Search results for: Yoon-Su Jeong
Wireless Personal Communications > 2019 > 105 > 2 > 405-426
Peer-to-Peer Networking and Applications > 2018 > 11 > 6 > 1186-1196
Cluster Computing > 2019 > 22 > 1 > 1959-1971
Journal of Computer Virology and Hacking Techniques > 2017 > 13 > 4 > 271-278
Wireless Personal Communications > 2018 > 98 > 4 > 3071-3085
Wireless Personal Communications > 2017 > 93 > 1 > 7-19
Cluster Computing > 2017 > 20 > 1 > 539-546
Lecture Notes in Computer Science > Computational Intelligence and Security > Information Processing and Intrusion Detection > 567-575
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Security, Safety and Privacy > 1233-1242
Lecture Notes in Computer Science > Computational Intelligence and Security > Information Processing and Intrusion Detection > 598-604
Communications in Computer and Information Science > Ubiquitous Computing and Multimedia Applications > 331-337
Communications in Computer and Information Science > Advances in Information Security and Its Application > Other Security Research > 85-90
Communications in Computer and Information Science > Ubiquitous Computing and Multimedia Applications > 324-330
Communications in Computer and Information Science > Convergence and Hybrid Information Technology > Cloud, RFID and Robotics > 219-224
Wireless Personal Communications > 2016 > 86 > 1 > 7-19
Cluster Computing > 2016 > 19 > 1 > 475-484
Journal of Computer Virology and Hacking Techniques > 2015 > 11 > 3 > 137-142