The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tae Ho Cho: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Won Young Lee, Hee Suk Seo, Tae Ho Cho
    Modeling of Policy-Based Network with SVDB. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:323-332 [Conf]
  2. Mi Ra Yi, Tae Ho Cho
    Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:71-80 [Conf]
  3. Hee Suk Seo, Tae Ho Cho
    Simulation of Network Security with Collaboration among IDS Models. [Citation Graph (0, 0)][DBLP]
    Australian Joint Conference on Artificial Intelligence, 2001, pp:438-448 [Conf]
  4. Hee Suk Seo, Tae Ho Cho
    Modeling and Simulation for Detecting a Distributed Denial of Service Attack. [Citation Graph (0, 0)][DBLP]
    Australian Joint Conference on Artificial Intelligence, 2002, pp:179-190 [Conf]
  5. Hee Suk Seo, Tae Ho Cho
    Application of Fuzzy Logic for Distributed Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:340-347 [Conf]
  6. Sang Hoon Chi, Tae Ho Cho
    Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:725-734 [Conf]
  7. Seung-Beom Baeg, Tae Ho Cho
    Transmission Relay Method for Balanced Energy Depletion in Wireless Sensor Networks Using Fuzzy Logic. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:998-1007 [Conf]
  8. Hee Suk Seo, Tae Ho Cho, Sung-Do Chi
    Modeling and Simulation of Distributed Security Models. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:809-818 [Conf]
  9. Sang Hoon Chi, Tae Ho Cho
    Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:58-67 [Conf]
  10. Hyung-Jong Kim, Joonmo Kim, Kang Shin Lee, Hongsub Lee, Tae Ho Cho
    Simulation-Based Security Testing for Continuity of Essential Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:567-576 [Conf]
  11. Hae Young Lee, Tae Ho Cho
    Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2006, pp:116-127 [Conf]
  12. Mi Ra Yi, Jihyun Hong, Tae Ho Cho
    Genetic Algorithms for Improving Material Utilization in Manufacturing. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:717-724 [Conf]
  13. Jong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim
    Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:374-385 [Conf]
  14. Mi Ra Yi, Tae Ho Cho
    Hierarchical Simulation Model with Animation for Large Network Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:456-460 [Conf]
  15. Hae Young Lee, Tae Ho Cho
    Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MICAI, 2006, pp:112-121 [Conf]
  16. Hee Suk Seo, Tae Ho Cho
    Distributed Security Agent Modeling in the Policy-Based Networking. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:782-786 [Conf]
  17. Mi Ra Yi, Tae Ho Cho
    Hierarchical simulation model with animation. [Citation Graph (0, 0)][DBLP]
    Eng. Comput. (Lond.), 2003, v:19, n:2-3, pp:203-212 [Journal]
  18. Jin Myoung Kim, Tae Ho Cho
    Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:637-648 [Conf]
  19. Hae Young Lee, Tae Ho Cho
    Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:573-583 [Conf]
  20. Byung Hee Kim, Hae Young Lee, Tae Ho Cho
    Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:263-272 [Conf]
  21. Mun Su Kim, Tae Ho Cho
    A Fuzzy-Based En-Route Filtering Scheme in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:230-239 [Conf]
  22. Jin Myoung Kim, Tae Ho Cho
    Genetic Algorithm Based Routing Method for Efficient Data Transmission in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:273-282 [Conf]
  23. Hae Young Lee, Tae Ho Cho
    Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2007, pp:64-73 [Conf]
  24. Hae Young Lee, Tae Ho Cho
    Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:535-544 [Conf]

  25. A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic. [Citation Graph (, )][DBLP]


  26. Energy Efficient MAC Length Determination Method for Statistical En-Route Filtering Using Fuzzy Logic. [Citation Graph (, )][DBLP]


  27. A Coverage and Energy Aware Cluster-Head Selection Algorithm in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  28. Efficient Key Dissemination Method Using Fuzzy Logic Based Dynamic En-route Filtering. [Citation Graph (, )][DBLP]


  29. Fuzzy Based Key Re-distribution Period Determination Method in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  30. Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. [Citation Graph (, )][DBLP]


  31. Efficient selection method of message authentication codes for filtering scheme in sensor networks. [Citation Graph (, )][DBLP]


  32. Energy efficient filtering method in sensor networks. [Citation Graph (, )][DBLP]


  33. A* -based layout design for gratings allocation. [Citation Graph (, )][DBLP]


  34. A*-based key tree structure generation for group key management in wireless sensor networks. [Citation Graph (, )][DBLP]


  35. A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.311secs, Finished in 0.313secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002