Skip to content
Toggle navigation
Tentang IOS
Join Us
Hubungi Kami
Organisasi Mitra
Akun Anda
Keluar
Masuk
Bahasa Indonesia
Bahasa Indonesia
English
Semua Kolom
Judul
Pengarang
Subject
Call Number
ISBN/ISSN
Tag
Cari
Lanjutan
Pengarang
Tae-ho Cho
Koleksi Nasional
Menampilkan
1
-
12
of
12
untuk pencarian:
'Tae-ho Cho'
, lama mencari: 0.33s
Daftar
Grid
Visual
Sortir
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
FBCFFS-Based Authentication Method for Node Privacy Message in WSN
Article
Journal
oleh
Jung-sub Ahn
,
Tae
-
ho
Cho
Terbitan:
2020
Available online:
Get online
Favorit
Tersimpan di:
Simulation of a Fine Dust Value-Based False Data Detection System to Improve Security In WSN-Based Air Purification IoT
Article
Journal
oleh
Ye-lim Kang
,
Tae
-
ho
Cho
Terbitan:
2021
Available online:
Get online
Favorit
Tersimpan di:
Fuzzy-based Dynamic Security Parameters Determination Method to Improve Energy Efficiency
Article
Journal
oleh
Ye-lim Kang
,
Tae
-
ho
Cho
Terbitan:
2020
Available online:
Get online
Favorit
Tersimpan di:
MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS
Article
Journal
oleh
Tae
Ho
Cho
,
Su Man Nam
Terbitan:
2016
Available online:
Get online
Favorit
Tersimpan di:
DYNAMIC DELAY TIME DECISION METHOD FOR ENHANCING SECURITY OF THE FORCED LATENCY INTERLOCK PROTOCOL IN INTERNET OF THINGS
Article
Journal
oleh
Tae
-
Ho
Cho
,
Garam-Moe Jeon
Terbitan:
2017
Available online:
Get online
Favorit
Tersimpan di:
Modeling and Simulation of Replay Attack Detection using V2X Message in Autonomous Vehicles in WSN based IoT Environment
Article
Journal
oleh
Won Jin Chung
,
Tae
Ho
Cho
Terbitan:
2020
Available online:
Get online
Favorit
Tersimpan di:
A SECURE ROUTING PROCESS TO SIMULTANEOUSLY DEFEND AGAINST FALSE REPORT AND WORMHOLE ATTACKS IN SENSOR NETWORKS
Article
oleh
SOO YOUNG MOON,
TAE
HO
CHO
Terbitan:
2018
Available online:
Get online
Favorit
Tersimpan di:
ENERGY AWARE SECURITY ALGORITHM DECISION METHOD FOR INTERNET OF THINGS USING SSL/TLS FOR WIRELESS NETWORK
Article
oleh
Tae
-
Ho
Cho
,
Jin-Hee Chung
Terbitan:
2017
Available online:
Get online
Favorit
Tersimpan di:
A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL ENROUTE FILTERING BASED WSNS
Article
eJournal
oleh
Su Man Nam
,
Tae
Ho
Cho
Terbitan:
2016
Available online:
Get online
Favorit
Tersimpan di:
A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL ENROUTE FILTERING BASED WSNS
Article
eJournal
oleh
Su Man Nam
,
Tae
Ho
Cho
Terbitan:
2016
Available online:
Get online
Favorit
Tersimpan di:
GAFS: GENETIC ALGORITHM-BASED FILTERING SCHEME FOR IMPROVING DETECTION POWER IN SENSOR NETWORKS
Article
Journal
oleh
Tae
Ho
Cho
,
Su Man Nam
,
Muhammad K. Shahzad
Terbitan:
2017
Available online:
Get online
Favorit
Tersimpan di:
A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS
Article
Journal
oleh
Su Man Nam1 and
Tae
Ho
Cho
2
Terbitan:
2014
Available online:
Get online
Favorit
Tersimpan di:
Search Tools:
Get RSS Feed
—
Email this Search
—
Related Subjects
ISSN
Retrieval Number
Wireless Sensor Networks
wireless sensor networks
Internet of Things
Network Security
Security
Simulation models
Statistical En-route Filtering Network Protocols
Discrete Event System Specification
False positive attacks
False report injection attack
Femtocell
Forced Latency Interlock Protocol
Interleaved Hop-by-hop Authentication
Interlock Protocol
Internet of things
IoT
MQTT
Man in the Middle
SSL/TLS
Wireless sensor networks; Wireless network security; Probabilistic voting-based scheme; Genetic algorithm; False negative attacks
autonomous vehicles
discrete event systems specification formalism
energy efficiency
false report injection attacks
false vote injection attacks
fuzzy system
internet of things
message authentication
modeling and simulation
multiple attacks detection
node energy efficiency management system
node privacy message
node state data security
probabilistic voting-based scheme
security service
threshold analysis
wormhole attacks
×
Loading...