Search results for: Hyungjong Kim
IEEE Transactions on Industrial Electronics > 2018 > 65 > 2 > 1450 - 1458
Lecture Notes in Computer Science > Information Security and Cryptology — ICISC 2002 > Internet Security > 90-106
Lecture Notes in Computer Science > Infrastructure Security > Vulnerability Assessment and Logs > 145-161
Lecture Notes in Computer Science > Advances in Multimedia Information Processing - PCM 2004 > Approaches or Methods of Security Engineering > 564-571
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 567-576
International Journal of Material Forming > 2016 > 9 > 3 > 287-295
IET Control Theory & Applications > 2015 > 9 > 9 > 1472 - 1480
IEEE Transactions on Industrial Electronics > 2014 > 61 > 10 > 5490 - 5499
IEEE Transactions on Wireless Communications > 2013 > 12 > 11 > 5679 - 5691
IEEE Wireless Communications > 2012 > 19 > 6 > 113 - 120
IEEE Transactions on Wireless Communications > 2012 > 11 > 1 > 284 - 295
IEEE Transactions on Wireless Communications > 2012 > 11 > 10 > 3754 - 3765
IEEE Transactions on Wireless Communications > 2012 > 11 > 3 > 874 - 879
IEEE Transactions on Control Systems Technology > 2011 > 19 > 5 > 1296 - 1304