PacketScore: Statistics-based overload control against distributed denial-of-service attacks Y Kim, WC Lau, MC Chuah, HJ Chao IEEE INFOCOM 2004 4, 2594-2604, 2004 | 239 | 2004 |
A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks Y Kim, WC Lau, MC Chuah, HJ Chao IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 3 (2), 0141-155, 2006 | 230 | 2006 |
EEMC: An energy-efficient multi-level clustering algorithm for large-scale wireless sensor networks Y Jin, L Wang, Y Kim, X Yang Computer networks 52 (3), 542-562, 2008 | 195 | 2008 |
Method and apparatus for information delivery on the internet Y Kim, D Chung US Patent App. 09/940,923, 2002 | 167 | 2002 |
Distributed architecture for statistical overload control against distributed denial of service attacks HHJ Chao, MC Chuah, Y Kim, WC Lau US Patent 7,526,807, 2009 | 139 | 2009 |
Implementation of detection and tracking mechanism for small UAS SR Ganti, Y Kim 2016 International Conference on Unmanned Aircraft Systems (ICUAS), 1254-1260, 2016 | 137 | 2016 |
Performance analysis of error control codes for wireless sensor networks G Balakrishnan, M Yang, Y Jiang, Y Kim Fourth international conference on information technology (ITNG'07), 876-879, 2007 | 137 | 2007 |
An agile manufacturing workcell design RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ... IIE transactions 29 (10), 901-909, 1997 | 94 | 1997 |
A survey on IoT communication and computation frameworks: An industrial perspective S Tayeb, S Latifi, Y Kim 2017 IEEE 7th annual Computing and Communication Workshop and Conference …, 2017 | 84 | 2017 |
Implementation and comparison of M2M protocols for Internet of Things P Thota, Y Kim 2016 4th Intl Conf on Applied Computing and Information Technology/3rd Intl …, 2016 | 70 | 2016 |
EECCR: An energy-efficient-coverage and-connectivity routing algorithm under border effects in heterogeneous sensor networks Y Jin, L Wang, JY Jo, Y Kim, M Yang, Y Jiang IEEE Transactions on Vehicular Technology 58 (3), 1429-1442, 2009 | 60 | 2009 |
SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography Y Kim, W Ren, JY Jo, M Yang, Y Jiang, J Zheng 2007 IEEE International Conference on Communications, 1570-1575, 2007 | 58 | 2007 |
Design of an agile manufacturing workcell for light mechanical applications RD Quinn, GC Causey, FL Merat, DM Sargent, NA Barendt, WS Newman, ... Proceedings of IEEE international conference on robotics and automation 1 …, 1996 | 55 | 1996 |
Design lessons for building agile manufacturing systems WS Newman, A Podgurski, RD Quinn, FL Merat, MS Branicky, NA Barendt, ... IEEE Transactions on Robotics and Automation 16 (3), 228-238, 2000 | 53 | 2000 |
ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks Y Jin, JY Jo, L Wang, Y Kim, X Yang Computer Communications 31 (10), 2398-2407, 2008 | 48 | 2008 |
ADS-B vulnerabilities and a security solution with a timestamp Y Kim, JY Jo, S Lee IEEE Aerospace and Electronic Systems Magazine 32 (11), 52-61, 2017 | 47 | 2017 |
Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications R Harkanson, Y Kim Proceedings of the 12th annual conference on cyber and information security …, 2017 | 45 | 2017 |
A framework for environmental monitoring with Arduino-based sensors using Restful web service S Lee, J Jo, Y Kim, H Stephen 2014 IEEE International Conference on Services Computing, 275-282, 2014 | 41 | 2014 |
Defeating distributed denial-of-service attack with deterministic bit marking Y Kim, JY Jo, FL Merat GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 41 | 2003 |
Internet traffic load balancing using dynamic hashing with flow volume JY Jo, Y Kim, HJ Chao, FL Merat Internet Performance and Control of Network Systems III 4865, 154-165, 2002 | 41 | 2002 |