yong, "Component-Based Knowledge Engineering Architecture," The Journal of Object-Oriented Programming, Vol. 12, No. 6, pp. 40-48, Oct. 1999. (SCI 저널)

[3]

Eunkyeong Kwon, Yonggu Cho and Kijoon Chae, "Security Enhancement on Mobile Commerce," The Human Society and the Internet, Lecture Notes in Computer Science (LNCS) 2105, pp. 164-176, Jul. 2001. (SCI 저널)

[4]

Jiyoung Lim, Kijoon Chae, "Flow Admission Control for MPLS Support of DiffServ," The 16th International Conference on Information Networking(ICOIN-16), Lecture Notes in Computer Science (LNCS) 2343, pp. 480-493, Jan-Feb. 2002.

[5]

Won Kim, Kijoon Chae, Dongsub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meesjeong Lee, Sangho Lee, Seungsoo Park, Hwanseung Yong, "The Chamois Component-Based Knowledge Engineering Framework," IEEE COMPUTER MAGAZINE, Vol. 35, No. 5, pp. 46-54, May. 2002. (SCI 저널)

[6]

Won Kim, Kijoon Chae, Dongsub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, KiHo Lee, Meejeong Lee, Sangho Lee, Seungsoo Park, Hwanseung Yong, Hosook Kim, Jungwon Lee, Wolyoung Lee, "The Chamois Reconfigurable Data-Mining Architecture," Journal of Object Technology, Vol. 1, No. 2, July-Aug. 2002.

[7]

Kijoon Chae, Jiyoung Lim, Youngsu Kim, Jungchan Na, "Design of Security Enforcement Engine for Active Nodes in Active Networks," ICOIN 2003, LNCS 2662, pp.346-356, Feb. 2003.

[8]

Jungmin Park, Eunhui Bae, Hyejin Pyeon, Kijoon Chae, "A Ticket-based AAA Security Mechanism in Mobile IP Network," ICCSA 2003(International Conference on Computational Science and Its Applications), LNCS 2668, pp. 210-219, May. 2003. (SCIE)

[9]

Jungmin Park, Minjung Jin, Kijoon Chae, "Secure Firewall Traversal in Mobile IP Network," ICCS 2003(International Conference in Computational Science), LNCS 2660, pp. 535-544, Jun. 2003. (SCIE)

[10]

Kijoon Chae, Eunkyeung Kwon, Youngu Cho, "Refundable Electronic Cash for Mobile Commerce," HSI 2003, LNCS 2713, pp. 644-649, Jun. 2003. (SCIE)

[11]

Mihui Kim, Hyunjung Na, Kijoon Chae, Hyochan Bang, Jungchan Na, "A Combined Data Mining Approach for DDoS Attack Detection," ICOIN2004, LNCS 3090, pp. 943-950, Feb. 2004. (SCIE)

[12]

Mihui Kim, Kijoon Chae, "Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents," ICCSA, 2004(International Conference on Computational Science and Its Applications), LNCS 3043, pp. 673-682, May. 2004. (SCIE)

[13]

Mihui Kim, Kijoon Chae, "A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment," ICOIN, 2005, LNCS 3391, pp. 843-852, Feb. 2005. (SCIE)

[14]

Mihui Kim, Eunah Kim, Kijoon Chae, "A scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment," ICCSA 2005(International Conference on Computational Science and Its Applications), LNCS 3480, pp. 591-600, May. 2005. (SCIE)

[15]

Mihui Kim, Soojong Kim, Kijoon Chae, "A Key Pre-distribution and Authentication Mechanism using Regression Model on a NEMO environment," GESTS International Transaction on Computer Science and Engineering, Vol. 9, No. 1, Jun. 2005.

[16]

Mihui Kim, Kijoon Chae, "Detection Architecture of Distributed Denial-of-Service Attacks Using Data Mining and Flow Data," International Journal of Computer Science and Network Security(IJCSNS), Vol. 5, No. 8, Aug. 2005.

[17]

Hayoung Oh, Hyokyung Bahn, Kijoon Chae, "An Energy-Efficient Sensor Routing Scheme for Home Automation Networks," IEEE Transactions on Consumer Electronics, Vol. 51, No. 3, pp. 836-839, Aug. 2005. (SCI)

[18]

Inshil Doh, Kijoon Chae, "Key Establishment and Authentication Mechanism for Secure Sensor Networks," APWEB 2006, LNCS 3842, pp. 335-344, Jan. 2006. (SCIE)

[19]

Inshil Doh, Kijoon Chae, Howon Kim, and Kyoil Chung, "Security Enhancement Mechanism for Ad-hoc OLSR protocol," ICOIN 2006, LNCS 3961, Jan. 2006. (SCIE)

[20]

Mihui Kim, Kijoon Chae, "Overlapped Detection via Approximate Entropy Estimation against Flooding Attack in Mobile Sensor Networks," ICCS 2006 (International Conference in Computational Science), LNCS3992, pp. 1024~1032, May. 2006. (SCIE)

[21]

Myungjin Lee, Hyokyung Bahn, and Kijoon Chae, "A New Key Management Scheme for Distributed Encrypted Storage Systems," ICCSA 2006, LNCS 3980, pp. 1072~1079, May. 2006. (SCIE)

[22]

Hayoung Oh, Jiyoung Lim, Kijoon Chae, Jungchan Na, "Home Gateway with Automated Rael-Time Intrusion Detection for Secure Home networks," ICCSA 2006, LNCS 3983, May. 2006.(SCIE)

[23]

Mihui Kim, Kijoon Chae, "Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment," IEICE Trans. Fundamentals, Vol. E89-A, No. 7, Jul. 2006. (SCIE)

[24]

Mihui Kim, Inshil Doh, Kijoon Chae, "A Key Management based on Multiple Regression in Hierarchical Sensor Network," WISA 2006, LNCS 4298, pp. 267-281, Aug. 2006.

[25]

Inshil Doh, Jung-Min Park, Kijoon Chae, "Pairwise key setup and authentication utilizing deployment information for secure sensor network," HPCC 2006, LNCS 4208, Sep.2006. (SCIE)

[26]

Inshil Doh, Kijoon Chae, "A secure and efficient routing and aggregation mechanism for sensor networks," International Journal of Computer Science and Network Security(IJCSNS), Vol. 6, No. 12, Dec. 2006.

[27]

Mihui Kim, Jaewon Seo, Kijoon Chae, "Integrated Notification Architecture based on Overlay against DDos Attacks on Convergence Networks," IFIP Workshop on Software Technologies for Future Embedded & Ubiquitous System (SEUS) LNCS 4761, pp. 466-476, May. 2007. (SCIE)

[28]

Hayoung Oh, Kijoon Chae, "An Energy-Efficient Sensor Routing with low latency, scalability for Smart Home Networks," International Journal of Smart Home, Vol. 1, No. 2, Jul. 2007.

[29]

Hayoung Oh, Inshil Doh, Kijoon Chae, "Attack Classification Based On Data Mining Technique And Its Application For Reliable Medical Sensor Communication," International Journal of Computer Science and Applications, Vol. 6, No. 3, Jun. 2009.

[30]

Hayoung Oh, Inshil Doh, Kijoon Chae, "A Fault Management And Moniroting Mechanism For Secure Medical Sensor Network," International Journal of Computer Science and Applications, Vol. 6, No. 3, Jun. 2009.

[31]

Kyung Choi, Mi-hui Kim, Ki-Joon Chae, Jong-Jun Park, Seong-Soon Joo, "An Efficient Data Fusion and Assurance Mechanism using Temporal and Spatial Correlations for Home Automation Networks", IEEE Transactions on Consumer Electronics, Vol. 55, No. 3, pp. 1330-1336, Aug. 2009. (SCI)

[32]

Mihui Kim, Kijoon Chae, "DMP: Detouring using Multiple Paths against Jamming Attack for Ubiquitous Networking System," MDPI's Sensors, Vol. 10, No. 4, pp. 3626-3640, April. 2010. (SCIE)

[33]

Mihui Kim, Yukyoung Jung, Kijoon Chae, "Adaptive Data Mining Approach for Flow Redirection in Multihomed mobile Router," International Journal of Information Technology & Decision Making, Sep. 2010. (SCIE)

[34]

Inshil Doh, Jiyoung Lim, Kijoon Chae, "Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks," Mobile Information Systems 7, pp. 189-200, Aug. 2011. (SCIE)

[35]

Kyung Choi, Xinyi Chen, Shi Li, Mihui Kim, Kijoon Chae, JungChan Na, "Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid," MDPI-Energies, Vol. 5, No. 10, pp. 4091-4109, Oct. 2012. (SCIE)

[36]

Kyung Choi, Mihui Kim, Kijoon Chae, "Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks", International Journal of Distributed Sensor Networks, Vol. 2013, pp. 1-8, Jun. 2013. (SCIE)

[37]

Yunjeong Chio, Inshil Doh, Seung-Soo Park, Kijoon Chae, "Security Based Semantic Context Awareness System for M2M Ubiquitous Healthcare Service," Ubiquitous Information Technologies and Applications, Lecture Notes in Electrical Engineering, Vol.214, pp. 187-196, Jan. 2013. (SCI)

[38]

Inshil Doh, Jiyoung Lim, Kijoon Chae, "Key management approach for secure mobile open IPTV service," Computer Science & Information Systems, Vol.10, Issue 2, pp. 843-864, April. 2013. (SCIE)

[39]

Jun Suk Kim, Bum-Gon Choi, Sueng Jae Bae, Inshil Doh, Min Young Chung, "Adaptive time division duplexing configuration mode selection mechanism for accommodating asymmetric traffic in time division long term evolution-advanced systems," TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, VOL 10-2, 843-864, May. 2013 (SCIE)

[40]

Inshil Doh, Jiyoung Lim, Kijoon Chae, "Code updates based on minimal backbone and group key management for secure sensor networks," Mathematical and Computer Modelling, Vol.57, Issue 11-12, pp. 2801-2813, Jun. 2013. (SCIE)

[41]

Xinyi Chen, Inshil Doh, Kijoon Chae, "User Authentication Mechanism based on Secure Positioning System in RFID Communication," Ubiquitous Information Technologies and Applications, LNEE 280, pp. 683-690, Jan. 2014. (SCOPUS)

[42]

Jung-Min Park, Inshil Doh, Kijoon Chae, "Secure U-Healthcare Service based on Wireless Sensor Network," iNFORMATION: An International Interdisciplinary Journal, Vol.17, No.1, pp. 181-195, Jan. 2014. (SCOPUS)

[43]

Yunjeong Choi and Inshil Doh,"Hierarchical Aggregation of Uncertain Sensor Data for M2M Wireless Sensor Network Using Reinforcement Learning," International Journal of Distributed Sensor Networks, Volume 2014, Article ID 535707, May. 2014 (SCIE)

[44]

Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae, "Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication," Computer Science and Information Systems, Vol.11, No.3, pp.1071-1090, Aug. 2014. (SCIE)

[45]

Shi Li, Kyung Choi, Kijoon Chae, "OCPM: Ortho code privacy mechanism in smart grid using ring communication architecture," Ad Hoc Networks, Vol.22, No.9, pp. 93-108, Nov. 2014. (SCIE)

[46]

Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young, "Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security," Intelligent Automation &Soft Computing, Vol.21, Issue 4, pp. 543-558, Jun. 2015. (SCIE)

[47]

Bum-Gon Choi, Inshil Doh, and Min Young Chung,"Radio Resource Management Scheme for Relieving Interference to MUEs in Relay-Based Cellular Networks," IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, Volume 64 No.7, pp. 3018-3029, July. 2015 (SCI)

[48]

Jiyoung Lim, Inshil Doh, Kijoon Chae, "Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system," Soft Computing, Vol.20, No.5 pp.1829–1840, May 2016 (SCIE)

[49]

Jiyoung Lim, Inshil Doh, Kijoon Chae, "Secure and structured IoT smart grid system management," International Journal of Web and Grid Services, Vol.13, No.2, pp. 170-185 April. 2017 (SCIE)

[50]

Shi Li, Inshil Doh, Kijoon Chae, "NRIT: Non-Redundant Indirect Trust Search Algorithm for a Cross-Domain based CDNi-P2P Architecture," ICACT Transactions on Advanced Communications Technology, Vol. 6, No.2, pp. 992-998, Mar 2017. (SCOPUS)

[51]

Nishat Mowla, Inshil Doh, Kijoon Chae, "Evolving Neural Network Intrusion Detection

System for MCPS," ICACT Transactions on Advanced Communications Technology, Vol. 6, No. 4, pp. 1040-1045, July 2017. (SCOPUS)

[52]

Jiyoung Lim, Inshil Doh, Kijoon Chae, "Lightweight Authentication for Distributed Mobile P2P Communications," Advances in Intelligent Systems and Computing, Volume 612, pp. 580 - 589, July 2017(SCOPUS).

[53]

Xinyi Chen, Kyung Choi, Kijoon Chae, "A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service," Wireless Personal Communications, Volume 97, No 1, pp 1–17, Nov 2017(SCIE).

[54]

Nishat I Mowla, Inshil Doh, Kijoon Chae, "CSDSM: Cognitive Switch-based DDoS Sensing and Mitigation in SDN-driven CDNi Word," Computer Science and Information Systems, Vol. 15, No. 1, pp.163-185, Jan 2018(SCIE).

[55]

Nishat I Mowla, Inshil Doh, Kijoon Chae, "SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System," ICACT Transactions on Advanced Communications Technology, Vol. 7, No. 5, pp.1153-1158, September 2018. (SCOPUS)

[56]

Nishat I Mowla, Inshil Doh, Kijoon Chae, "On-Device AI-based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System," IEEE Access, Vol. 7, No. 1, pp.2126-2137, Jan 2019(SCIE).

[57]

Nishat I Mowla, Nguyen H. Tran, Inshil Doh, Kijoon Chae, "Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network," IEEE Access, Vol. 8, No. 1, pp.4338-4350, Jan 2020 (SCIE).

[58]

Nishat I Mowla, Nguyen H. Tran, Inshil Doh, Kijoon Chae, "AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET," in Journal of Communications and Networks, Vol. 22, No. 3, pp. 244-258, June 2020(SCIE).

[59]

Dana Yang, Seohee Yoo, Inshil Doh, Kijoon Chae, "Selective blockchain system for secure and efficient D2D communication,"  in Journal of Network and Computer Applications, Vol. 173, 102817, Jan 2021 (SCIE).

[60]

Gabin Heo, Dana Yang, Inshil Doh, Kijoon Chae, "Efficient and Secure Blockchain System for Digital Content Trading," IEEE Access, Vol. 9, No. 1, pp.77438-77450, May 2021 (SCIE).

[61]

Gabin Heo, Kijoon Chae, Inshil Doh, "Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing," IEEE Access, Vol. 10, No. 1, pp.27990-28003, Mar. 2022. (SCIE).

[62]

Dana Yang, Inshil Doh, Kijoon Chae, "Cell Based Raft Algorithm for Optimized Consensus Process on Blockchain in Smart Data Market," IEEE Access, Vol. 10, pp.85199-85212, Aug. 2022. (SCIE).

국외전문학술지

  • >
  • Publication >
  • 국외전문학술지