Ilsun You
TítolCitada perAny
Malware obfuscation techniques: A brief survey
I You, K Yim
2010 International conference on broadband, wireless computing …, 2010
4002010
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
1552017
Comparative handover performance analysis of IPv6 mobility management protocols
JH Lee, JM Bonnin, I You, TM Chung
IEEE Transactions on Industrial Electronics 60 (3), 1077-1088, 2012
1282012
Verifiable auditing for outsourced database in cloud computing
J Wang, X Chen, X Huang, I You, Y Xiang
IEEE transactions on computers 64 (11), 3293-3303, 2015
1002015
A chain-cluster based routing algorithm for wireless sensor networks
F Tang, I You, S Guo, M Guo, Y Ma
journal of intelligent manufacturing 23 (4), 1305-1313, 2012
882012
New order preserving encryption model for outsourced databases in cloud environments
Z Liu, X Chen, J Yang, C Jia, I You
Journal of Network and Computer Applications 59, 198-207, 2016
832016
A cross-layer protocol of spectrum mobility and handover in cognitive LTE networks
YS Chen, CH Cho, I You, HC Chao
Simulation Modelling Practice and Theory 19 (8), 1723-1744, 2011
742011
An optimization-based scheme for efficient virtual machine placement
F Song, D Huang, H Zhou, H Zhang, I You
International Journal of Parallel Programming 42 (5), 853-872, 2014
552014
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
J Su, D Cao, B Zhao, X Wang, I You
Future Generation Computer Systems 33, 11-18, 2014
502014
Design and implementation of a ubiquitous ECG monitoring system using SIP and the zigbee network
B Kim, Y Kim, IS Lee, I You
Future generation communication and networking (fgcn 2007) 2, 599-604, 2007
502007
N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network.
Z Yan, H Zhou, I You
JoWUA 1 (2/3), 52-70, 2010
492010
Guest editorial: A brief overview of data leakage and insider threats
CL Huth, DW Chadwick, WR Claycomb, I You
Information Systems Frontiers 15 (1), 1-4, 2013
412013
Smart collaborative caching for information-centric IoT in fog computing
F Song, ZY Ai, JJ Li, G Pau, M Collotta, I You, HK Zhang
Sensors 17 (11), 2512, 2017
352017
Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks
D Shin, V Sharma, J Kim, S Kwon, I You
IEEE Access 5, 11100-11117, 2017
332017
Residence energy control system based on wireless smart socket and IoT
KL Tsai, FY Leu, I You
IEEE Access 4, 2885-2894, 2016
332016
Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles
V Sharma, F Song, I You, M Atiquzzaman
Journal of Network and Computer Applications 97, 79-95, 2017
322017
Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices
F Lin, Y Zhou, X An, I You, KKR Choo
IEEE Consumer Electronics Magazine 7 (6), 45-50, 2018
312018
Secure and energy-efficient handover in fog networks using blockchain-based DMM
V Sharma, I You, F Palmieri, DNK Jayakody, J Li
IEEE Communications Magazine 56 (5), 22-31, 2018
312018
A smartphone-based wearable sensors for monitoring real-time physiological data
I You, KKR Choo, CL Ho
Computers & Electrical Engineering 65, 376-392, 2018
312018
Anomaly teletraffic intrusion detection systems on hadoop-based platforms: A survey of some problems and solutions
HDJ Jeong, WS Hyun, J Lim, I You
2012 15th International Conference on Network-Based Information Systems, 766-770, 2012
272012
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20