Skip to main content

and
  1. No Access

    Book and Conference Proceedings

    Advanced Computer Science and Information Technology

    Third International Conference, AST 2011, Seoul, Korea, September 27-29, 2011. Proceedings

    Tai-hoon Kim, Hojjat Adeli in Communications in Computer and Information Science (2011)

  2. No Access

    Book and Conference Proceedings

    Ubiquitous Computing and Multimedia Applications

    Second International Conference, UCMA 2011, Daejeon, Korea, April 13-15, 2011. Proceedings, Part II

    Tai-hoon Kim, Hojjat Adeli in Communications in Computer and Information Science (2011)

  3. No Access

    Book and Conference Proceedings

    Advanced Communication and Networking

    Third International Conference, ACN 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings

    Tai-hoon Kim, Hojjat Adeli in Communications in Computer and Information Science (2011)

  4. No Access

    Book and Conference Proceedings

    Ubiquitous Computing and Multimedia Applications

    Second International Conference, UCMA 2011, Daejeon, Korea, April 13-15, 2011. Proceedings, Part I

    Tai-hoon Kim, Hojjat Adeli in Communications in Computer and Information Science (2011)

  5. No Access

    Chapter and Conference Paper

    A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks

    Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections. MIPv6 allows a mobile node to transparently maintain connections while moving from o...

    Sunguk Lee, Taeheon Kang, Rosslin John Robles, Sung-Gyu Kim in Security Technology (2011)

  6. No Access

    Chapter and Conference Paper

    Internet SCADA Utilizing API’s as Data Source

    An Application programming interface or API is an interface implemented by a software program that enables it to interact with other software. Many companies provide free API services which can be utilized in ...

    Rosslin John Robles, Haeng-kon Kim in Security Technology, Disaster Recovery and… (2010)

  7. No Access

    Chapter and Conference Paper

    Communication Security for Control Systems in Smart Grid

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex,...

    Rosslin John Robles, Tai-hoon Kim in Security Technology, Disaster Recovery and… (2010)

  8. No Access

    Chapter and Conference Paper

    An Encryption Scheme for Communication Internet SCADA Components

    The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is consider...

    Rosslin John Robles, Tai-hoon Kim in Advanced Computer Science and Information Technology (2010)

  9. No Access

    Chapter and Conference Paper

    Security Encryption Scheme for Communication of Web Based Control Systems

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Tradit...

    Rosslin John Robles, Tai-hoon Kim in Signal Processing and Multimedia (2010)