default search action
Keecheon Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c77]Jin Li, Min Wei, Chengjie Huo, Keecheon Kim:
A Time-Sensitive Networking Traffic Scheduling Method Based on Q-Learning Routing Optimization. IMCOM 2024: 1-6 - 2022
- [j11]Keecheon Kim:
Enhancing Reinforcement Learning Performance in Delayed Reward System Using DQN and Heuristics. IEEE Access 10: 50641-50650 (2022) - 2020
- [j10]Jungha Jin, Keecheon Kim:
3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based. IEEE Access 8: 33689-33702 (2020) - [j9]Tackhyun Jung, Sangwon Kim, Keecheon Kim:
DeepVision: Deepfakes Detection Using Human Eye Blinking Pattern. IEEE Access 8: 83144-83154 (2020) - [c76]Sangwon Kim, Thummin Lee, Keecheon Kim:
Research on the traffic type recognition technique for advanced network control using Floodlight. IMCOM 2020: 1-6
2010 – 2019
- 2019
- [c75]Woojin Shim, Keecheon Kim:
A Study on Communication Optimization in Multi-SDN Controller. ICOIN 2019: 461-464 - [c74]Thummim Lee, Sangwon Kim, Keecheon Kim:
A Research on the Vulnerabilities of PLC using Search Engine. ICTC 2019: 184-188 - [c73]Jun-Tae Kim, Sangwon Kim, Keecheon Kim:
A Study on Improved JPEG Steganography Algorithm to Prevent Steganalysis. ICTC 2019: 960-963 - [c72]Seonggwan Ahn, Thummin Lee, Keecheon Kim:
A Study on Improving Security of ICS through Honeypot and ARP Spoofing. ICTC 2019: 964-967 - [c71]Yewon Oh, Keecheon Kim:
Development of Sublayer Network State Inference Technology Based on Protocol State Dynamic Extraction for Improved Web Environment. IMCOM 2019: 54-61 - [c70]Min Wei, Xu Yang, Jiuchao Mao, Keecheon Kim:
Secure Framework and Security Mechanism for Edge Nodes in Industrial Internet. IMCOM 2019: 254-266 - [c69]Sun-young Park, Keecheon Kim:
An Approach to Defense Dictionary Attack with Message Digest Using Image Salt. IMCOM 2019: 769-777 - 2018
- [j8]Min Wei, Shuaidong Zhang, Ping Wang, Keecheon Kim:
An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things. Int. J. Distributed Sens. Networks 14(1) (2018) - [c68]Sun-young Park, Keecheon Kim:
A study on the processing and reinforcement of message digest through two-dimensional array masking. ICOIN 2018: 540-544 - [c67]Keecheon Kim, Junghyun An, Joseph Yoo:
A design of IL-CyTIS for automated cyber threat detection. ICOIN 2018: 689-693 - [c66]Jun-Tae Kim, Jungha Jin, Keecheon Kim:
A study on an energy-effective and secure consensus algorithm for private blockchain systems (PoM: Proof of Majority). ICTC 2018: 932-935 - [c65]Kiho Nam, Keecheon Kim:
A Study on SDN security enhancement using open source IDS/IPS Suricata. ICTC 2018: 1124-1126 - [c64]Sang Gyun Du, Jong Won Lee, Keecheon Kim:
Proposal of GRPC as a New Northbound API for Application Layer Communication Efficiency in SDN. IMCOM 2018: 68:1-68:6 - [c63]Min Wei, Lian Mo, Yuan Zhuang, Keecheon Kim:
Secure Framework and Key Agreement Mechanism for OPC-UA in Industrial IoT. IMCOM 2018: 71:1-71:6 - 2017
- [c62]Min Wei, Zhen Wang, Keecheon Kim:
An implementation of security mechanism in chip for industrial wireless networks. ICOIN 2017: 265-270 - [c61]Sung-Su Park, Sang Gyun Du, Keecheon Kim:
Application of a HID certificate issue algorithm for strengthening private information security over the V2V environment. ICOIN 2017: 611-615 - [c60]Green Kim, Junghyun An, Keecheon Kim:
A study on authentication mechanism in SEaaS for SDN. IMCOM 2017: 51 - 2016
- [j7]Min Wei, Keecheon Kim:
An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks. Int. J. Distributed Sens. Networks 12(11) (2016) - [j6]Green Kim, Youngse Kim, Ung Heo, Keecheon Kim:
A lightweight authentication mechanism in MIP networks. Secur. Commun. Networks 9(17): 4272-4284 (2016) - [j5]Youngse Kim, Ung Heo, Keecheon Kim:
Improved hash and transmission method for larger packets in the RADIUS protocol. Secur. Commun. Networks 9(18): 4839-4851 (2016) - [c59]Min Wei, Shuaidong Zhang, Keecheon Kim:
A security testing platform for Wireless Sensor Networks. ICOIN 2016: 86-91 - [c58]Mi Young Jo, Keecheon Kim:
A research on the regional routing scheme based mobile agent for SDN. ICOIN 2016: 211-213 - [c57]Green Kim, Keecheon Kim:
A study on the adaptation of the firefly algorithm for the synchronization between multiple controllers in SDN environment. ICOIN 2016: 308-311 - [c56]Woobin Kim, Jungha Jin, Keecheon Kim:
A Routing Protocol Method that sets up Multi-hops in the Ad-hoc network. IMCOM 2016: 70:1-70:6 - [c55]Jonghoon Kim, Jungha Jin, Keecheon Kim:
Multiple Studies Using License Plate Recognition System HD CCTV. iThings/GreenCom/CPSCom/SmartData 2016: 594-597 - 2014
- [j4]Seryvuth Tan, Phearin Sok, Keecheon Kim:
Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. Int. J. Networked Distributed Comput. 2(2): 100-107 (2014) - [c54]Min Wei, Keecheon Kim:
Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks. ICOIN 2014: 131-135 - [c53]Phearin Sok, Keecheon Kim:
PRoPHET routing based on distance mechanism in disruption-tolerant network. ICUIMC 2014: 20:1-20:6 - 2013
- [j3]Jongwan Kim, Dukshin Oh, Keecheon Kim:
QMBRi: Inverse quantization of minimum bounding rectangles for spatial data compression. Comput. Informatics 32(4): 679-696 (2013) - [c52]Seryvuth Tan, Keecheon Kim:
Secure Route Discovery for Preventing Black Hole Attacks on AODV-Based MANETs. HPCC/EUC 2013: 1159-1164 - [c51]Phearin Sok, Seryvuth Tan, Keecheon Kim:
PRoPHET Routing Protocol Based on Neighbor Node Distance Using a Community Mobility Model in Delay Tolerant Networks. HPCC/EUC 2013: 1233-1240 - [c50]Pham Ngoc Thanh, Keecheon Kim:
Implementation of open Two-Factor Authentication service applied to Virtual Private Network. ICOIN 2013: 135-140 - [c49]Phearin Sok, Keecheon Kim:
Distance-based PRoPHET routing protocol in Disruption Tolerant Network. ICTC 2013: 159-164 - [c48]Seryvuth Tan, Keecheon Kim:
Secure Route Discovery for preventing black hole attacks on AODV-based MANETs. ICTC 2013: 1027-1032 - [c47]Pham Ngoc Thanh, Keecheon Kim:
An enhanced mechanism with cryptographic computation cost reduction in AAA-mobile IP architecture. ICUIMC 2013: 106 - 2012
- [j2]Min Wei, Keecheon Kim:
Intrusion detection scheme using traffic prediction for wireless industrial networks. J. Commun. Networks 14(3): 310-318 (2012) - [c46]Min Wei, Keecheon Kim, Ping Wang:
Research on a mutual authentication scheme for wireless sensor networks. ICOIN 2012: 523-528 - [c45]Wei Min, Keecheon Kim, Ping Wang:
A traffic management scheme using multi-channel sniffer for secure wireless networks. ICUIMC 2012: 13:1-13:8 - [c44]Pham Ngoc Thanh, Keecheon Kim:
A methodology for implementation and integration Two-Factor Authentication into VPN. IPCCC 2012: 195-196 - 2011
- [c43]Min Wei, Keecheon Kim, Ping Wang, Jongwon Choe:
Research and implementation on the security scheme of industrial wireless network. ICOIN 2011: 37-42 - [c42]Min Wei, Keecheon Kim, Ping Wang:
A mutual authentication scheme with key agreement for industrial wireless network. ICUIMC 2011: 23 - 2010
- [j1]Jongwan Kim, Dukshin Oh, Keecheon Kim:
Indexing of Tagged Moving Objects over Localized Trajectory with Time Intervals in RFID Systems. IEICE Trans. Inf. Syst. 93-D(9): 2639-2642 (2010)
2000 – 2009
- 2009
- [c41]Shimin Sun, Jonghyun Kim, Yunho Jung, Keecheon Kim:
Zone-based Greedy Perimeter Stateless Routing for VANET. ICOIN 2009: 1-3 - [c40]Jing Liu, Sungchol Cho, Sunyoung Han, Keecheon Kim, Young-Guk Ha, Jongwon Choe, Sinchai Kamolphiwong, Hyunseung Choo, Yongtae Shin, Chinchol Kim:
Establishment and traffic measurement of overlay multicast testbed in KOREN, THaiREN and TEIN2. Mobility Conference 2009 - 2008
- [c39]Jisul Choe, Keecheon Kim:
EADD: Energy Aware Directed Diffusion for Wireless Sensor Networks. ISPA 2008: 779-783 - [c38]Yunho Jung, Keecheon Kim:
Movement Awareness Position-Based Routing Protocol for Intersection of Urban Environment. ISPA 2008: 795-798 - [c37]Jung-Eun Lee, Keecheon Kim:
Diamond-Shaped Routing Method for Reliable Data Transmission in Wireless Sensor Networks. ISPA 2008: 799-801 - 2007
- [c36]Insu Kim, Keecheon Kim:
Secure Fast Handoff Mechanism in Wireless Active Network Environment. ALPIT 2007: 409-413 - [c35]Jiwon Choi, Keecheon Kim:
Single Sign on System Architecture Based on SAML in Web Service Environment Using ENUM System. APNOMS 2007: 547-550 - [c34]Woosin Lee, Hyukjoon Lee, Hyungkeun Lee, Keecheon Kim:
Packet Forwarding Based on Reachability Information for VANETs. ICOIN 2007: 305-314 - [c33]Insu Kim, Keecheon Kim:
Secure Session Management Mechanism in VoIP Service. ISPA Workshops 2007: 96-104 - [c32]Sangmin Lee, Keecheon Kim:
An Effective Local Repair Scheme Using Candidate Node and Hello Message in AODV. ISPA Workshops 2007: 105-114 - [c31]Kwangmo Yang, Keecheon Kim:
A Frame-Based Selective Encryption Method for Real Time Video Transmission on VoIP. ISPA Workshops 2007: 115-122 - 2006
- [c30]Dongkeun Lee, Jaepil Yoo, Keecheon Kim, Kyunglim Kang:
IPv6 Stateless Address Auto-configuration in Mobile Ad-Hoc Network. APWeb Workshops 2006: 360-367 - [c29]Jaepil Yoo, Keecheon Kim:
Dynamic Anchor Based Mobility Management Scheme for Mobile IP Networks. ISPA 2006: 27-38 - [c28]Insu Kim, Keecheon Kim:
Design of Authentication Mechanism Using PANA CTP in FMIPv6 Environment. ISPA Workshops 2006: 1034-1043 - [c27]Jiwon Choi, Keecheon Kim:
Icon-URI Structure with ENUM System for Mobile Device. ISPA Workshops 2006: 1073-1079 - [c26]Sangmin Lee, Keecheon Kim:
An Effective Path Recovery Mechanism for AODV Using Candidate Node. ISPA Workshops 2006: 1117-1125 - [c25]Dongkeun Lee, Jaepil Yoo, Hyunsik Kang, Keecheon Kim, Kyunglim Kang:
Distributed IPv6 addressing technique for mobile ad-hoc networks. SAC 2006: 1156-1160 - [c24]Dongkeun Lee, Keecheon Kim:
Fast IPv6 Address Auto-configuration Using Proxy for Mobile Environment. UCS 2006: 414-427 - [c23]Dongkeun Lee, Keecheon Kim:
Fast IPv6 Addressing Technique for Mobile Ad Hoc Networks. UIC 2006: 280-289 - 2005
- [c22]Keecheon Kim, Dongkeun Lee, Jae Hyeong Ahn, Hyeong Ho Lee:
Hierarchical Route Optimization in Mobile Network and Performance Evaluation. ICESS 2005: 522-532 - [c21]Dongkeun Lee, Jaepil Yoo, Keecheon Kim, Kyunglim Kang:
IPv6 stateless address auto-configuration in mobile ad-hoc network (T-DAD) and performance evaluation. PE-WASUN 2005: 271-272 - 2004
- [c20]Dongkeun Lee, Keecheon Kim, Moonhae Kim:
Hierarchical Route Optimization for Nested Mobile Network. AINA (1) 2004: 225-229 - [c19]Kiyong Park, Sunyoung Han, Bok-Gyu Joo, Keecheon Kim, Jinpyo Hong:
Route Optimization Technique to Support Multicast in Mobile Networks. International Conference on Computational Science 2004: 1185-1192 - [c18]Dongkeun Lee, Keecheon Kim, Sunyoung Han:
Design of Mobile Network Route Optimization Based on the Hierarchical Algorithm. ICCSA (1) 2004: 1115-1124 - [c17]Sungjune Hong, Sunyoung Han, Keecheon Kim, Jinpyo Hong, Kwanho Song:
Personal Service on Application Level Active Network for Ubiquitous Computing Environments. ICOIN 2004: 83-92 - 2003
- [c16]Hojae Hyun, Keecheon Kim, Sunyoung Han:
A Group Key Management Supporting Individual Batch Rekeying and Fault Tolerance for Secure Multicast. International Conference on Computational Science 2003: 485-494 - [c15]Jaepil Yoo, Keecheon Kim, Sunyoung Han:
Independent Zone Setup Scheme for Re-configurable Wireless Network. International Conference on Computational Science 2003: 917-924 - [c14]Sungjune Hong, Keecheon Kim, Sunyoung Han:
Intelligent Fault-Tolerant Web Caching Service on Application Level Active Networks. ICCSA (1) 2003: 144-152 - [c13]Hyunsik Kang, Keecheon Kim:
Design of Mobile IP Extension for Nested Mobile Network. ICCSA (2) 2003: 163-170 - [c12]Jaepil Yoo, Keecheon Kim, Hyunseung Choo, Jaeil Lee, JooSeok Song:
Secure and Scalable Mobile IP Registration Scheme Using PKI. ICCSA (2) 2003: 220-229 - [c11]Juhee Hong, Jungwook Song, Sunyoung Han, Keecheon Kim:
Connection Mechanism Using Agent for Streaming in Multimedia Messaging Service Environment. ICCSA (1) 2003: 761-769 - [c10]Hyunseung Choo, DaeKyu Choi, Keecheon Kim:
Efficient Handover Scheme with Prior Process for Heterogeneous Networking Environment. ICOIN 2003: 436-445 - [c9]Jaepil Yoo, Keecheon Kim:
Independent Zone Setup Scheme for Re-configurable Wireless Network. ICOIN 2003: 643-650 - 2002
- [c8]Jaepil Yoo, Keecheon Kim, Hyunseung Choo:
Cellular Packet Network Supporting Multi-level Hierarchical Regional Registration. CDMA International Conference 2002: 319-328 - [c7]Chinchol Kim, Byounguk Choi, Keecheon Kim, Sunyoung Han:
The Differentiated Call Processing Based on the Simple Priority-Scheduling Algorithm in SIP6. International Conference on Computational Science (1) 2002: 276-285 - [c6]Juhee Hong, Hocheol Sung, Hoyoung Lee, Keecheon Kim, Sunyoung Han:
Workload Scheduler with Fault Tolerance for MMSC. International Conference on Computational Science (1) 2002: 643-652 - [c5]Chinchol Kim, Byounguk Choi, Yichul Kang, Keecheon Kim, Sunyoung Han:
Design and Implementation of the VoIPv6 Supporting the Differentiated Call Processing. ICOIN (1) 2002: 169-179 - [c4]Insu Kim, Keecheon Kim, Sunyoung Han, Hyukjoon Lee:
An Enhanced Mobility Management Mechanism for Active Access Networks. MATA 2002: 83-93 - 2001
- [c3]Hee Yong Youn, Hee-Suk Kim, Hyunseung Choo, Keecheon Kim:
A New Incremental Rerouting for Handoff in Wireless ATM Networks. Human.Society@Internet 2001: 368-382 - [c2]Youngjae Kim, Sungjune Hong, Kiyong Park, Keecheon Kim, Sunyoung Han:
Intelligent Fault-Tolerant CORBA Service on Real-Time CORBA. PRDC 2001: 364-370
1990 – 1999
- 1999
- [c1]Ju-hyun Kwak, Keecheon Kim, Chang-Hoon Lee:
Advanced User Profile Agent Using Structure Analysis of HTML Document. IC-AI 1999: 319-323
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint