Search

Your search keyword '"Seung Yeob Nam"' showing total 69 results

Search Constraints

Start Over You searched for: Author "Seung Yeob Nam" Remove constraint Author: "Seung Yeob Nam" Search Limiters Full Text Remove constraint Search Limiters: Full Text
69 results on '"Seung Yeob Nam"'

Search Results

1. A Novel IDS Based on Jaya Optimizer and Smote-ENN for Cyberattacks Detection

2. Implementation of Grover’s Iterator for Quantum Searching With an Arbitrary Number of Qubits

3. Transfer Learning-Based Intrusion Detection System for a Controller Area Network

4. Quantum Program Synthesis Through Operator Learning and Selection

5. Event Message Clustering Algorithm for Selection of Majority Message in VANETs

6. Program Synthesis Through Learning the Input-Output Behavior of Commands

7. Challenges, Issues, and Recommendations for Blockchain- and Cloud-Based Automotive Insurance Systems

8. A new type of blockchain for secure message exchange in VANET

9. Regional Blockchain for Vehicular Networks to Prevent 51% Attacks

10. Smart Roads for Autonomous Accident Detection and Warnings

11. A Dynamic Decision Support System for Selection of Cloud Storage Provider

12. A Robust Trust Establishment Scheme for Wireless Sensor Networks

13. Unmanned aerial vehicle localization using distributed sensors

14. A Secure Trust Establishment Scheme for Wireless Sensor Networks

15. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

16. An Analytical Approach to Opportunistic Transmission under Rayleigh Fading Channels

17. A Cross-Layer-Based Routing Protocol for Ad Hoc Cognitive Radio Networks

18. Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability

19. A new type of blockchain for secure message exchange in VANET

20. Regional Blockchain for Vehicular Networks to Prevent 51% Attacks

21. Channel-Hopping-Based Jamming Mitigation in Wireless LAN Considering Throughput and Fairness

22. Challenges of Future VANET and Cloud-Based Approaches

23. A spare bandwidth sharing scheme based on network reliability

24. Trustworthy Event-Information Dissemination in Vehicular Ad Hoc Networks

25. Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain

27. Evolution of V2X Communication and Integration of Blockchain for Security Enhancements

28. Unmanned aerial vehicle localization using distributed sensors

29. Access point selection mechanism to circumvent rogue access points using voting‐based query procedure

30. Analysis of Channel Access Delay in CR-MAC Protocol for Ad Hoc Cognitive Radio Wireless Sensor Networks without a Common Control Channel

31. Estimation of the available bandwidth ratio of a remote link or path segments

32. Adaptive Window Size-Based Medium Access Control Protocol for Cognitive Radio Wireless Sensor Networks

33. Estimation of available bandwidth for an M/G/1 queueing system

34. Measurement-Based Admission Control at Edge Routers

35. A Robust Trust Establishment Scheme for Wireless Sensor Networks

36. A Spare Bandwidth Sharing Scheme Based on Network Reliability

37. Analysis of a Mobility Management Scheme Considering Battery Power Conservation in IP-Based Mobile Networks

38. Performance analysis of an enhanced DQRUMA/MC-CDMA protocol for voice traffic

39. Rendezvous Issues in AD Hoc Cognitive Radio Networks

41. Probing-Based Estimation of End-to-End Available Bandwidth

42. Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN

43. An Analytical Approach to Opportunistic Transmission under Rayleigh Fading Channels

44. Trustworthy Event-Information Dissemination in Vehicular Ad Hoc Networks.

45. A Robust Trust Establishment Scheme for Wireless Sensor Networks.

46. A Distributed Medium Access Control Protocol for Cognitive Radio Ad Hoc Networks.

47. Rendezvous Issues in AD Hoc Cognitive Radio Networks.

48. Analysis of Channel Access Delay in CR-MAC Protocol for Ad Hoc Cognitive Radio Wireless Sensor Networks without a Common Control Channel.

49. A Secure Trust Establishment Scheme for Wireless Sensor Networks.

50. Fast convolution approximation scheme for estimating end-to-end delay performance

Catalog

Books, media, physical & digital resources