default search action
Dongkyoo Shin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Gwanghyun Ahn, Jisoo Jang, Seho Choi, Dongkyoo Shin:
Research on Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix. IEEE Access 12: 89291-89309 (2024) - [j59]Jisoo Jang, Subong Jung, Myung Kil Ahn, Donghwa Kim, Jaepil Youn, Dongkyoo Shin:
Research on Quantitative Prioritization Techniques for Selecting Optimal Security Measures. IEEE Access 12: 103848-103859 (2024) - [j58]Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee, Dongkyoo Shin:
A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework. Inf. 15(1): 18 (2024) - [j57]Kookjin Kim, Jaepil Youn, Hansung Kim, Dongil Shin, Dongkyoo Shin:
State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis. KSII Trans. Internet Inf. Syst. 18(5): 1273-1300 (2024) - [j56]Jaeyeong Jeong, Seongmin Park, Joonhyung Lim, Jiwon Kang, Dongil Shin, Dongkyoo Shin:
A Study on Network Anomaly Detection Using Fast Persistent Contrastive Divergence. Symmetry 16(9): 1220 (2024) - 2023
- [j55]Jisoo Jang, Kookjin Kim, Sukjoon Yoon, Seongkee Lee, Myung Kil Ahn, Dongkyoo Shin:
Mission Impact Analysis by Measuring the Effect on Physical Combat Operations Associated With Cyber Asset Damage. IEEE Access 11: 45113-45128 (2023) - [j54]Donghwa Kim, Myung Kil Ahn, Seongkee Lee, Donghwan Lee, Moosung Park, Dongkyoo Shin:
Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities. IEEE Access 11: 114187-114200 (2023) - [j53]Kookjin Kim, Jisoo Jang, Hansol Park, Jaeyeong Jeong, Dongil Shin, Dongkyoo Shin:
Detecting Abnormal Behaviors in Dementia Patients Using Lifelog Data: A Machine Learning Approach. Inf. 14(8): 433 (2023) - [j52]Hansol Park, Kookjin Kim, Dongil Shin, Dongkyoo Shin:
BGP Dataset-Based Malicious User Activity Detection Using Machine Learning. Inf. 14(9): 501 (2023) - [j51]Giseok Jeong, Kookjin Kim, Sukjoon Yoon, Dongkyoo Shin, Jiwon Kang:
Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study. Inf. 14(10): 561 (2023) - 2022
- [j50]Sungjoong Kim, Jisoo Jang, Oh-Jin Kwon, Ju-Youb Kim, Dongkyoo Shin:
Study on Cyber Attack Damage Assessment Framework. IEEE Access 10: 59270-59276 (2022) - [j49]Kookjin Kim, Sukjoon Yoon, Donghwan Lee, Jisoo Jang, Haengrok Oh, Dongkyoo Shin:
Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method. IEEE Access 10: 74765-74778 (2022) - [j48]Ikjae Kim, Sungjoong Kim, Hansung Kim, Dongkyoo Shin:
Mission-Based Cybersecurity Test and Evaluation of Weapon Systems in Association with Risk Management Framework. Symmetry 14(11): 2361 (2022) - [c57]Ikjae Kim, Hansung Kim, Dongkyoo Shin:
A study on the application of mission-based cybersecurity testing and evalulation of weapon systems. ICAIIC 2022: 122-127 - 2021
- [j47]Daekyeong Park, Sangsoo Kim, Hyukjin Kwon, Dongil Shin, Dongkyoo Shin:
Host-Based Intrusion Detection Model Using Siamese Network. IEEE Access 9: 76614-76623 (2021) - [j46]Jaeil Lee, Yongjoon Lee, Donghwan Lee, Hyukjin Kwon, Dongkyoo Shin:
Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups. IEEE Access 9: 80866-80872 (2021) - [j45]Byeong-Jun Min, Jihoon Yoo, Sangsoo Kim, Dongil Shin, Dongkyoo Shin:
Network Anomaly Detection Using Memory-Augmented Deep Autoencoder. IEEE Access 9: 104695-104706 (2021) - [j44]Jihoon Yoo, Byeong-Jun Min, Sangsoo Kim, Dongil Shin, Dongkyoo Shin:
Study on Network Intrusion Detection Method Using Discrete Pre-Processing Method and Convolution Neural Network. IEEE Access 9: 142348-142361 (2021) - [j43]Jaepil Youn, Haengrok Oh, Jiwon Kang, Dongkyoo Shin:
Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness. KSII Trans. Internet Inf. Syst. 15(2): 749-766 (2021) - [j42]Seongkyu Yeom, Dongil Shin, Dongkyoo Shin:
Scenario-based cyber attack·defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network. Multim. Tools Appl. 80(26): 34085-34101 (2021) - [j41]Sungjoong Kim, Seongkyu Yeom, Haengrok Oh, Dongil Shin, Dongkyoo Shin:
Automatic Malicious Code Classification System through Static Analysis Using Machine Learning. Symmetry 13(1): 35 (2021) - [j40]Jinsoo Kim, Donghwan Lee, Jaejoon Hwang, Sunghoon Hong, Dongil Shin, Dongkyoo Shin:
Wireless Sensor Network (WSN) Configuration Method to Increase Node Energy Efficiency through Clustering and Location Information. Symmetry 13(3): 390 (2021) - 2020
- [j39]Seunghoon Jeong, Jaejoon Hwang, Hyukjin Kwon, Dongkyoo Shin:
A CFI Countermeasure Against GOT Overwrite Attacks. IEEE Access 8: 36267-36280 (2020) - [j38]Jonghwa Choi, Sungjoong Kim, Dong-Min Shin, Young-Hwan You, Dongil Shin, Dongkyoo Shin:
Neuro-Feedback System Enhancing the Level of Symmetry in Left and Right Brain Activities. IEEE Access 8: 107969-107976 (2020) - [j37]Sungjoong Kim, Jiwon Kang, Haengrok Oh, Dongil Shin, Dongkyoo Shin:
Operation Framework Including Cyber Warfare Execution Process and Operational Concepts. IEEE Access 8: 109168-109176 (2020) - [j36]Kookjin Kim, Seungjin Lee, Sungjoong Kim, Jaekeun Kim, Dongil Shin, Dongkyoo Shin:
Sensor-Based Deviant Behavior Detection System Using Deep Learning to Help Dementia Caregivers. IEEE Access 8: 136004-136013 (2020) - [j35]Seungcheol Choi, Oh-Jin Kwon, Haengrok Oh, Dongkyoo Shin:
Method for Effectiveness Assessment of Electronic Warfare Systems in Cyberspace. Symmetry 12(12): 2107 (2020)
2010 – 2019
- 2019
- [j34]Yong-An Jung, Dongkyoo Shin, Young-Hwan You:
Efficient Estimation Algorithm of Carrier Frequency Offset for LTE Machine-Type Communication Using Frequency Hopping. IEEE Access 7: 177274-177283 (2019) - [j33]Duhoe Kim, Yong-Hyun Kim, Dongil Shin, Dongkyoo Shin:
Fast attack detection system using log analysis and attack tree generation. Clust. Comput. 22(Suppl 1): 1827-1835 (2019) - [j32]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yi-Cheng Chen, Song-Yu Wu:
Data Hiding Using Sequential Hamming + k with m Overlapped Pixels. KSII Trans. Internet Inf. Syst. 13(12): 6159-6174 (2019) - [j31]Jaeil Lee, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, Dongkyoo Shin:
Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment. J. Real Time Image Process. 16(5): 1883 (2019) - [j30]Duhoe Kim, Dongil Shin, Dongkyoo Shin, Yong-Hyun Kim:
Attack Detection Application with Attack Tree for Mobile System using Log Analysis. Mob. Networks Appl. 24(1): 184-192 (2019) - [j29]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yung-Shun Chou:
Generalizing Hamming+k data hiding by overlapped pixels. Multim. Tools Appl. 78(13): 17995-18015 (2019) - [j28]Yong-An Jung, Dongkyoo Shin, Young-Hwan You:
A Computationally Efficient Joint Cell Search and Frequency Synchronization Scheme for LTE Machine-Type Communications. Symmetry 11(11): 1394 (2019) - [c56]Seungjin Lee, Dongil Shin, Dongkyoo Shin:
Sensor-based Abnormal Behavior Detection Using Autoencoder. SoICT 2019: 111-117 - [c55]Jaeyeon Park, Dongil Shin, Dongkyoo Shin, Jaeyoung Lee, Hyungseok Lee:
Design and Implementation of Web Browser Secure Storage for Web Standard Authentication Based on FIDO. SoICT 2019: 229-235 - [c54]Jihoon Yoo, Dongil Shin, Dongkyoo Shin:
Prediction System for Fine Particulate Matter Concentration Index by Meteorological and Air Pollution Material Factors Based on Machine Learning. SoICT 2019: 479-485 - 2018
- [j27]Oh-Jin Kwon, Seungcheol Choi, Dongkyoo Shin:
Improvement of JPEG XT Floating-Point HDR Image Coding Using Region Adaptive Prediction. IEEE Access 6: 3321-3335 (2018) - [j26]Seongjung Kim, Seongkyu Yeom, Oh-Jin Kwon, Dongil Shin, Dongkyoo Shin:
Ubiquitous Healthcare System for Analysis of Chronic Patients' Biological and Lifelog Data. IEEE Access 6: 8909-8915 (2018) - [j25]Cheonshik Kim, Dongkyoo Shin, Lu Leng, Ching-Nung Yang:
Separable reversible data hiding in encrypted halftone image. Displays 55: 71-79 (2018) - [j24]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yung-Shun Chou:
Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming + k. Digit. Signal Process. 78: 284-293 (2018) - [j23]Gyeongil Shin, Hosang Yooun, Dongil Shin, Dongkyoo Shin:
Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR. KSII Trans. Internet Inf. Syst. 12(12): 5685-5700 (2018) - [j22]Cheonshik Kim, Dongkyoo Shin, Lu Leng, Ching-Nung Yang:
Lossless data hiding for absolute moment block truncation coding using histogram modification. J. Real Time Image Process. 14(1): 101-114 (2018) - [j21]Cheonshik Kim, Dongkyoo Shin, Byung-Gyu Kim, Ching-Nung Yang:
Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP. J. Real Time Image Process. 14(1): 115-126 (2018) - [j20]Jaeil Lee, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, Dongkyoo Shin:
Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment. J. Real Time Image Process. 14(1): 237-244 (2018) - [j19]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang:
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers. Ubiquitous Comput. 22(1): 11-22 (2018) - [j18]Yunjin Nam, Dongkyoo Shin, Dongil Shin:
Personal search system based on android using lifelog and machine learning. Pers. Ubiquitous Comput. 22(1): 201-218 (2018) - [j17]Gyeongil Shin, Hosang Yooun, Dongil Shin, Dongkyoo Shin:
Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques. Soft Comput. 22(20): 6835-6844 (2018) - [c53]Doyeon Kim, Dongil Shin, Dongkyoo Shin:
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection. TrustCom/BigDataSE 2018: 1876-1878 - 2017
- [j16]Changhyun Jeon, Oh-Jin Kwon, Dongil Shin, Dongkyoo Shin:
Hand-Mouse Interface Using Virtual Monitor Concept for Natural Interaction. IEEE Access 5: 25181-25188 (2017) - [j15]Dong-Min Shin, Dongil Shin, Dongkyoo Shin:
Development of emotion recognition interface using complex EEG/ECG bio-signal for interactive contents. Multim. Tools Appl. 76(9): 11449-11470 (2017) - [c52]Yunjin Nam, Dongkyoo Shin, Dongil Shin:
Life Log Collection and Analysis System Using Mobile Device. CSA/CUTE 2017: 114-119 - [c51]Hyeonsu Youn, Duhoe Kim, Yong-Hyun Kim, Dongkyoo Shin, Dongil Shin:
System Information Comparison and Analysis Technology for Cyber Attacks. CSA/CUTE 2017: 446-451 - [c50]Hyunjung Ji, Donghwa Kim, Dongkyoo Shin, Dongil Shin:
A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural Network. CSA/CUTE 2017: 452-457 - [c49]Hyunjung Ji, Gyeongil Shin, Dongil Shin, Dongkyoo Shin:
Study on Customer Rating Using RFM and K-Means. CSA/CUTE 2017: 823-828 - [c48]Doyeon Kim, Dongkyoo Shin, Dongil Shin:
Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP. CSA/CUTE 2017: 910-914 - [c47]Dong-Min Shin, Yunjin Nam, Dongil Shin, Dongkyoo Shin:
Real-Time Human Depression Diagnosis System Using Brain Wave Analysis. MUE/FutureTech 2017: 412-418 - 2016
- [j14]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Ching-Nung Yang:
Secure protection of video recorder video in smart car. Int. J. Distributed Sens. Networks 12(12) (2016) - [j13]Doyeob Lee, Dongkyoo Shin, Dongil Shin:
Real-Time Recognition Method of Counting Fingers for Natural User Interface. KSII Trans. Internet Inf. Syst. 10(5): 2363-2374 (2016) - [j12]Dong-Min Shin, Gwanghyung Lee, Dongil Shin, Dongkyoo Shin:
System architecture using human interaction markup language for context awareness in home network. Multim. Tools Appl. 75(23): 15199-15209 (2016) - [j11]Gwanghyung Lee, Dongkyoo Shin, Dongil Shin:
Mouse operation on monitor by interactive analysis of intuitive hand motions. Multim. Tools Appl. 75(23): 15261-15274 (2016) - [c46]Chun-Chi Liu, Shengling Wang, Chenyu Wang, Rongfang Bie, Dongkyoo Shin:
Stackelberg Game Based Optimal Workload Allocation and Pricing Mechanism in Crowdsourcing. BDCloud-SocialCom-SustainCom 2016: 193-200 - [c45]Shuaijing Xu, Guangzhi Zhang, Rongfang Bie, Wenshuang Liang, Cheonshik Kim, Dongkyoo Shin:
Implicit Correlation Intensity Mining Based on the Monte Carlo Method with Attenuation. IIKI 2016: 275-278 - 2014
- [j10]Dong-Min Shin, Dongil Shin, Dongkyoo Shin:
Ubiquitous Health Management System with Watch-Type Monitoring Device for Dementia Patients. J. Appl. Math. 2014: 878741:1-878741:8 (2014) - [j9]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Raylin Tso, Ching-Nung Yang:
A secret sharing scheme for EBTC using steganography. J. Intell. Manuf. 25(2): 241-249 (2014) - [c44]Gwanghyung Lee, Dongil Shin, Dongkyoo Shin:
Intuitive Hand Motion Recognition and NUI/NUX Framework. FCC 2014: 253-259 - 2013
- [c43]Dong-Min Shin, Dongil Shin, Dongkyoo Shin:
Smart Watch and Monitoring System for Dementia Patients. GPC 2013: 577-584 - [c42]HyunJu Lee, Dongil Shin, Dongkyoo Shin, Soohan Kim:
A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home Services. GPC 2013: 594-601 - [c41]Jaewan Shin, Dongkyoo Shin, Dongil Shin:
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment. GPC 2013: 612-622 - [c40]Guyoun Hwang, Heejun Cho, Dongkyoo Shin, Dongil Shin:
Emotion Recognition Technique Using Complex Biomedical Signal Analysis. GPC 2013: 631-640 - 2012
- [c39]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Ching-Nung Yang:
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC. ACIIDS (2) 2012: 129-139 - [c38]HyunJu Lee, Taehyun Kim, Dongkyoo Shin, HeeWon Park, Soohan Kim, Dongil Shin:
Research on a Smart Input Device Using Multimodal Bio-signal Interface. NPC 2012: 565-574 - 2011
- [c37]Cheonshik Kim, Dongkyoo Shin, Dongil Shin:
Data Hiding in a Halftone Image Using Hamming Code (15, 11). ACIIDS (2) 2011: 372-381 - [c36]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Xinpeng Zhang:
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications. STA 2011: 130-138 - 2010
- [j8]Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Kim, Seungdong Kim:
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping. KSII Trans. Internet Inf. Syst. 4(5): 925-938 (2010) - [c35]Jaewan Shin, Dongkyoo Shin, Dongil Shin, Sungmin Her, Soohan Kim, Myungsoo Lee:
Human Movement Detection Algorithm Using 3-Axis Accelerometer Sensor Based on Low-Power Management Scheme for Mobile Health Care System. GPC 2010: 81-90
2000 – 2009
- 2009
- [j7]Dongkyoo Shin, Dongil Shin, Quoc-Cuong Nguyen, Seyoung Park:
Real-Time Tracking of Human Location and Motion using Cameras in a Ubiquitous Smart Home. KSII Trans. Internet Inf. Syst. 3(1): 84-95 (2009) - [c34]My Chau Tu, Dongil Shin, Dongkyoo Shin:
Effective Diagnosis of Heart Disease through Bagging Approach. BMEI 2009: 1-4 - [c33]My Chau Tu, Dongil Shin, Dongkyoo Shin, Jonghwa Choi:
Fundamentals and Design of Smart Home Middleware. CSO (1) 2009: 647-650 - [c32]Taehyun Kim, Dongil Shin, Dongkyoo Shin:
Towards an Emotion Recognition System Based on Biometrics. CSO (1) 2009: 656-659 - [c31]My Chau Tu, Dongil Shin, Dongkyoo Shin:
A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms. DASC 2009: 183-187 - [c30]Quoc-Cuong Nguyen, Dongil Shin, Dongkyoo Shin, Juhan Kim:
Real-Time Human Tracker Based on Location and Motion Recognition of User for Smart Home. MUE 2009: 243-250 - 2008
- [c29]Minwoo Son, Dongkyoo Shin, Dongil Shin:
An XML Based User Context Language for Personalized Service in Ubiquitous Digital Library. ALPIT 2008: 367-372 - 2007
- [c28]Jongil Jeong, Byunggul Ryu, Dongil Shin, Dongkyoo Shin:
Integration of Distributed Biological Data Using Modified K-Means Algorithm. PAKDD Workshops 2007: 469-475 - 2006
- [c27]Jongil Jeong, Weehyuk Yu, Dongkyoo Shin, Dongil Shin, Kiyoung Moon, Jaeseung Lee:
Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing. APWeb 2006: 880-885 - [c26]Byungyoon Lee, Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Design and Implementation of a Game Physics Editor Using XML. Edutainment 2006: 696-699 - [c25]Jongil Jeong, Dongil Shin, Chulho Cho, Dongkyoo Shin:
Structural Similarity Mining in Semi-structured Microarray Data for Efficient Storage Construction. OTM Workshops (1) 2006: 720-729 - [c24]Jongil Jeong, Dongil Shin, Dongkyoo Shin:
An XML-Based Security Architecture for Integrating Single Sign-On and Rule-Based Access Control in Mobile and Ubiquitous Web Environments. OTM Workshops (2) 2006: 1357-1366 - [c23]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Intelligent Game Agent Based Physics Engine for Intelligent Non Player Characters. PRIMA 2006: 444-454 - [c22]Juyeon Lee, Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Multi-user Human Tracking Agent for the Smart Home. PRIMA 2006: 502-507 - [c21]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Research on Design and Implementation of Adaptive Physics Game Agent for 3D Physics Game. PRIMA 2006: 614-619 - [c20]Minwoo Son, Joonhyung Kim, Dongil Shin, Dongkyoo Shin:
Research on Smart Multi-agent Middleware for RFID-Based Ubiquitous Computing Environment. PRIMA 2006: 787-792 - [c19]Minwoo Son, Dongkyoo Shin, Dongil Shin:
Research on Multi-Agent Service Bundle Middleware for Smart Space. RSKT 2006: 618-625 - [c18]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Ubiquitous Intelligent Sensing System for a Smart Home. SSPR/SPR 2006: 322-330 - [c17]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Intelligent Pervasive Middleware Based on Biometrics. UIC 2006: 157-165 - [c16]Jonghwa Choi, Soonyong Choi, Dongkyoo Shin, Dongil Shin:
Real-Time Human Tracker Based Location and Motion Recognition for the Ubiquitous Smart Home. UIC 2006: 708-713 - 2005
- [j6]Gunhee Kim, Dongkyoo Shin, Dongil Shin:
Intellectual property management on MPEG-4 video for hand-held device and mobile video streaming service. IEEE Trans. Consumer Electron. 51(1): 139-143 (2005) - [j5]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Research and implementation of the context-aware middleware for controlling home appliances. IEEE Trans. Consumer Electron. 51(1): 301-306 (2005) - [c15]Minwoo Son, Soonyong Choi, Dongil Shin, Dongkyoo Shin:
The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments. EUC Workshops 2005: 248-257 - [c14]Jonghwa Choi, Dongkyoo Shin, Jinsung Choi, Dongil Shin:
Research on Artificial Intelligence Character Based Physics Engine in 3D Car Game. ICNC (2) 2005: 552-556 - [c13]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Research on Design and Implementation of the Artificial Intelligence Agent for Smart Home Based on Support Vector Machine. ICNC (1) 2005: 1185-1188 - [c12]Minwoo Son, Jonghwa Choi, Namhoon Kim, Dongkyoo Shin, Dongil Shin:
Design and Implementation of a Service Bundle Manager for Home Network Middleware. WAIM 2005: 749-754 - 2004
- [j4]Jongil Jeong, Dongkyoo Shin, Dongil Shin:
An XML-based single sign-on scheme supporting mobile and home network service environments. IEEE Trans. Consumer Electron. 50(4): 1081-1086 (2004) - [j3]Gunhee Kim, Dongkyoo Shin, Dongil Shin:
An efficient methodology for multimedia digital rights management on mobile handset. IEEE Trans. Consumer Electron. 50(4): 1130-1134 (2004) - [c11]Jonghwa Choi, Soonyong Choi, Dongkyoo Shin, Dongil Shin:
Research and Implementation of the Context-Aware Middleware Based on Neural Network. AIS 2004: 295-303 - [c10]Jongil Jeong, Dongkyoo Shin, Dongil Shin, Kiyoung Moon:
Java-Based Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Distributed Web Services. APWeb 2004: 891-894 - [c9]Jonghwa Choi, Dongkyoo Shin, Won Heo, Dongil Shin:
Performance Evaluation of Numerical Integration Methods in the Physics Engine. CIS 2004: 238-244 - [c8]Gunhee Kim, Dongkyoo Shin, Dongil Shin:
An Effective Adaptation of Encryption on MPEG-4 Video Streams for Digital Rights Management in an Ubiquitous Computing Environment. EUC 2004: 642-651 - [c7]Gunhee Kim, Dongkyoo Shin, Dongil Shin:
Design of a Middleware and HIML (Human Interaction Markup Language) for Context Aware Services in a Ubiquitous Computing Environment. EUC 2004: 682-691 - [c6]Jongil Jeong, Dongkyoo Shin, Dongil Shin, Hyun-Mok Oh:
A Study on the XML-Based Single Sign-On System Supporting Mobile and Ubiquitous Service Environments. EUC 2004: 903-913 - [c5]Dongil Shin, Dongkyoo Shin, Baek-Ho Sung, Jun-Hong Song:
A Study on the Secure Business Web Service Based on ebXML. ICWE 2004: 575-576 - 2003
- [c4]Dongkyoo Shin, Jongil Jeong, Dongil Shin:
Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security. GCC (2) 2003: 557-564 - [c3]Dongkyoo Shin, Junil Kim, Dongil Shin:
A Study on the Digital Right Management of MPEG-4 Streams for Digital Video Library. ICADL 2003: 444-455 - 2002
- [j2]Dongkyoo Shin, Dongil Shin:
Design and implementation of the SMIL (Synchronized Multimedia Integration Language) player. IEEE Trans. Consumer Electron. 48(3): 575-578 (2002) - 2000
- [j1]Dongil Shin, Dongkyoo Shin, Eui-Jong Jeong, Jai-Hoon Kim, Sungsoo Kim:
Efficient data broadcast scheme on wireless link errors. IEEE Trans. Consumer Electron. 46(4): 1143-1147 (2000)
1990 – 1999
- 1999
- [c2]Dongil Shin, Dongkyoo Shin, Yongdeok Noh:
Design and Implementation of a JAVA-based Synchronized Multimedia Integration Language Player. PDPTA 1999: 182-186 - 1997
- [c1]Dongkyoo Shin, Hsien-Hsun Steven Wu, Jyh-Charn Liu:
Region-of-interest-based wavelet compression scheme for medical images. Image Processing 1997
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-04 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint