Home Intro home home home home home home
 

International_A

International_B

International_C

Domestic_J

Domestic_C

Patents



International Journals Group B

  • Jung Sub Ahn & Sang Hyeok Lim and Tae Ho Cho. "Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Network Lifetime in WSNs" International Journal of Computer Networks & Communications (IJCNC), Vol. 13, No. 6, pp. 73 - 91, Nov. 2021.
  • Ye Lim Kang & Tae Ho Cho. "Simulation of A Fine Dust Value-Based False Data Detection System To Improve Security In WSN-Based Air Purification IoT" International Journal of Engineering and Advanced Technology (IJEAT) , Vol. 8, No. 81, pp. 945 - 956, Aug. 2021.
  • Won Jin Chung & Tae Ho Cho. "A security scheme based on blockchain and a hybrid cryptosystem to reduce packet loss in IoV" International Journal of Advanced Technology and Engineering Exploration(IJATEE) , Vol. 8, No. 81, pp. 945 - 956, Aug. 2021.
  • Ga-Hyeon An & Tae-Ho Cho. "Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-route Filtering" International Journal of Computer Networks and Applications (IJCNA) , Vol. 8, No. 4, pp. 390 - 399, Aug. 2021.
  • Won Jin Chung & Tae Ho Cho. "Modeling and Simulation of Blackhole Attack Detection using Multipath Routing in WSN-based IoV" International Journal of Engineering Research & Technology (IJERT) , Vol. 10, No. 1, pp. 181 - 187, Jan. 2021.
  • Jung Sub Ahn & Sang Hyeok Lim and Tae Ho Cho. "Detecting a False Report using Temporal Logic and a Rank Algorithm in WSNs" International Journal of Engineering Research & Technology (IJERT) , Vol. 10, No. 1, pp. 174 - 180, Jan. 2021.
  • Jung Sub Ahn & Tae Ho Cho. "Fuzzy Logic Optimization Method for Energy Efficiency Improvement of CFFS using GA in WSN" International Journal of Engineering and Advanced Technology (IJEAT), Vol. 9, No. 6, pp. 474 - 480, Aug. 2020.
  • Ye Lim Kang and Tae Ho Cho. "Energy Efficient Operation Cycle Determination Scheme of Fuzzy Based IHA in Air Purification IoT," International Journal of Recent Technology and Engineering (IJRTE), Vol. 9, No. 2, pp. 1126 - 1131, Jul. 2020.
  • Won Jin Chung and Tae Ho Cho. "Detection of Replay Attack through Sequence Number Encryption in EDDK based WSNs," International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 9, No. 9, pp. 593 - 599, Jul. 2020.
  • Jung Sub Ahn & Tae Ho Cho. "Node Density Based Security Level Determining to Prolong the Lifetime of WSN through Network Conditions" International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 9, No. 9, pp. 340 - 344, Jul. 2020.
  • Won Jin Chung and Tae Ho Cho. "Modeling and Simulation of Replay Attack Detection using V2X Message in Autonomous Vehicles in WSN based IoT Environment," International Journal of Engineering and Advanced Technology (IJEAT), Vol. 9, No. 5, pp. 1279 - 1286, Jun. 2020.
  • Ye lim Kang & Tae Ho Cho. "Fuzzy-based Dynamic Security Parameters Determination Method to Improve Energy Efficiency" International Journal of Engineering and Advanced Technology (IJEAT), Vol. 9, No. 4, pp. 1952 - 1958, Apr. 2020.
  • Jung Sub Ahn & Tae Ho Cho. "FBCFFS-Based Authentication Method for Node Privacy Message in WSN" International Journal of Engineering and Advanced Technology (IJEAT), Vol. 9, No. 3, pp. 313 - 318, Feb. 2020.
  • Kyoung A Kim and Tae Ho Cho. "Fuzzy-based Adaptive Multipath for En-route Filtering in Dynamic Wireless Sensor Network" International Journal of Recent Technology and Engineering (IJRTE), Vol. 8, No. 4, pp. 12377 - 12385, Nov. 2019. (SCOPUS)
  • Won Jin Chung and Tae Ho Cho. "Modeling and Simulation of DoS Attack Response in WSN based IoT," International Journal of Recent Technology and Engineering (IJRTE), Vol. 8, No. 4, pp. 9525 - 9532, Nov. 2019. (SCOPUS)
  • Ye Lim Kang and Tae Ho Cho. "Detection of False Report Injection At Wsns Based on Data Calibration in Iot Environment" International Journal of Recent Technology and Engineering (IJRTE), Vol. 8, No. 4, pp. 8956 - 8960, Nov. 2019. (SCOPUS)
  • Jung Sub Ahn, & Tae Ho Cho. "Node Burden-Based Load-Balancing Management Method for Extended Network Lifetimes of WSNs" International Journal of Engineering and Advanced Technology (IJEAT), Vol. 9, No. 1, pp. 5602 - 5607, Oct. 2019. (SCOPUS)
  • Won Jin Chung and Tae Ho Cho. "A Security Key Management Method using Grid Routing for EDDK in WSNs," International Journal of Recent Technology and Engineering (IJRTE), Vol. 8, No. 2, pp. 5655 - 5661, Jul. 2019. (SCOPUS)
  • Jung Sub Ahn, & Tae Ho Cho. "AN ENHANCEMENT OF CLUSTER-BASED FALSE DATA FILTERING SCHEME THROUGH DYNAMIC SECURITY SELECTION IN WIRELESS SENSOR NETWORKS" International Journal of Computer Networks & Communications (IJCNC), Vol. 11, No. 2, pp. 83 - 94, Mar. 2019. (SCOPUS)
  • Ye Lim Kang and Tae Ho Cho, "ENERGY-EFFICIENT SECURITY THRESHOLD DETERMINATION METHOD FOR THE ENHANCEMENT OF INTERLEAVED HOP-BY-HOP AUTHENTICATION", International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 9, No. 12, pp. 145-149, Dec. 2018.(SCOPUS)
  • Sanghyeok Lim, & Tae Ho Cho. " IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETECTION USING NEURAL NETWORK IN WSN" International Journal of Computer Networks & Communications (IJCNC), Vol. 10, No. 6, pp. 21-34, Nov. 2018.(SCOPUS)
  • Akram, Muhammad, Muhammad Ashraf, & Tae Ho Cho. " Genetic Algorithm-based Optimized Fuzzy Adaptive Path Selection in Wireless Sensor Networks." Sukkur IBA Journal of Computing and Mathematical Sciences[Online], 2.1 (2018): 1-12. Web. 27 Jun. 2018 .
  • Jung Sub Ahn and Tae Ho Cho , "BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICIENCY OF CFFS IN WSNS", International Journal of Wireless & Mobile Networks (IJWMN), Vol. 10, No. 4, pp. 39-49, Aug. 2018.
  • Won Jin Chung and Tae Ho Cho , "A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY IN SELECTIVE FORWARDING ATTACK DETECTION BASED MWSNS", International Journal of Wireless & Mobile Networks (IJWMN), Vol. 10, No. 4, pp. 9-19, Aug. 2018.
  • Jung Sub Ahn and Tae Ho Cho , "A METHOD OF IMPROVING DETECTION RATIO THROUGH CLUSTER SECURITY THRESHOLD MANAGEMENT IN CFFS", International Journal of Advanced Research(IJAR), Vol. 5, No. 12, pp. 872-879, Jul. 2018.
  • Won Jin Chung and Tae Ho Cho , "CASCADED FUZZY LOGIC BASED ROUTING DETERMINATION METHOD TO REDUCE THE ENERGY CONSUMPTION OF SELECTIVE FORWARDING ATTACK DETECTION IN MWSNS", International Journal of Advanced Research(IJAR), Vol. 5, No. 12, pp. 613-623, Jul. 2018.
  • Sanghyeok Lim and Taeho Cho , "GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED WSNS", International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018.
  • Jung Sub Ahn and Tae Ho Cho, "ENERGY CONSUMPTION ANALYSIS OF WSN'S VARIOUS ENVIRONMENT FOR ADEQUATE KEY-REDISTRIBUTION IN DEF", International Journal of Advanced Research(IJAR), Vol. 6, No. 1, pp. 858-864, Jan. 2018.
  • Won Jin Chung and Tae Ho Cho, "IMPROVING THE ENERGY EFFICIENCY OF FOG COMPUTING-BASED SYSTEM FOR SELECTIVE FORWARDING DETECTION IN MOBILE WIRELESS SENSOR NETWORKS USING MULTIPATH ROUTE", International Journal of Advanced Research in Computer Science (IJARCS), Vol. 8, No. 9, pp. 627-632, Dec. 2017.
  • Won Jin Chung and Tae Ho Cho, "MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED WSNS USING FUZZY LOGIC", International Journal of Computer Science & Information Technology (IJCSIT), Vol. 9, No. 6, pp. 67-77, Dec. 2017.
  • Sang Hyeok Lim and Tae Ho Cho, "LOAD BALANCING MANAGEMENT USING EVALUATION FUNCTION TO IMPROVE THE REPORT TRANSFER SUCCESS RATE", International Journal of Advanced Research(IJCA), Vol. 5, No. 12, pp. 613-623, Dec. 2017.
  • Jung Sub Ahn and Tae Ho Cho, "METHOD FOR THE PERIOD DETERMINATION OF SECURITY LEVEL UPDATE IN STATISTICAL EN-ROUTE FILTERING ", International Journal of Research - GRANTHAALAYAH(IJRG), Vol. 5, No. 11, pp. 158-167, Nov. 2017.
  • Su Man Nam and Tae Ho Cho, "Discrete Event Modeling and Simulation of Probabilistic Voting-based Filtering to Find Proper Security Parameters in Wireless Sensor Networks", International Journal of Computer Applications (IJCA), Vol. 176, No. 3, pp. 21-26, Oct. 2017.
  • Sang Hyeok Lim and Tae Ho Cho, "WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC", International Journal of Computer Science & Information Technology (IJCSIT), Vol. 9, No. 5, pp. 1-14, Oct. 2017.
  • Sang Hyeok Lim and Tae Ho Cho, "Automatic Threshold Reset Scheme using a Double Fuzzy Logic for Improvement of Detection Rate in a Probabilistic Voting-based Filtering Scheme of WSNs", International Journal of Computer Applications (IJCA), Vol. 176, No. 1, pp. 38-43, Oct. 2017.
  • Won Jin Chung and Tae Ho Cho, "Fuzzy Logic Based Efficient Route Determination Method For Improving the Energy Efficiency of Sensor Networks in FAP-based WSNs", International Journal of Computer Applications (IJCA), Vol. 172, No. 5, pp. 35-39, Aug. 2017.
  • Sang Hyeok Lim and Tae Ho Cho, "Report Verification Technique for Improvement of the Energy Efficiency in a Probabilistic Voting-based Filtering Scheme of WSNs", International Journal of Computer Applications (IJCA), Vol. 171, No. 3, pp. 21-25, Aug. 2017.
  • Muhamad Akram and Tae Ho Cho, "Fuzzy Adaptive Selection of Votes in Probabilistic Filtering Scheme in WSNs", International Journal Of Engineering And Computer Science(IJECS), Vol. 6, No. 7, pp. 21957-21962, Jul. 2017.
  • Jung Sub Ahn and Tae Ho Cho, "Prevention Method of False Report Generation in Cluster Heads for Dynamic En-route Filtering of Wireless Sensor Networks", International Journal of Computer Science & Information Technology (IJCSIT), Vol. 9, No. 3, pp. 63-70, Jun. 2017.
  • Dong Jin Park and Tae Ho Cho, "A Fuzzy Rule-based Key Re-Distribution Decision Scheme of Dynamic Filtering for Energy Saving in Wireless Sensor Networks", International Journal of Information Technology and Computer Science(IJITCS), Vol. 9, No. 4, pp. 1-8, Apr. 2017.
  • Muhammad Ashraf, Muhammad Akram and Tae Ho Cho, "Increasing the Energy Efficiency of TICK by Selecting Adaptive Forwarding Nodes in Wireless Sensor Networks", Sukkur IBA University Journal of Computing and Mathematical Sciences(SJCMS), Vol. 1, No. 1, pp. 37-42, Jan. - Jun. 2017.
  • Muhamad Akram, Muhammad Ashraf and Tae Ho Cho, "Enhancing the Statistical Filtering Scheme to Detect False Negative Attacks in Sensor Networks", Sukkur IBA University Journal of Computing and Mathematical Sciences(SJCMS), Vol. 1, No. 1, pp. 51-56, Jan. - Jun. 2017.
  • Won Jin Chung and Tae Ho Cho, "NETWORK LIFETIME EXTENSION SCHEME USING MULTIPATH ROUTING IN FLOODING ATTACK DETECTION OF WIRELESS SENSOR NETWORKS", International Journal of Advanced Research (IJAR), Vol. 5, No. 2, pp. 853-860, Feb. 2017.
  • Jin Hee Chung and Tae Ho Cho, "Adaptive Energy-Efficient SSL/TLS Method Using Fuzzy Logic for the MQTT-Based Internet of Things", International Journal Of Engineering And Computer Science (IJECS), Vol. 5, No. 12, pp. 19296-19303, Dec. 2016.
  • Kyu Hyun Song and Tae Ho Cho, "An Energy-Efficient Method for Preventing Internal Sinkhole Attacks on INSENS based WSNs using Interactive Authentications", International Journal of Computer Applications (IJCA), Vol. 153, No. 2, pp. 38-44, Nov. 2016.
  • Dong Jin Park and Tae Ho Cho, "Discrete Event Modeling and Simulation of A Modified Dynamic En-route Filtering to Improve the Energy Efficiency in Wireless Sensor Networks", International Journal of Advanced Research (IJAR), Vol. 4, No. 11, pp. 2040-2050, Nov. 30, 2016.
  • Su Man Nam and Tae Ho Cho, "Modeling and Simulation of Threshold Analysis for PVFS in Wireless Sensor Networks", International Journal of Research - GRANTHAALAYAH(IJRG), Vol. 4, No. 8, Aug. 2016.
  • Su Man Nam and Tae Ho Cho, "Detection of Compromised Nodes using Modeling and Simulation for Statistical En-route Filtering based Wireless Sensor Networks", International Journal of Advanced Research (IJAR) , Aug. 2016.
  • Jung Sub Ahn and Tae Ho Cho, "A Correlation Analysis of the MAC Length in Statistical En-route Filtering based WSNs", accepted for International Journal of Advanced Research (IJAR) , Aug. 2016.
  • Jae Jin Lee and Tae Ho Cho, "Sinkhole Attack Detection Scheme using Neighbors’ Information for LEAP based Wireless Sensor Networks", International Journal of Computer Applications (IJCA), Vol. 141, No. 13, May 2016.
  • Garam Moe Jeon and Tae Ho Cho, "Dynamic Delay Time Decision Method For Enhancing Security Of The Forced Latency Interlock Protocol In Internet of Things", International Journal of Research – GRANTHAALAYAH, Vol. 4, No. 2, pp. 1-8, Feb. 2016.
  • Muhammad K. Shahzad, Jae Kwan Lee, and Tae Ho Cho, "ERCA:Energy-efficient Routing and re-Clustering Algorithm for CCEF to Extend Network Lifetime in WSNs", Advanced Computational Intelligence: An International Journal (ACII), Vol. 3, No. 1, Jan. 2016.
  • Jin Hee Chung and Tae Ho Cho, "Energy Aware Security Algorithm Decision Method for Internet of Things using SSL/TLS for Wireless Network," International Journal of Research – GRANTHAALAYAH, Vol. 3, No. 12, pp. 1-8, Dec. 2015.
  • Su Man Nam, Muhammad K. Shahzad, and Tae Ho Cho, "GAFS: Genetic Algorithm-based Filtering Scheme for Improving Detection Power in Sensor Networks," International Journal of Research – GRANTHAALAYAH (IJRG), Vol. 3, No. 12, pp. 100-116, Dec. 2015.
  • Muhammad K. Shahzad and Tae Ho Cho, “Sink mobility for commutative cipher based en-route filtering to prolong the network lifetime in Wireless Sensor Networks," International Journal of Advanced Research (IJAR), Vol. 3, No. 12, pp. 1055-1062, Dec. 16, 2015.
  • Muhammad K. Shahzad, Jae Kwan Lee, and Tae Ho Cho, “Balancing Energy Consumption Over the Network to Extend the Network Lifetime in Wireless Sensor Networks," International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 5, No. 6, pp. 657-662, 12 Dec. 2015.
  • Muhammad K. Shahzad and Tae Ho Cho, "Modified CCEF for Energy-efficiency and Extended Network Lifetime in WSNs", International Journal of Ubicomp (IJU), Vol. 6(4), pp. 1-12, Oct. 2015.
  • Muhammad K. Shahzad and Tae Ho Cho, " “An Enhanced Detection and Energy-efficient en-route Filtering (EDEF) Scheme in Wireless Sensor Networks,"" AIRCC Informatics Engineering, An International Journal (IEIJ), Vol. 3 (3), pp. 11-26, Sep. 2015.
  • S.M. Nam and T.H. Cho, "A Method to Select Next Hop Node for Improving Energy Efficiency in LEAP-Based WSNs," Lecture Notes in Computer Science, Springer Verlag, LNCS 9225, pp. 639-648, Aug. 2015.
  • J.K. Lee, S. M. Nam and T.H. Cho, "Energy-Efficient Path Configuration Method for DEF in WSNs," International Journal on Information Theory (IJIT), Vol. 4, No. 2, pp. 9-20, Apr. 2015.
  • J.K. Lee and T.H. Cho, "“ENSF: Energy-efficient Next-hop Selection Method using Fuzzy Logic in Probabilistic Voting-based Filtering Scheme," International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, pp. 19-31, Dec. 2014.
  • S.M. Nam and T.H. Cho, "Selecting Number of Forwarding Reports to Improve Energy Savings in Bandwidth Efficient Cooperative Authentications for Sensor Networks," International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, pp. 1-10, Dec. 2014.
  • S.Y. Moon and T.H. Cho, "A Secure Routing Process to Simultaneously Defend Against False Report and Wormhole Attacks in Sensor Networks," Informatics Engineering, an International Journal (IEIJ), Vol. 2, No. 4, pp. 31-51, Dec. 2014.
  • S.M. Nam and T.H. Cho, "A Security Method for Multiple Attacks in Sensor Networks: Against False-Report Injection, False-Vote Injection, And Wormhole Attacks," Informatics Engineering, an International Journal (IEIJ), Vol. 2, No. 4, pp. 13-29, Dec. 2014.
  • J.K. Lee, S. M. Nam and T.H. Cho, "ENSP: Energy efficient Next hop Selection in a Probabilistic Voting-based Filtering Scheme using Fuzzy Logic," Informatics Engineering, an International Journal (IEIJ), Vol. 2, No. 4, pp. 1-11, Dec. 2014.
  • S. M. Nam and T.H. Cho, "A Method for Detecting Multiple Attacks against False Report Injection Attacks and Wormhole Attacks in Sensor Networks," Computer Applications: An International Journal (CAIJ), Vol. 1, No. 2, pp. 37-46, Nov. 2014.
  • S.M. Nam and T.H. Cho, "Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in Bandwidth-efficient Cooperative Authentications of WSNs," Advanced Computational Intelligence: An International Journal (ACII), Vol. 1, No. 2, pp.25-34, Oct. 2014.
  • S.M. Nam and T.H. Cho, "Selecting Votes for Energy Efficiency in Probabilistic Voting-based Filtering in Wireless Sensor Networks Using Fuzzy Logic," International Journal of Ambient Systems and Applications (IJASA), Vol. 1, No. 4, pp. 1-10, Dec. 2013.
  • S.M. Nam and T.H. Cho, "A Security Method for Multiple Attacks in Sensor Networks Against the False Report Injection Attack and the Sinkhole Attack," International Journal on Information Theory (IJIT), Vol. 2, No. 1/2/3/4, pp. 15-33, Oct. 2013.
  • H.W. Lee, S.M. Nam, and T.H. Cho, "A Key Level Selection within Hash Chains for the Efficient Energy Consumption in WSNs," International Journal of Ambient Systems and Applications (IJASA), Vol. 1, No. 3, pp. 1-15, Sep. 2013.
  • S.M. Nam and T.H. Cho, "An Energy Efficient Countermeasure Against Multiple Attacks of the False Data Injection Attack and False HELLO Flood Attack in the Sensor Networks," International Journal of Computational Science and Information Technology (IJCSITY), Vol. 1, No. 3, pp. 17-25, Aug. 2013.
  • J.K. Lee and T.H. Cho, "Number of Neighbour Nodes based Next Forwarding Nodes Determination Scheme for Energy Enhancement of WSNs using a Fuzzy System," International Journal of Computational Science and Information Technology (IJCSITY), Vol. 1, No. 3, pp. 41-50, Aug. 2013.
  • S.M. Nam and T.H. Cho, "Fuzzy-based Energy Efficient Method for Multiple Attacks in Sensor Networks: Against False Vote and Report Injection Attacks," International Journal on Cybernetics & Informatics (IJCI), Vol. 2, No. 2, pp. 1-12, Apr. 2013.
  • H.M. Choi, S.M. Nam and T.H. Cho, "A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks," Wireless Sensor Network, Vol. 5, No. 3, pp. 33-40, Mar. 2013.
  • H.W. Lee and T.H. Cho, "An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack," Wireless Sensor Network, Vol. 4, No. 8, pp. 185-190, Aug. 2012.
  • S.Y. Moon and T.H. Cho, "Energy Efficient Filtering Nodes Assignment Method for Sensor Networks Using Fuzzy Logic," Lecture Notes in Computer Science, Vol. 7389, pp. 293-300, Aug. 2012.
  • S.Y. Moon and T.H. Cho, "Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks," Wireless Sensor Network, Vol. 4, No. 8, pp. 185-190, Aug. 2012
  • S.M. Nam and T.H. Cho, "A Method for the Enhancement of the Detection Power and Energy Savings against False Data Injection Attacks in Wireless Sensor Networks," ICIC 2012, Lecture Notes in Computer Science, Vol. 7389, pp. 547-554 , Aug. 2012
  • J.W. Kim and T.H. Cho, "Control Scheme of the Neighbour information of Feedback Message Based on Beighbourhood Density in Insens," International Journal of Ad hoc, Sensor & Ubiquitous Computing(IJASUC), Vol. 3, No.2, pp. 13-20 , Apr. 2012
  • C.I. Sun and T.H. Cho, "Advanced Path Selection Method for Detection of False Reports in Statistical Filtering based WSNs," Lecture Notes in Computer Science, Vol. 7115, pp. 232-241, Jan. 2012
  • H.W. Lee, S.Y. Moon and T.H. Cho, "Probability Control for Verification of an Event Report Using Fuzzy System," Vol. 3, No. 12, pp. 371-377, Dec. 2011
  • S.M. Nam, C.I Sun and T.H. Cho, "Secure Path Cycle Selection Method Using Fuzzy Logic System for Improving Energy Efficiency in Statistical En-Route Filtering Based WSNs," Vol. 3, No. 11, pp. 357-361, Nov. 2011.
  • J.M. Kim and T.H. Cho, "A* based Cutting Plan Generation for Metal Grating Production," Lecture Notes in Artificial Intelligence, ACIIDS2011, LNAI 6592, part 2, pp. 402-410, Apr. 2011.
  • H. Park, S. Y. Moon and T.H. Cho, "A Region Segmentation Based Path Selection Method for WSNs," International Journal of Computer Science and Network Security, vol. 11, no. 2, pp. 88-93, Feb. 2011.
  • C. I Sun and T.H. Cho, "Path Selection Method for Reliable Data Transmission in Sensor Networks using GA," International Journal of Computer Science and Network Security, vol. 11, no. 2, pp. 208-212, Feb. 2011.
  • S.H. Lee and T.H. Cho, "Fuzzy Based Key Re-distribution Period Determination Method in Wireless Sensor Networks," Lecture Notes in Artificial Intelligence, ICIC2010, LNAI, pp. 495-502, Aug. 2010.
  • J.H. Kim and T.H. Cho, "Efficient Key Dissemination Method using Fuzzy logic Based Dynamic En-Route Filtering," Lecture Notes in Artificial Intelligence, ICIC2010, LNAI, pp. 511-518, Aug. 2010.
  • S.J. Lee, H.Y. Lee and T.H. Cho, "Environment-based Selection Method for En-route Filtering Scheme using Fuzzy Logic," Journal of Networks, vol. 5, no. 3, pp. 292-299, Mar. 2010.
  • C.I. Sun, T.H. Cho, "Fuzzy based Adaptive Threshold Determining Method in Sensor Networks," International Journal of Computer Science and Network Security, vol. 9, no. 8, pp. 94-98, Aug. 2009.
  • P.T. Nghiem, J.H. Kim, S.H. Lee and T.H. Cho, "A Coverage and Energy Aware Cluster-Head Selection Algorithm in Wireless Sensor Networks," Lecture Notes in Computer Science, Springer Verlag, LNCS 5754, pp. 696-705, Aug. 2009.
  • H.M. Choi and T.H. Cho, "Energy Efficient MAC length Determination Method for Statistical En-Route Filtering using Fuzzy Logic," Lecture Notes in Computer Science, Springer Verlag, LNCS 5754, pp. 686-695, Aug. 2009.
  • S.Y. Moon and T.H. Cho, "Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks," International Journal of Computer Science and Network Security, vol. 9, no. 7, pp. 118-122, July. 2009.
  • S.H. Lee and T.H. Cho, "The Fuzzy-based TTL (Time To Live) Determination for Improving The Energy Efficiency of The WODEM for Wormhole Attack In WSN," International Journal of Computer Science and Network Security, vol. 9, no. 7, pp. 107-112, July. 2009.
  • J.H. Kim and T.H. Cho, "Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report Injection by Replaying an attack," International Journal of Computer Science and Network Security, pp. 91-96, July. 2009.
  • P.T. Nghiem, S.J. Lee and T.H. Cho, "An energy-aware fuzzy-based en-route filtering scheme in wireless sensor networks," International Conference on Future Networks, pp. 28-32, Mar. 2009.
  • B.H. Kim and T.H. Cho, "Selective Sensor node Selection Method for making Suitable Cluster in Filtering-based Sensor Networks," Lecture Notes in Computer Science, Springer Verlag, LNCS 5226, pp. 636-643, Sep. 2008.
  • H.Y. Lee and T.H. Cho, "A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic," Lecture Notes in Computer Science, Springer Verlag, LNCS 5226, pp. 1234-1241, Sep. 2008.
    <
  • S.Y. Moon and T.H. Cho, "Verification Probability Control Method in Sensor Networks," International Journal of Computer Science and Network Security, vol. 8, no. 8, pp. 190-194, Aug. 2008.
  • M.H. Han, H.Y. Lee and T.H. Cho, "Fuzzy-Based Verification-Probability Determination Method for Dynamic Filtering in Sensor Networks," International Journal of Computer Science and Network Security, vol. 8, no. 8, pp. 132-136, Aug. 2008.
  • C.I. Sun and T.H. Cho, "Adaptive Threshold Determining Method for Statistical Filtering Scheme in Sensor Networks," International Journal of Computer Science and Network Security, vol. 8, no. 7, pp. 75-79, Jul. 2008.
  • S.J. Lee, H.Y. Lee and T.H. Cho, "A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Based on Fuzzy Logic," International Journal of Computer Science and Network Security, vol. 8, no. 4, pp. 155-159, Apr. 2008.
  • H.Y. Lee and T.H. Cho, "Statistical En-Route Filtering of Fabricated Reports in Ubiquitous Sensor Networks Based on Commutative Cipher," International Journal of Computer Science and Network Security, vol. 8, no. 3, pp. 216-221, Mar. 2008.
  • B.H. Kim and T.H. Cho, "Advanced Path Control Method for Filtering Secure Method in Sensor Networks," International Journal of Computer Science and Network Security, vol. 8, no. 3, pp. 13-19, Mar. 2008.
  • M.S. Kim and T.H. Cho, "An En-Route Filtering Method in Sensor Networks Using Decision Function," International Journal of Information Acquisition, vol. 4, no. 4, pp. 357-364, Dec. 2007.
  • C.I. Sun and T.H. Cho, "Path Selection Method for Statistical Filtering-Based Sensor Networks Using a Security Evaluation Function," International Journal of Computer Science and Network Security, vol. 7, no. 11, pp. 93-97, Nov. 2007.
  • H.Y. Lee and T.H. Cho, "A Report Generation Method for Defending False Negative Attacks in Ubiquitous Sensor Networks," International Journal of Computer Science and Network Security, vol. 7, no. 11, pp. 49-54, Nov. 2007.
  • B.H. Kim, J.M. Kim and T.H. Cho, "Advanced Redeployment Point Determining Method in Sensor Networks," International Journal of Computer Science and Network Security, vol. 7, no. 11, pp. 21-25, Nov. 2007.
  • B.H. Kim, H.Y. Lee and T.H. Cho, "Fuzzy Rule-based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks," International Journal of Information Acquisition, vol. 4, no. 3, pp. 273-280, Sep. 2007.
  • J.M. Kim and T.H. Cho, "Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic based Fitness Function," Lecture Notes in Computer Science, Springer Verlag, LNCS 4707, pp. 637-648, Aug. 2007.
  • H.Y. Lee and T.H. Cho, "Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks," Lecture Notes in Computer Science, Springer Verlag, LNCS 4706, pp. 573-583, Aug. 2007.
  • J.M. Kim and T.H. Cho, "Genetic Algorithm Based Routing Method for Efficient Data Transmission in Sensor Networks," Lecture Notes in Computer Science, Springer Verlag, LNCS 4681, pp. 273-282, Aug. 2007.
  • B.H. Kim, H.Y. Lee and T.H. Cho, "Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks," Lecture Notes in Computer Science, Springer Verlag, LNCS 4681, pp. 263-272, Aug. 2007.
  • M.S. Kim and T.H. Cho, "A Fuzzy-Based En-Route Filtering Scheme in Sensor Networks," Lecture Notes in Computer Science, Springer Verlag, LNCS 4681, pp. 230-239, Aug. 2007.
  • H.Y. Lee and T.H. Cho, "Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks," Lecture Notes in Computer Science, Springer Verlag, LNCS 4611, pp. 535-544, Jul. 2007.
  • H.Y. Lee and T.H. Cho, "Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks," Lecture Notes in Artificial Intelligence, Springer Verlag, LNAI 4570, pp. 64-73, Jun. 2007.
  • H.Y. Lee and T.H. Cho, "Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks," Lecture Notes in Computer Science, Springer Verlag, LNCS 4317, pp. 116-127, Dec. 2006.
  • H.Y. Lee and T.H. Cho, "Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks," Lecture Notes in Artificial Intelligence, Springer Verlag, LNAI 4293, pp. 112-121, Nov. 2006.
  • H.Y. Lee and T.H. Cho, "Fuzzy Based Security Threshold Determining for the Statistical En-Route Filtering in Sensor Networks," Enformatika, vol. 14, pp. 157-160, Aug. 2006.
  • J.M. Kim and T.H. Cho, "Adaptive Hierarchical Key Structure Generation for Key Management in Wireless Sensor Networks using A*," Enformatika, vol. 14, pp. 47-51, Aug. 2006.
  • T.H. Cho, J.W. Rozenblit and Bernard P.Zeigler, "Knowledge-Based Simulation Environment Techniques : A Manufacturing System Example," Control and Dynamic Systems. Academic Press, Inc., vol. 49, part 5, pp. 191-239, Jan. 1991.
    
    Copyright, 2013 by Spatiotemporal Intelligence Laboratory. All rights reserved.