default search action
Seong-Moo Yoo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j47]Steven Puckett, Jianqing Liu, Seong-Moo Yoo, Thomas H. Morris:
A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators. IEEE Internet Things J. 10(24): 22143-22152 (2023) - 2021
- [j46]Kumar Sharshembiev, Seong-Moo Yoo, Elbasher Elmahdi:
Protocol Misbehavior Analysis Using Multivariate Statistical Analysis and Machine Learning in Vehicular Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 49(3-4): 247-267 (2021) - [j45]Kumar Sharshembiev, Seong-Moo Yoo, Elbasher Elmahdi:
Protocol misbehavior detection framework using machine learning classification in vehicular Ad Hoc networks. Wirel. Networks 27(3): 2103-2118 (2021) - 2020
- [j44]Assem Talasbek, Azamat Serek, Meirambek Zhaparov, Seong-Moo Yoo, Young-Kab Kim, Geun-Ho Jeong:
Personality Classification Experiment by Applying k-Means Clustering. Int. J. Emerg. Technol. Learn. 15(16): 162-177 (2020) - [j43]Azamat Serek, Meirambek Zhaparov, Seong-Moo Yoo, Assem Talasbek, Yong-Kab Kim, Min-Woo Jin:
Best Practices in Running IT Hackathons Based on Paragon University Dataset. Int. J. Emerg. Technol. Learn. 15(19): 231-238 (2020) - [j42]Elbasher Elmahdi, Seong-Moo Yoo, Kumar Sharshembiev:
Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. J. Inf. Secur. Appl. 51: 102425 (2020) - [c39]Assem Talasbek, Azamat Serek, Meirambek Zhaparov, Seong-Moo Yoo, Yong-Kab Kim, Geun-Ho Jeong:
Personality Classification by Applying k-Means Clustering. ICAIIC 2020: 421-426 - [c38]Elbasher Elmahdi, Seong-Moo Yoo:
Secure Data Integrity in VANETs based on CS-DC Scheme. LATINCOM 2020: 1-5
2010 – 2019
- 2019
- [c37]Kumar Sharshembiev, Seong-Moo Yoo, Yong-Kab Kim, Geun-Ho Jeong:
Optimal Threshold Analysis for Triggering Fail-Safe Mechanism in Vehicular Ad Hoc Networks. ICACT 2019: 344-350 - [c36]Shunrong Jiang, Jianqing Liu, Liangmin Wang, Seong-Moo Yoo:
Verifiable Search Meets Blockchain: A Privacy-Preserving Framework for Outsourced Encrypted Data. ICC 2019: 1-6 - [c35]Elbasher Elmahdi, Seong-Moo Yoo, Kumar Sharshembiev, Yong-Kab Kim, Geun-Ho Jeong:
Protecting Data Integrity for Multi-Application Environment in Wireless Sensor Networks. iThings/GreenCom/CPSCom/SmartData 2019: 90-95 - [c34]Kumar Sharshembiev, Seong-Moo Yoo, Elbasher Elmahdi, Yong-Kab Kim, Geun-Ho Jeong:
Fail-Safe Mechanism Using Entropy Based Misbehavior Classification and Detection in Vehicular Ad Hoc Networks. iThings/GreenCom/CPSCom/SmartData 2019: 123-128 - [c33]Jatinder N. D. Gupta, Ezhil Kalaimannan, Seong-Moo Yoo:
A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator. NCS 2019: 202-219 - 2018
- [j41]Changhyuk An, Youngwon Kim An, Seong-Moo Yoo, B. Earl Wells:
Efficient data association to targets for tracking in passive wireless sensor networks. Ad Hoc Networks 75-76: 19-32 (2018) - [j40]Azamat Zhamanov, Seong-Moo Yoo, Zhulduz Sakhiyeva, Meirambek Zhaparov:
Implementation and Evaluation of Flipped Classroom as IoT Element into Learning Process of Computer Network Education. Int. J. Inf. Commun. Technol. Educ. 14(2): 30-47 (2018) - [j39]Vahid Heydari, Seong-Moo Yoo:
Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks. Int. J. Wirel. Inf. Networks 25(1): 15-29 (2018) - [c32]Elbasher Elmahdi, Seong-Moo Yoo, Kumar Sharshembiev:
Securing data forwarding against blackhole attacks in mobile ad hoc networks. CCWC 2018: 463-467 - [c31]Kumar Sharshembiev, Seong-Moo Yoo, Elbasher Elmahdi:
Broadcast storm mitigation from unintentional misbehavior in vehicular ad hoc networks. CCWC 2018: 925-930 - 2017
- [j38]Vahid Heydari, Sun-il Kim, Seong-Moo Yoo:
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers. IEEE Trans. Inf. Forensics Secur. 12(5): 1113-1124 (2017) - [c30]Thiago Alves, Thomas H. Morris, Seong-Moo Yoo:
Securing SCADA Applications Using OpenPLC With End-To-End Encryption. ICSS 2017: 1-6 - 2016
- [j37]Jatinder N. D. Gupta, Ezhil Kalaimannan, Seong-Moo Yoo:
A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators. Comput. Oper. Res. 69: 1-9 (2016) - [j36]Vahid Heydari, Seong-Moo Yoo:
E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs. Wirel. Networks 22(7): 2259-2273 (2016) - [c29]Vahid Heydari, Sun-il Kim, Seong-Moo Yoo:
Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense. CISRC 2016: 7:1-7:8 - [c28]Vahid Heydari, Seong-Moo Yoo, Sun-il Kim:
Secure VPN Using Mobile IPv6 Based Moving Target Defense. GLOBECOM 2016: 1-6 - 2015
- [j35]Sangjoon Park, Seong-Moo Yoo:
Extended self-reproducible Discrete Event System Specification (DEVS) formalism using hidden inheritance. Inf. Sci. 292: 75-94 (2015) - [j34]Vahid Heydari, Seong-Moo Yoo:
Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs. KSII Trans. Internet Inf. Syst. 9(12): 5150-5169 (2015) - 2014
- [j33]Youngwon Kim An, Seong-Moo Yoo, Changhyuk An, B. Earl Wells:
Rule-based multiple-target tracking in acoustic wireless sensor networks. Comput. Commun. 51: 81-94 (2014) - [j32]Mallikarjun Avula, Sanggon Lee, Seong-Moo Yoo:
Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks. KSII Trans. Internet Inf. Syst. 8(6): 1982-2004 (2014) - [c27]Youngwon Kim An, Changhyuk An, Seong-Moo Yoo, B. Earl Wells:
Noise Mitigation for Multiple Target Tracking in Acoustic Wireless Sensor Networks. MILCOM 2014: 1127-1132 - 2013
- [j31]Seungjin Park, Seong-Moo Yoo:
An efficient reliable one-hop broadcast in mobile ad hoc networks. Ad Hoc Networks 11(1): 19-28 (2013) - [j30]Youngwon Kim An, Seong-Moo Yoo, Changhyuk An, B. Earl Wells:
Doppler effect on target tracking in wireless sensor networks. Comput. Commun. 36(7): 834-848 (2013) - [j29]Youngwon Kim An, Seong-Moo Yoo, Changhyuk An, B. Earl Wells:
Noise Mitigation for Target Tracking in Wireless Acoustic Sensor Networks. KSII Trans. Internet Inf. Syst. 7(5): 1166-1179 (2013) - [j28]Whye Kit Tan, Sanggon Lee, Jun Huy Lam, Seong-Moo Yoo:
A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols. Sensors 13(9): 11553-11585 (2013) - [c26]Ezhil Kalaimannan, Jatinder N. D. Gupta, Seong-Moo Yoo:
Maximizing Investigation Effectiveness in Digital Forensic Cases. SocialCom 2013: 618-623 - 2012
- [j27]Jongchan Lee, Seong-Moo Yoo:
Intelligent cell selection satisfying user requirements for inter-system handover in heterogeneous networks. Comput. Commun. 35(17): 2106-2114 (2012) - [j26]Frederick T. Sheldon, John Mark Weber, Seong-Moo Yoo, W. David Pan:
The Insecurity of Wireless Networks. IEEE Secur. Priv. 10(4): 54-61 (2012) - 2011
- [c25]Seungjin Park, Seong-Moo Yoo:
ROB/CN: An Efficient Reliable 1-Hop Broadcast Using CSMA/CN in Mobile Ad Hoc Networks. APSCC 2011: 316-320 - 2010
- [j25]Ilsun You, Bonam Kim, Hui-Huang Hsu, Seong-Moo Yoo:
A Special Issue of Intelligent Automation and Soft Computing - Forthcoming Multimedia & Intelligent Services In Ubiquitous And Pervasive Computing. Intell. Autom. Soft Comput. 16(4): 491-493 (2010) - [j24]Mohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim, Seungjin Park:
Two Distributive Key Management Schemes In Mobile Ad Hoc Networks. Intell. Autom. Soft Comput. 16(4): 593-605 (2010) - [j23]Jian Fu, H. John Caulfield, Seong-Moo Yoo, Dongsheng Wu:
Fuzzy Aggregation with Artificial Color filters. Inf. Sci. 180(1): 167-180 (2010) - [j22]Chul-Ho Park, Seong-Moo Yoo, W. David Pan:
LSM: A layer subdivision method for deformable object matching. Inf. Sci. 180(19): 3718-3727 (2010) - [j21]Seungjin Park, Seong-Moo Yoo, Fan Qiu:
Route Reutilization Routing in Mobile Ad Hoc Networks. KSII Trans. Internet Inf. Syst. 4(2): 78-97 (2010) - [c24]Ossama Toutonji, Seong-Moo Yoo, Moongyu Park:
Propagation modeling and analysis of network worm attack. CSIIRW 2010: 48 - [c23]Seungjin Park, Seong-Moo Yoo:
A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks. FGIT-FGCN (2) 2010: 102-111 - [i1]Yoshito Kanamori, Seong-Moo Yoo:
Quantum Three-Pass protocol: Key distribution using quantum superposition states. CoRR abs/1004.0599 (2010)
2000 – 2009
- 2009
- [j20]Ossama Toutonji, Seong-Moo Yoo:
An Approach against a Computer Worm Attack. Int. J. Commun. Networks Inf. Secur. 1(2) (2009) - [j19]Yoshito Kanamori, Seong-Moo Yoo, Don A. Gregory, Frederick T. Sheldon:
Authentication Protocol Using Quantum Superposition States. Int. J. Netw. Secur. 9(2): 101-108 (2009) - [j18]Ossama Toutonji, Seong-Moo Yoo:
Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense. KSII Trans. Internet Inf. Syst. 3(1): 96-107 (2009) - [c22]Ossama Toutonji, Seong-Moo Yoo:
Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune System. Security and Management 2009: 251-257 - 2008
- [c21]Yoshito Kanamori, Bogdan Hoanca, Seong-Moo Yoo:
Three-Party Quantum Authenticated Key Distribution with Partially Trusted Third Party. GLOBECOM 2008: 1831-1835 - [c20]Mohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim:
Distributive Key Management for Mobile Ad Hoc Networks. MUE 2008: 533-536 - 2007
- [j17]W. David Pan, Seong-Moo Yoo, Mahesh Nalasani, Paul G. Cox:
Efficient local transformation estimation using Lie operators. Inf. Sci. 177(3): 815-831 (2007) - [j16]W. David Pan, Seong-Moo Yoo, Chul-Ho Park:
Complexity accuracy tradeoffs of Lie operators in motion estimation. Pattern Recognit. Lett. 28(7): 778-787 (2007) - 2006
- [j15]John Eisbrener, Greg Murphy, David Eade, Christopher K. Pinnow, Kohinoor Begum, Seungjin Park, Seong-Moo Yoo, Jong-Hoon Youn:
Recycled path routing in mobile ad hoc networks. Comput. Commun. 29(9): 1552-1560 (2006) - [j14]Chul-Ho Park, Seong-Moo Yoo, Hyunseung Choo, W. David Pan:
Multi-user data multiplexing for digital multimedia broadcasting. Comput. Commun. 29(18): 3970-3975 (2006) - [j13]Rami A. AL-Na'mneh, W. David Pan, Seong-Moo Yoo:
Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors. Informatica 17(4): 535-550 (2006) - [j12]Hyunseung Choo, Young Jae Lee, Seong-Moo Yoo:
DIG: Degree of inter-reference gap for a dynamic buffer cache management. Inf. Sci. 176(8): 1032-1044 (2006) - [j11]Rami A. AL-Na'mneh, W. David Pan, Seong-Moo Yoo:
Two Parallel 1-d Fft Algorithms without all-to-all Communication. Parallel Process. Lett. 16(2): 153-164 (2006) - [c19]Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Sheldon:
Bank Transfer over Quantum Channel with Digital Checks. GLOBECOM 2006 - [c18]Mohammad Al-Shurman, Seong-Moo Yoo:
Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks. ITNG 2006: 566-567 - 2005
- [j10]Seungjin Park, Seong-Moo Yoo, Mohammad Al-Shurman, Brian Van Voorst, Chang-Hyun Jo:
ARM: Anticipated route maintenance scheme in location-aided mobile ad hoc networks. J. Commun. Networks 7(3): 325-336 (2005) - [j9]M. Thaduri, Seong-Moo Yoo, Rhonda Kay Gaede:
An efficient VLSI implementation of IDEA encryption algorithm using VHDL. Microprocess. Microsystems 29(1): 1-7 (2005) - [j8]Seong-Moo Yoo, Deen Kotturi, W. David Pan, John Blizzard:
An AES crypto chip using a high-speed parallel pipelined architecture. Microprocess. Microsystems 29(7): 317-326 (2005) - [j7]Jian Fu, H. John Caulfield, Seong-Moo Yoo, Venkata Atluri:
Use of Artificial Color filtering to improve iris recognition and searching. Pattern Recognit. Lett. 26(14): 2244-2251 (2005) - [c17]Yoshito Kanamori, Seong-Moo Yoo, Mohammad Al-Shurman:
A quantum no-key protocol for secure data communication. ACM Southeast Regional Conference (2) 2005: 92-93 - [c16]Mohammad Al-Shurman, Seong-Moo Yoo, Yoshito Kanamori:
Decreasing broadcast in route discovery using vectors in mobile ad hoc networks. ACM Southeast Regional Conference (2) 2005: 103-104 - [c15]Yoshito Kanamori, Seong-Moo Yoo, Don A. Gregory, Frederick T. Sheldon:
On quantum authentication protocols. GLOBECOM 2005: 5 - [c14]Deen Kotturi, Seong-Moo Yoo, John Blizzard:
AES crypto chip utilizing high-speed parallel pipelined architecture. ISCAS (5) 2005: 4653-4656 - 2004
- [j6]Seong-Moo Yoo, Hee Yong Youn, Hyunseung Choo:
Fault-Free Maximal Submeshes in Faulty Torus-Connected Multicomputers. Informatica (Slovenia) 28(3): 289-296 (2004) - [j5]H. John Caulfield, Jian Fu, Seong-Moo Yoo:
Artificial color image logic. Inf. Sci. 167(1-4): 1-7 (2004) - [c13]Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park:
A performance simulation for route maintenance in wireless ad hoc networks. ACM Southeast Regional Conference 2004: 25-30 - [c12]Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park:
Black hole attack in mobile Ad Hoc networks. ACM Southeast Regional Conference 2004: 96-97 - [c11]Mahesh Nalasani, W. David Pan, Seong-Moo Yoo:
Motion estimation with integrated motion models. ACM Southeast Regional Conference 2004: 466-467 - [e2]Seong-Moo Yoo, Letha H. Etzkorn:
Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004. ACM 2004, ISBN 1-58113-870-9 [contents] - 2003
- [j4]Daewoo Chung, Hyunseung Choo, Hee Yong Youn, Seong-Moo Yoo:
Efficient Location Traffic Management With Multiple Virtual Layers. J. Inf. Sci. Eng. 19(5): 787-808 (2003) - [c10]Young Jae Lee, Hyunseung Choo, Seong-Moo Yoo:
DIG Based Block Replacement Scheme for Efficient Buffer Cache Management. PDCS 2003: 349-354 - [c9]W. David Pan, Seong-Moo Yoo:
Computation Control of Distributed Image Decoders in Mobile Computing. PDCS 2003: 411-416 - [e1]Seong-Moo Yoo, Hee Yong Youn:
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, August 13-15, 2003, Atlantis Hotel, Reno, Nevada, USA. ISCA 2003, ISBN 1-880843-48-X [contents] - 2002
- [c8]Zhong-Hua Zhou, Seong-Moo Yoo:
An All-to-All Multicast Routing Decreasing Channel Overheads in Wireless Ad Hoc Networks. CATA 2002: 228-231 - 2001
- [c7]Seong-Moo Yoo, Vladimir Zanev:
Maintaining maximal submeshes in torus-connected multi-computers. CATA 2001: 290-293 - [c6]Vladimir Zanev, Avram Eskenazi, Seong-Moo Yoo:
An approach to remote software project management and development. CATA 2001: 531-535 - 2000
- [j3]Seong-Moo Yoo, Hyunseung Choo, Hee Yong Youn, Chansu Yu, Younghee Lee:
On Task Relocation in Two-Dimensional Meshes. J. Parallel Distributed Comput. 60(5): 616-638 (2000) - [j2]Hyunseung Choo, Seong-Moo Yoo, Hee Yong Youn:
Processor Scheduling and Allocation for 3D Torus Multicomputer Systems. IEEE Trans. Parallel Distributed Syst. 11(5): 475-484 (2000) - [c5]Wonjae Choi, Hyunseung Choo, Seong-Moo Yoo:
Analytical approaches for modeling characterized MIN. CATA 2000: 46-49
1990 – 1999
- 1999
- [c4]Seong-Moo Yoo, Hee Yong Youn:
A Task Compaction Scheme for 3D Torus Multicomputer Systems. PDPTA 1999: 2211-2217 - 1997
- [j1]Seong-Moo Yoo, Hee Yong Youn, Behrooz A. Shirazi:
An Efficient Task Allocation Scheme for 2D Mesh Architectures. IEEE Trans. Parallel Distributed Syst. 8(9): 934-942 (1997) - 1996
- [c3]Hee Yong Youn, Hyunseung Choo, Seong-Moo Yoo, Behrooz A. Shirazi:
Dynamic Task Scheduling and Allocation for 3D Torus Multicomputer Systems. ICPP, Vol. 3 1996: 199-206 - 1995
- [c2]Seong-Moo Yoo, Hee Yong Youn:
An Efficient Task Allocation Scheme for Two-Dimensional Mesh-Connected Systems. ICDCS 1995: 501-508 - [c1]Seong-Moo Yoo, Hee Yong Youn:
An on-line scheduling and allocation scheme for real-time tasks in 2D meshes. SPDP 1995: 630-637
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-21 22:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint