default search action
Tae Ho Cho
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j33]Jung Sub Ahn, Tae Ho Cho:
Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks. IEEE Access 10: 119232-119243 (2022) - 2020
- [j32]Su Man Nam, Tae Ho Cho:
Discrete event simulation-based energy efficient path determination scheme for probabilistic voting-based filtering scheme in sensor networks. Int. J. Distributed Sens. Networks 16(8): 155014772094913 (2020) - [j31]Tae Ho Cho:
Simulation Methodology-Based Context-Aware Architecture Design for Behavior Monitoring of Systems. Symmetry 12(9): 1568 (2020)
2010 – 2019
- 2019
- [c42]Kyoung A. Kim, Tae Ho Cho:
Multipath Selection Method for En-route Filtering in Dynamic Wireless Sensor Network. ICEIC 2019: 1-8 - 2018
- [j30]Muhammad Khuram Shahzad, Tae Ho Cho:
PKSM: Pre-key Distribution and Sink Mobility in Commutative Cipher Based En-route Filtering to Extend the Network Lifetime in WSNs. Ad Hoc Sens. Wirel. Networks 42(1-2): 19-33 (2018) - [j29]Jae Kwan Lee, Tae Ho Cho:
A Fuzzy Rule-Based Key Redistribution Method for Improving Security in Wireless Sensor Networks. IEICE Trans. Commun. 101-B(2): 489-499 (2018) - 2017
- [j28]Muhammad Khuram Shahzad, Tae Ho Cho:
A Network Density-adaptive Improved CCEF Scheme for Enhanced Network Lifetime, Energy Efficiency, and Filtering in WSNs. Ad Hoc Sens. Wirel. Networks 35(1-2): 129-149 (2017) - [j27]Muhammad Akram, Tae Ho Cho:
Energy Efficient Fuzzy Adaptive Verification Node Selection-Based Path Determination in Wireless Sensor Networks. Symmetry 9(10): 220 (2017) - [j26]Su Man Nam, Tae Ho Cho:
Context-Aware Architecture for Probabilistic Voting-based Filtering Scheme in Sensor Networks. IEEE Trans. Mob. Comput. 16(10): 2751-2763 (2017) - 2016
- [j25]Muhammad Akram, Tae Ho Cho:
Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks. Ad Hoc Networks 47: 16-25 (2016) - 2015
- [j24]Su Man Nam, Tae Ho Cho:
A fuzzy rule-based path configuration method for LEAP in sensor networks. Ad Hoc Networks 31: 63-79 (2015) - [j23]Muhammad Khuram Shahzad, Tae Ho Cho:
Extending the network lifetime by pre-deterministic key distribution in CCEF in wireless sensor networks. Wirel. Networks 21(8): 2799-2809 (2015) - [c41]Su Man Nam, Tae Ho Cho:
A Method to Select Next Hop Node for Improving Energy Efficiency in LEAP-Based WSNs. ICIC (1) 2015: 639-648 - 2014
- [c40]Su Man Nam, Tae Ho Cho:
Improvement of energy consumption and detection power for PVFS in wireless sensor networks. ICMU 2014: 129-134 - 2013
- [j22]Jin Myoung Kim, Tae Ho Cho:
Location-Based Key Management Structure for Secure Group Communication in Wireless Sensor Networks. IEICE Trans. Commun. 96-B(9): 2183-2189 (2013) - 2012
- [j21]Soo Young Moon, Tae Ho Cho:
Key Index-Based Routing for Filtering False Event Reports in Wireless Sensor Networks. IEICE Trans. Commun. 95-B(9): 2807-2814 (2012) - [c39]Soo Young Moon, Tae Ho Cho:
Energy Efficient Filtering Nodes Assignment Method for Sensor Networks Using Fuzzy Logic. ICIC (1) 2012: 293-300 - [c38]Su Man Nam, Tae Ho Cho:
A Method for the Enhancement of the Detection Power and Energy Savings against False Data Injection Attacks in Wireless Sensor Networks. ICIC (1) 2012: 547-554 - 2011
- [j20]Hae Young Lee, Tae Ho Cho:
Optimized Fuzzy Adaptive Filtering for Ubiquitous Sensor Networks. IEICE Trans. Commun. 94-B(6): 1648-1656 (2011) - [j19]Jin Myoung Kim, Youngshin Han, Hae Young Lee, Tae Ho Cho:
Path Renewal Method in Filtering Based Wireless Sensor Networks. Sensors 11(2): 1396-1404 (2011) - [c37]Jin Myoung Kim, Tae Ho Cho:
A* Based Cutting Plan Generation for Metal Grating Production. ACIIDS (2) 2011: 402-410 - [c36]Byung Hee Kim, Tae Ho Cho:
Key Distribution Method for Enhancing Secure Performances in Dynamic Filtering-Based Wireless Sensor Network. FGIT-CA/CES3 2011: 220-226 - [c35]Jin Myoung Kim, Hae Young Lee, Ingeol Chun, Wontae Kim, Seung-Min Park, Tae Ho Cho:
Location Based Hierarchical Secure Multicast Group Building in Wireless Sensor Networks. MUE 2011: 28-32 - [c34]Chung Il Sun, Tae Ho Cho:
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs. WISA 2011: 232-241 - 2010
- [j18]Thao P. Nghiem, Tae Ho Cho:
A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks. Comput. Commun. 33(10): 1202-1209 (2010) - [j17]Hae Young Lee, Tae Ho Cho:
A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks. IEICE Trans. Commun. 93-B(7): 1881-1889 (2010) - [j16]Hae Young Lee, Seung-Min Park, Tae Ho Cho:
Simulation Modeling of SAM Fuzzy Logic Controllers. IEICE Trans. Inf. Syst. 93-D(7): 1984-1986 (2010) - [j15]Sang Jin Lee, Hae Young Lee, Tae Ho Cho:
Environment-based Selection Method for En-route Filtering Scheme using Fuzzy Logic. J. Networks 5(3): 292-299 (2010) - [c33]Sun Ho Lee, Tae Ho Cho:
Fuzzy Based Key Re-distribution Period Determination Method in Wireless Sensor Networks. ICIC (2) 2010: 495-502 - [c32]Jong Hyun Kim, Tae Ho Cho:
Efficient Key Dissemination Method Using Fuzzy Logic Based Dynamic En-route Filtering. ICIC (2) 2010: 511-518 - [c31]Hae Young Lee, Tae Ho Cho, Hyung-Jong Kim:
Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks. ISA 2010: 128-137
2000 – 2009
- 2009
- [j14]Hae Young Lee, Tae Ho Cho:
Fuzzy-Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks. IEICE Trans. Inf. Syst. 92-D(8): 1574-1576 (2009) - [j13]Chung Il Sun, Hae Young Lee, Tae Ho Cho:
A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks. J. Inf. Sci. Eng. 25(4): 1163-1175 (2009) - [j12]Thao P. Nghiem, Tae Ho Cho:
A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks. J. Parallel Distributed Comput. 69(5): 441-450 (2009) - [c30]Hyeon Myeong Choi, Tae Ho Cho:
Energy Efficient MAC Length Determination Method for Statistical En-Route Filtering Using Fuzzy Logic. ICIC (1) 2009: 686-695 - [c29]Thao P. Nghiem, Jong Hyun Kim, Sun Ho Lee, Tae Ho Cho:
A Coverage and Energy Aware Cluster-Head Selection Algorithm in Wireless Sensor Networks. ICIC (1) 2009: 696-705 - [c28]Soo Young Moon, Tae Ho Cho:
Energy efficient filtering method in sensor networks. ICUIMC 2009: 580-585 - [c27]Sang Jin Lee, Hae Young Lee, Tae Ho Cho:
Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. ICUIMC 2009: 597-601 - 2008
- [j11]Hae Young Lee, Tae Ho Cho:
A* -based layout design for gratings allocation. Comput. Aided Des. 40(4): 455-464 (2008) - [j10]Jin Myoung Kim, Tae Ho Cho:
A*-based key tree structure generation for group key management in wireless sensor networks. Comput. Commun. 31(10): 2414-2419 (2008) - [j9]Sang Ryul Kim, Hae Young Lee, Tae Ho Cho:
Fuzzy Adaptive Partitioning Method for the Statistical Filtering. IEICE Trans. Inf. Syst. 91-D(7): 2065-2067 (2008) - [c26]Byung Hee Kim, Tae Ho Cho:
Selective Sensor Node Selection Method for Making Suitable Cluster in Filtering-Based Sensor Networks. ICIC (1) 2008: 636-643 - [c25]Hae Young Lee, Tae Ho Cho:
A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic. ICIC (1) 2008: 1234-1241 - [c24]Byung Hee Kim, Tae Ho Cho:
Efficient selection method of message authentication codes for filtering scheme in sensor networks. ICUIMC 2008: 511-514 - 2007
- [j8]Mun Su Kim, Tae Ho Cho:
A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks. IEICE Trans. Inf. Syst. 90-D(12): 2108-2109 (2007) - [j7]Hae Young Lee, Tae Ho Cho:
Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks. IEICE Trans. Commun. 90-B(12): 3346-3353 (2007) - [j6]Byung Hee Kim, Hae Young Lee, Tae Ho Cho:
Fuzzy Rule-Based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks. Int. J. Inf. Acquis. 4(3): 273-280 (2007) - [j5]Mun Su Kim, Tae Ho Cho:
An en-Route Filtering Method in Sensor Networks Using Decision Function. Int. J. Inf. Acquis. 4(4): 357-364 (2007) - [c23]Hae Young Lee, Tae Ho Cho:
Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks. ICCSA (2) 2007: 573-583 - [c22]Jin Myoung Kim, Tae Ho Cho:
Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function. ICCSA (3) 2007: 637-648 - [c21]Mun Su Kim, Tae Ho Cho:
A Fuzzy-Based En-Route Filtering Scheme in Sensor Networks. ICIC (1) 2007: 230-239 - [c20]Byung Hee Kim, Hae Young Lee, Tae Ho Cho:
Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks. ICIC (1) 2007: 263-272 - [c19]Jin Myoung Kim, Tae Ho Cho:
Genetic Algorithm Based Routing Method for Efficient Data Transmission in Sensor Networks. ICIC (1) 2007: 273-282 - [c18]Hae Young Lee, Tae Ho Cho:
Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks. IEA/AIE 2007: 64-73 - [c17]Hae Young Lee, Tae Ho Cho:
Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. UIC 2007: 535-544 - 2006
- [c16]Sang Hoon Chi, Tae Ho Cho:
Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks. FSKD 2006: 725-734 - [c15]Sang Hoon Chi, Tae Ho Cho:
Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks. ICCSA (4) 2006: 58-67 - [c14]Hae Young Lee, Tae Ho Cho:
Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. ICDCIT 2006: 116-127 - [c13]Mi Ra Yi, Jihyun Hong, Tae Ho Cho:
Genetic Algorithms for Improving Material Utilization in Manufacturing. ICIC (1) 2006: 717-724 - [c12]Hae Young Lee, Tae Ho Cho:
Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks. MICAI 2006: 112-121 - 2005
- [c11]Hee Suk Seo, Tae Ho Cho:
Application of Fuzzy Logic for Distributed Intrusion Detection. CIS (2) 2005: 340-347 - [c10]Seung-Beom Baeg, Tae Ho Cho:
Transmission Relay Method for Balanced Energy Depletion in Wireless Sensor Networks Using Fuzzy Logic. FSKD (2) 2005: 998-1007 - 2004
- [c9]Mi Ra Yi, Tae Ho Cho:
Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System. AIS 2004: 71-80 - [c8]Won Young Lee, Hee Suk Seo, Tae Ho Cho:
Modeling of Policy-Based Network with SVDB. AIS 2004: 323-332 - [c7]HyungJong Kim, Joonmo Kim, Kang Shin Lee, Hongsub Lee, Tae Ho Cho:
Simulation-Based Security Testing for Continuity of Essential Service. ICCSA (1) 2004: 567-576 - [c6]Hee Suk Seo, Tae Ho Cho:
Distributed Security Agent Modeling in the Policy-Based Networking. PDCAT 2004: 782-786 - 2003
- [j4]Mi Ra Yi, Tae Ho Cho:
Hierarchical simulation model with animation. Eng. Comput. 19(2-3): 203-212 (2003) - [j3]H. S. Seo, Tae Ho Cho:
An application of blackboard architecture for the coordination among the security systems. Simul. Model. Pract. Theory 11(3-4): 269-284 (2003) - [j2]Hee Suk Seo, Tae Ho Cho:
Simulation Model Design of a Security System Based on a Policy-Based Framework. Simul. 79(9): 515-527 (2003) - [c5]Hee Suk Seo, Tae Ho Cho, Sung-Do Chi:
Modeling and Simulation of Distributed Security Models. International Conference on Computational Science 2003: 809-818 - 2002
- [j1]Tae Ho Cho:
Embedding Intelligent Planning Capability to DEVS Models by Goal Regression Method. Simul. 78(12): 716-730 (2002) - [c4]Hee Suk Seo, Tae Ho Cho:
Modeling and Simulation for Detecting a Distributed Denial of Service Attack. Australian Joint Conference on Artificial Intelligence 2002: 179-190 - [c3]Jong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim:
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies. ICICS 2002: 374-385 - 2001
- [c2]Hee Suk Seo, Tae Ho Cho:
Simulation of Network Security with Collaboration among IDS Models. Australian Joint Conference on Artificial Intelligence 2001: 438-448 - [c1]Mi Ra Yi, Tae Ho Cho:
Hierarchical Simulation Model with Animation for Large Network Security. ICICS 2001: 456-460
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint