{"id":56,"date":"2022-05-16T13:20:58","date_gmt":"2022-05-16T04:20:58","guid":{"rendered":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/?p=56"},"modified":"2026-02-26T00:37:44","modified_gmt":"2026-02-25T15:37:44","slug":"international-conference","status":"publish","type":"post","link":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/?p=56","title":{"rendered":"International Conference"},"content":{"rendered":"\n<h2>2025<\/h2>\n\n\n\n<ol><li>\uc784\uc815\ud604, CHEN CHANGWEN, \ubc15\ub178\uc131, \ub178\ubcd1\ud76c, Design and Implementation of a Modular Learning Management System (LMS) for Training Highly-skilled Equipment Maintenance Personnel, The 11th International Conference on Next Generation Computing (ICNGC 2025) (Dec, 2025)<\/li><li>\uc784\uc815\ud604, SHAN GAOYANG, \ub178\ubcd1\ud76c, FL-IoT: Integration of Federated Learning and oneM2M-based IoT Platform, International Conference on Electrical, Computer and Energy Technologies (ICECET 2025) (Jul, 2025)<\/li><li>CHANDROTH JISI, \ub178\ubcd1\ud76c, ALI JEHAD, KHALID MAIRA, MOHSIN AHMED RAZA, Deep Learning-Based Mixture-of-Experts Model for Enhanced Network Traffic Classification, The 39th International Conference on Information Networking 2025 (ICOIN 2025) (Jan, 2025)<\/li><li>MOHSIN AHMED RAZA, KHALID MAIRA, YAO YOUXUN, CHANDROTH JISI, ALI JEHAD, \ub178\ubcd1\ud76c,\u00a0Real-Time Driver Behavior Detection for Alert Using Bootstrapped Cross-Validation and Optimized Resnet-50,\u00a0The 39th International Conference on Information Networking 2025 (ICOIN 2025) (Jan, 2025)<\/li><li>KHALID MAIRA, MOHSIN AHMED RAZA, CHANDROTH JISI, ALI JEHAD, \ub178\ubcd1\ud76c,\u00a0Real-Time Anomaly Detection in Crowd Surveillance Using 3D ResNet and Optical Flow,\u00a0The 39th International Conference on Information Networking 2025 (ICOIN 2025) (Jan, 2025)<\/li><\/ol>\n\n\n\n<h2>2024<\/h2>\n\n\n<ol>\n<li>KHALID MAIRA, \ub178\ubcd1\ud76c, MOHSIN AHMED RAZA, Multi-Modal Anomaly Detection for River Network Systems Using the Graph Deviation Network (GDN) Framework, The 10th International Conference on Next Generation Computing (ICNGC 2024) (Nov, 2024)<\/li>\n<li>CHANDROTH JISI, \ub178\ubcd1\ud76c, ALI JEHAD, Performance evaluation of tree-based algorithms in intrusion detection system, The 10th International Conference on Next Generation Computing (ICNGC 2024) (Nov, 2024)<\/li>\n<li>Zhen Shen, \ub178\ubcd1\ud76c, Jie Song, Qingyang Zhang, Xiaoqing Wen, CQCTL: A Cost-Optimized and Quadruple-Node-Upset Completely Tolerant Latch Design for Safety-Critical Applications, 2024 IEEE International Test Conference in Asia (ITC-Asia) (Aug, 2024)<\/li>\n<li>\ub178\ubcd1\ud76c, \uc774\uaddc\ubbfc, \uc784\uc815\ud604, Soft Actor Critic Based End-to-End QoS Path Selection in Multi-Domain SDN Environments, World Congress in Computer Science, Computer Engineering and Applied Computing (CSCE 2024) (Jul, 2024)<\/li>\n<li>\uace0\uc601\ubc30, CHANDROTH JISI, TILEUTAY LAURA, \ub178\ubcd1\ud76c, Keun-Woo Lim, Empirical Distribution Ranking based Decision Tree Algorithm for building Intrusion Detection System in the Internet of Medical Things, IEEE AIoT 2024 (Jul, 2024)<\/li>\n<li>ZHANG CHUNJIONG, \ub178\ubcd1\ud76c, SHAN GAOYANG, Federated Anomaly Detection, 2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN2024) (Jun, 2024)<\/li>\n<li>\uc815\uc724\ud658, \ub178\ubcd1\ud76c, \uc784\uc815\ud604, \ucd5c\uadfc\uacbd, Deep Deterministic Policy Gradient-Based Load Balancing Method in SDN Environments , 2024 International Conference on Smart Applications, Communications and Networking (SmartNets) (May, 2024)<\/li>\n<li>CHEN HAICHUAN, \ub178\ubcd1\ud76c, SHAN GAOYANG, \uc784\uc815\ud604, \ucd5c\uadfc\uacbd, Sijung Kim, Visual Landmark Map-Based Spatial Recognition Using a Monocular Camera , 2024 IEEE International Conference on Consumer Electronics (ICCE) (Jan, 2024)<\/li>\n<\/ol>\n<h2>2023<\/h2>\n<ol>\n<li>\uc784\uc815\ud604, \ucd5c\uadfc\uacbd, \ubc15\uc6d0\ucca0, \ub178\ubcd1\ud76c, Simulation Architecture for Development of BLE-based Indoor Positioning Algorithm, The 9th International Conference on Next Generation Computing (ICNGC 2023) (Dec, 2023)<\/li>\n<li>ZHANG CHUNJIONG, \ub178\ubcd1\ud76c, SHAN GAOYANG, Poster: Dynamic Clustered Federated Framework for Multi-domain Network Anomaly Detection , CoNEXT2023 (Dec, 2023)<\/li>\n<li>SHAN GAOYANG, \ub178\ubcd1\ud76c, \ucd5c\uadfc\uacbd, Bluetooth Low Energy-based Adaptive Scheme for IoT Services , ICUFN2023 (Jul, 2023)<\/li>\n<li>\ub178\ubcd1\ud76c, \uc774\uc2b9\uc6b4, \ucd5c\uadfc\uacbd, Jinsuk Kang, SJ Kim, Mixed Reality-Enabled Multilateral Collaboration Application Platform with AI and IoT Convergence , 2023 IEEE International Conference on Consumer Electronics (ICCE) (Jan, 2023)<\/li>\n<\/ol>\n<h2>2022<\/h2>\n<ol>\n<li>ALI JEHAD, \ub178\ubcd1\ud76c, Muhammad Adnan, Rutvij H. Jhaveri, Thippa Reddy Gadekallu, A QoS-Aware Software Defined Mobility Architecture for Named Data Networking , IEEE GLOBECOM 2022 (Dec, 2022)<\/li>\n<li>SHAN GAOYANG, \ub178\ubcd1\ud76c, \uc774\ud638\uc9c4, Indoor Localization-based Energy Management for Smart Home , IEEE APPEEC 2022 (Nov, 2022)<\/li>\n<li>\uc720\ub300\ud558, \ub178\ubcd1\ud76c, SHAN GAOYANG, A Vision-based Indoor Positioning Systems utilizing Computer Aided Design Drawing , ACM MobiCom \u201922 , pp.880 -882 (Oct, 2022)<\/li>\n<li>\ucd5c\uadfc\uacbd, \ub178\ubcd1\ud76c, \ubc15\uc6d0\ucca0, \uc720\ub300\ud558, A Usecase of Design MR-IoT\/AI convergence Platform in Military Surveillance System , The 8th International Conference on Next Generation Computing (ICNGC 2022) (Oct, 2022)<\/li>\n<li>\uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, \uc774\ucca0\uc6c5, \uc774\ud638\uc9c4, Issues and Challenges on SDN-based Management for Future Tactical Networks , The 8th International Conference on Next Generation Computing (ICNGC 2022) (Oct, 2022)<\/li>\n<li>\uc720\ub300\ud558, \ub178\ubcd1\ud76c, CHEN HAICHUAN, SHAN GAOYANG, Case Studies on Augmented Reality (AR)-Enabled Indoor Localization Technologies and Services , The 8th International Conference on Next Generation Computing (ICNGC 2022) (Oct, 2022)<\/li>\n<li>CHANDROTH JISI, \ub178\ubcd1\ud76c, ALI JEHAD, Performance Analysis of Python Based SDN Controllers over Real Internet Topology , 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN) , pp.283 -288 (Jul, 2022)<\/li>\n<li>\uc774\uc2b9\uc6b4, \ub178\ubcd1\ud76c, SJ Kim, The Convergence System of an IoT Standard Service Platform and an Autonomous Drone , 2022 IEEE International Conference on Consumer Electronics (ICCE) (Jan, 2022)<\/li>\n<\/ol>\n<h2>2021<\/h2>\n<ol>\n<li>SHAN GAOYANG, \ub178\ubcd1\ud76c, \uc720\ub300\ud558, A Novel Synchronization Communication Scheme in Bluetooth Low Energy 5.0 for Internet of Things Application , The 7th International Conference on Next Generation Computing (ICNGC 2021) , pp.306 -308 (Nov, 2021)<\/li>\n<li>SJ Kim, \ub178\ubcd1\ud76c, \uc774\uc2b9\uc6b4, Microservice-Oriented Platform Architecture for the Convergence of IoT, MR and AI Mixed Applications , The 7th International Conference on Next Generation Computing (ICNGC 2021) , pp.331 -332 (Nov, 2021)<\/li>\n<li>\uc774\ucca0\uc6c5, \ub178\ubcd1\ud76c, \uc774\ud638\uc9c4, Design and Implementation of Riverbed Modeler based Multi-domain Integrated Tactical SDN Testbed , The 7th International Conference on Next Generation Computing (ICNGC 2021) , pp.333 -335 (Nov, 2021)<\/li>\n<li>ALI JEHAD, \ub178\ubcd1\ud76c, A Framework for Effective Switch Migration in Software-Defined Networks , The 7th International Conference on Next Generation Computing (ICNGC 2021) , pp.320 -321 (Nov, 2021)<\/li>\n<li>ALI JEHAD, \ub178\ubcd1\ud76c, An Efficient Approach for Load balancing in Software-Defined Networks , 2021 6th International Conference on Computing, Communication and Security (ICCCS) (Oct, 2021)<\/li>\n<li>\uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, \uc774\ucca0\uc6c5, Riverbed Modeler Reinforcement Learning M&amp;S Framework Supported by Supervised Learning , 2021 International Conference on Information Networking (ICOIN 2021) , pp.824 -827 (Jan, 2021)<\/li>\n<\/ol>\n<h2>2020<\/h2>\n<ol>\n<li>\ub178\ubcd1\ud76c, \uc774\uc2b9\uc6b4, SJ Kim, An Ongoing Study of Integrating IoT with Drones Towards an Open-sourced IoT Drone Platform , The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020) (Dec, 2020)<\/li>\n<li>\uc774\uc2b9\uc6b4, \ub178\ubcd1\ud76c, Interactive COVID-19 Data Visualization based on Mixed Reality and IoT platform , The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020) (Dec, 2020)<\/li>\n<li>ALI JEHAD, \ub178\ubcd1\ud76c, Byungkyu Lee, Jimyung Oh, Khalil Khan, An Effective Slave Controller Allocation in Software-Defined Networks , The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020) (Dec, 2020)<\/li>\n<li>PUSPITA RATIH HIKMAH, \ub178\ubcd1\ud76c, \uc774\uaddc\ubbfc, Byungkyu Lee, Jimyung Oh, Bandwidth Usage Utilization of Network Slicing Framework for 5G Key Technology , The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020) (Dec, 2020)<\/li>\n<li>ALI JEHAD, \ub178\ubcd1\ud76c, Byungkyu Lee, Jimyung Oh, Muhammad Adil, A Machine Learning Framework for Prevention of Software-Defined Networking controller from DDoS Attacks and dimensionality reduction of big data , 2020 International Conference on Information and Communication Technology Convergence (ICTC) (Oct, 2020)<\/li>\n<li>\uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, \uc774\ucca0\uc6c5, \uc815\uc724\ud658, Dong Kuk Ryu, Gyudong Park, SDN Simulator for Multi-Domain Heterogeneous Network , Wireless Telecommunications Symposium 2020 (WTS2020) (Apr, 2020)<\/li>\n<\/ol>\n<h2>2019<\/h2>\n<ol>\n<li>SYED IKRAM, \ub178\ubcd1\ud76c, Irfan Ud Din, Khalil Khan, Analysis of Group Based Contention in IEEE 802.11ah Networks , The 5th International Conference on Next Generation Computing (ICNGC 2019) (Dec, 2019)<\/li>\n<li>Martin Jaime-Viveros, \ub178\ubcd1\ud76c, \uae38\uc6b0\uadfc, \uc774\uae30\uc6a9, Abhijith Prabhu, SJ Kim, An Autonomous Control of an Aerial Robot Using an Ultrasonic Based Positioning System for Indoor Use , The 5th International Conference on Next Generation Computing (ICNGC 2019) (Dec, 2019)<\/li>\n<li>\uae38\uc6b0\uadfc, \ub178\ubcd1\ud76c, \uace0\uad11\ud45c, \ub958\uae30\uc5f4, \uc774\uae30\uc6a9, Design and Implementation of Streaming System for HoloLens with IoT Platform , The 5th International Conference on Next Generation Computing (ICNGC 2019) (Dec, 2019)<\/li>\n<li>\uc774\ucca0\uc6c5, \ub178\ubcd1\ud76c, Additional Control Message Handling Process to Improve Slot Utilization of the MANET Nodes which Firing Message Collide in Extended-Desync TDMA , The 5th International Conference on Next Generation Computing (ICNGC 2019) (Dec, 2019)<\/li>\n<li>\ucd5c\uadfc\uacbd, \ub178\ubcd1\ud76c, \uc774\uc2b9\uc6b4, SJ Kim, \uac15\uc9c4\uc11d, A Design of Safety and Disaster Response System with XR, IoT and LBS Convergence , 6th Annual Conference on Computational Science &amp; Commutational Intelligence (CSCI) (Dec, 2019)<\/li>\n<li>ALI JEHAD, \ub178\ubcd1\ud76c, A Framework for QoS-aware Class Mapping in Multi-domain SDN , 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (Oct, 2019)<\/li>\n<li>SHAN GAOYANG, \ub178\ubcd1\ud76c, \ucd5c\uadfc\uacbd, \uac15\uc9c4\uc11d, An Improved Neighbor Discovery Process in BLE 5.0 , 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (Oct, 2019)<\/li>\n<li>PUSPITA RATIH HIKMAH, \ub178\ubcd1\ud76c, SHAH SYED DANIAL ALI, \uc774\uaddc\ubbfc, \uac15\uc131\uc9c4, \uc624\uc9c0\uba85, Reinforcement Learning Based 5G Enabled Cognitive Radio Networks , 2019 International Conference on Information and Communication Technology Convergence (ICTC) (Oct, 2019)<\/li>\n<li>\uc2e0\ud0dc\uc601, \ub178\ubcd1\ud76c, Component Mapping Method for Indoor Localization System based on Mixed Reality , 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN) (Jul, 2019)<\/li>\n<li>\uae38\uc6b0\uadfc, \ub178\ubcd1\ud76c, \uace0\uad11\ud45c, \uc774\uc2b9\uc6b4, MR and IoT Convergence Platform with AI Support for Disaster Recognition , MobiSys 2019 (Jun, 2019)<\/li>\n<li>ALI JEHAD, \ub178\ubcd1\ud76c, \uc774\uc2b9\uc6b4, Poster: Using the analytical network process for controller placement in software defined networks , 17th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2019 (Jun, 2019)<\/li>\n<li>\uc774\uc2b9\uc6b4, \ub178\ubcd1\ud76c, ALI JEHAD, Performance Comparison of Software Defined Networking Simulators for Tactical Network: Mininet vs. OPNET , ICNC 2019 (Feb, 2019)<\/li>\n<li>\uac15\uc9c4\uc11d, \ub178\ubcd1\ud76c, \ud63c\ud569\ud604\uc2e4 \uae30\uc220\uc758 \uc9c0\ub2a5\ud615 \uc751\uc6a9\uc0b0\uc5c5 \uc801\uc6a9\uc5d0 \uad00\ud55c \uc5f0\uad6c , 2019\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (Jan, 2019)<\/li>\n<li>\uc774\uc2b9\uc6b4, \ub178\ubcd1\ud76c, \uc774\uaddc\ubbfc, \ucd5c\uadfc\uacbd, \uac15\uc9c4\uc11d, Integration of OneM2M-based IoT Service Platform and Mixed Reality Device , ICCE 2019 (Jan, 2019)<\/li>\n<\/ol>\n<h2>2018<\/h2>\n<ol>\n<li>\uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, \uac15\uc131\uc9c4, \uc624\uc9c0\uba85, Spectrum Sensing Ratio Control Method for Improve Utilization based on the PU History , The 4th International Conference on Next Generation Computing (ICNGC 2018) (Dec, 2018)<\/li>\n<li>\uc774\uc2b9\uc6b4, \ub178\ubcd1\ud76c, Implementation of Software-Defined Networking Testbed for a Multi-domain Environment with Distributed Controllers using OPNET , The 4th International Conference on Next Generation Computing (ICNGC 2018) (Dec, 2018)<\/li>\n<li>\uc774\ucca0\uc6c5, \ub178\ubcd1\ud76c, \uc774\uaddc\ubbfc, Analysis of the Effect of GNU-Radio Parameters on Spectrum Sensing Performance in USRP-based Embedded Testbed for IoT , The 4th International Conference on Next Generation Computing (ICNGC 2018) (Dec, 2018)<\/li>\n<li>\uae40\ub300\ud604, \ub178\ubcd1\ud76c, \ubc15\uc2b9\ud604, \uc774\uc2b9\uc6b4, IoT Platform Based Smart Parking Navigation System with Shortest Route and Anti-Collision , ISCIT&#8217;2018 (Sep, 2018)<\/li>\n<li>\uc774\ucca0\uc6c5, \ub178\ubcd1\ud76c, \uc774\uaddc\ubbfc, Adjustment of Firing Phase Changing Probability in Extended-Desync TDMA , Wireless Telecommunications Symposium (WTS) 2018 (Apr, 2018)<\/li>\n<li>\uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, \uc774\ucca0\uc6c5, MAC and Routing Support Cognitive Radio Integrated Multi-hop Testbed , Wireless Telecommunications Symposium (WTS) 2018 (Apr, 2018)<\/li>\n<\/ol>\n<h2>2017<\/h2>\n<ol>\n<li>\uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, A Survey of Bio-inspired Cognitive Radio Algorithm for Tactical Networks , The 3rd International Conference on Next Generation Computing (ICNGC 2017) , pp.337 -339 (Dec, 2017)<\/li>\n<li>SHAN GAOYANG, \ub178\ubcd1\ud76c, Comparison of BLE 4.2 Basic and BLE 5.0 Advanced Neighbor Discovery Processes , The 3rd International Conference on Next Generation Computing (ICNGC 2017) , pp.345 -347 (Dec, 2017)<\/li>\n<li>\uc774\ucca0\uc6c5, \ub178\ubcd1\ud76c, Implementation of AODV Protocol on Embedded Systems for MANET Testbeds , The 3rd International Conference on Next Generation Computing (ICNGC 2017) , pp.121 -124 (Dec, 2017)<\/li>\n<li>\uc774\uac15\ud601, \ub178\ubcd1\ud76c, \ub958\uae30\uc5f4, \uc774\uc2b9\uc6b4, Performance Monitoring and Analysis Architecture for Real Network Testbed , 2017 International Conference on Innovation, Management and Industrial Engineering (IMIE&#8217;2017) (Aug, 2017)<\/li>\n<li>\uae40\uc131\ub798, \ub178\ubcd1\ud76c, \ub958\uae30\uc5f4, \uc774\uaddc\ubbfc, Design of Cognitive Radio-based Gateway for the Open OCEAN IoT Platform , 2017 International Conference on Innovation, Management and Industrial Engineering (IMIE&#8217;2017) (Aug, 2017)<\/li>\n<li>\ubc30\ud64d\uc5f4, \ub178\ubcd1\ud76c, \ub958\uae30\uc5f4, \uc774\ucca0\uc6c5, Embedded System-based Bio-Inspired DESYNC-TDMA Design using USRP , International Conference on Information Technology and Computer Sciences 2017 (ITC&#8217;2017) (Aug, 2017)<\/li>\n<li>\ubc15\uc131\ubbf8, \ub178\ubcd1\ud76c, \ub958\uae30\uc5f4, \uc2e0\uc2b9\ud6c8, Network Monitoring and Security Control System Using Embedded Bridge Device , International Conference on Information Technology and Computer Sciences 2017 (ITC&#8217;2017) (Aug, 2017)<\/li>\n<li>\uc774\uc2b9\uc6b4, \uc2e0\uc2b9\ud6c8, \ub178\ubcd1\ud76c, Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning , ICUFN&#8217;2017 (Jul, 2017)<\/li>\n<li>\ubc15\ud604\uc7ac, \ub178\ubcd1\ud76c, \uc2e0\uc2b9\ud6c8, \uc774\uaddc\ubbfc, \uc624\uc9c0\uba85, Implementation of Multi-hop Cognitive Radio Testbed using Raspberry Pi and USRP , WTS 2017 (Apr, 2017)<\/li>\n<li>SHAN GAOYANG, \ub178\ubcd1\ud76c, \uc2e0\uc2b9\ud6c8, \uc774\ubcd1\uc6b1, Design and Implementation of Simulator for Analysis of BLE Broadcast Signal Collision , ICOIN&#8217;2017 (Jan, 2017)<\/li>\n<\/ol>\n<h2>2016<\/h2>\n<ol>\n<li>SYED IKRAM, \ub178\ubcd1\ud76c, Delay Analysis of IEEE 802.11e EDCA with Enhanced QoS for Delay Sensitive Applications , IPCCC&#8217;2016 CCNCPS Workshop , pp.1 -4 (Dec, 2016)<\/li>\n<li>\ub178\ubd09\uc218, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, \ud55c\uba85\ud6c8, \ud5c8\ubbf8\uc815, Tactical MANET Architecture for Unmanned Autonomous Maneuver Network , IEEE MILCOM&#8217;2016 , pp.1 -6 (Nov, 2016)<\/li>\n<li>\uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, \uc774\uaddc\ubbfc, \ucd5c\uadfc\uacbd, Effective Bandwidth Based Capacity Request for Real-Time Voice in GEO Satellite System , IEEE MILCOM&#8217;2016 , pp.1 -6 (Nov, 2016)<\/li>\n<li>\uc774\uc2b9\uc6b4, \ub178\ubcd1\ud76c, \uc2e0\uc2b9\ud6c8, \uc784\uc120\uc601, \uc774\ucca0\ud638, Implementation and vulnerability test of stealth port scanning attacks using ZMap of censys engine , IEEE ICTC&#8217;2016 , pp.681 -683 (Oct, 2016)<\/li>\n<li>\ubc15\ud55c\ubcc4, \ub178\ubcd1\ud76c, \uc2e0\uc2b9\ud6c8, \uc774\ucca0\ud638, Identification of hosts behind a NAT device utilizing multiple fields of IP and TCP , IEEE ICTC&#8217;2016 , pp.484 -486 (Oct, 2016)<\/li>\n<li>\uc784\uc120\uc601, \ub178\ubcd1\ud76c, \ub958\uae30\uc5f4, \uc2e0\uc2b9\ud6c8, Performance evaluation of network scanning tools with operation of firewall , ICUFUN&#8217;2016 , pp.876 -881 (Jul, 2016)<\/li>\n<li>\uc774\ubcd1\uc6b1, \ub178\ubcd1\ud76c, \uae40\uc6a9\ud604, \uc548\uba85\uae38, Worm Propagation Model for Cyber Warfare Modeling and Simulation in Tactical Networks , ACM MobiSys&#8217;16 Companion , pp.49 -49 (Jun, 2016)<\/li>\n<li>SHAN GAOYANG, \ub178\ubcd1\ud76c, Discovery of Disappeared Node in Large Number of BLE Devices Environment , ACM MobiSys&#8217;16 Companion , pp.77 -77 (Jun, 2016)<\/li>\n<li>\uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, A routing control overhead mitigation method for route setup in Cognitive Radio Networks , IEEE INFOCOM&#8217;2016 Workshop (Apr, 2016)<\/li>\n<li>SHAN GAOYANG, \ub178\ubcd1\ud76c, \uc784\uc120\uc601, Optimal AdvInterval for BLE Scanning in Different Number of BLE Devices Environment , IEEE INFOCOM&#8217;2016 Workshop (Apr, 2016)<\/li>\n<\/ol>\n<h2>2015<\/h2>\n<ol>\n<li>\ub178\ubd09\uc218, \uae40\uad11\uc218, \ub178\ubcd1\ud76c, \ubc15\ud718\uc131, \ud55c\uba85\ud6c8, \ud5c8\ubbf8\uc815, Distributed Call Admission Control for DESYNC-TDMA in Mobile Ad Hoc Networks , BICT 2015 (Dec, 2015)<\/li>\n<li>\uae40\uad11\uc218, \ub178\ubcd1\ud76c, \uc774\ucca0\uc6c5, \ub178\ubd09\uc218, \ud55c\uba85\ud6c8, Routing Metric based on Slot Length of AODV on Multihop DESYNC-TDMA , BICT 2015 (Dec, 2015)<\/li>\n<li>SHAN GAOYANG, \ub178\ubcd1\ud76c, \uace0\uc601\ubc30, \uae40\ubcf4\uc131, \ub0a8\uc1a1\ud604, \ubc15\ubcd1\ud6c8, A 3-Dimensional Triangulation Scheme To Improve The Accuracy of Indoor Localization for IoT Services , IEEE PACRIM 2015 (Aug, 2015)<\/li>\n<li>\uc774\ubcd1\uc6b1, \ub178\ubcd1\ud76c, \uace0\uc601\ubc30, \uae40\ubcf4\uc131, \uc774\uc2b9\uc6b4, \uc784\uc120\uc601, The Beacon Identification using Low Pass Filter for Physical Web based IoT Services , IEEE PACRIM 2015 (Aug, 2015)<\/li>\n<li>\uc774\ucca0\uc6c5, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, \ub178\ubd09\uc218, \ucd5c\uc99d\uc6d0, SMAT: Simulator Monitoring and Analysis Tool , IEEE ICUFN 2015 , pp.482 -485 (Jul, 2015)<\/li>\n<li>\uc774\ubbf8\ud61c, \ub178\ubcd1\ud76c, \uc774\ubcd1\uc6b1, \uc784\uc120\uc601, \uae40\ubcf4\ubbf8, Red-signal delay scheme to prevent vehicle accidents at the intersection , IEEE ICUFN 2015 , pp.232 -236 (Jul, 2015)<\/li>\n<li>SYED IKRAM, \ub178\ubcd1\ud76c, \uae40\ubcf4\uc131, \uc624\uc77c\ud601, A novel contention window backoff algorithm for IEEE 802.11 wireless networks , IEEE ICIS 2015 , pp.71 -75 (Jun, 2015)<\/li>\n<\/ol>\n<h2>2014<\/h2>\n<ol>\n<li>\uae40\uad11\uc218, \ub178\ubcd1\ud76c, \ub178\ubd09\uc218, \ucd5c\uc99d\uc6d0, Enhanced DESYNC-TDMA Algorithm for Efficient Packet Delivery in Distributed MANETs , ACM BICT&#8217;2014 (Dec, 2014)<\/li>\n<li>\ub178\ubd09\uc218, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, \uae08\ub3d9\uc6d0, \ucd5c\uc99d\uc6d0, Efficient and Adaptive Resource Allocation Scheme for Self-Organizing DESYNC TDMA Network , ACM BICT&#8217;2014 (Dec, 2014)<\/li>\n<li>\uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, \uc774\uaddc\ubbfc, ASPD: Adaptive Sensing Period Decision for Time-varying Channel in Military MANETs , IEEE MILCOM&#8217;2014 , pp.643 -648 (Oct, 2014)<\/li>\n<li>\uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, \uc774\uaddc\ubbfc, Tahoe-based Spectrum Sensing Period Decision in Cognitive Radio based Wireless Sensor Networks , UCAWSN&#8217;2014 (Jul, 2014)<\/li>\n<\/ol>\n<h2>2013<\/h2>\n<ol>\n<li>\uae40\uad11\uc218, \ub178\ubcd1\ud76c, \uae40\uc131\ubbfc, \ucd5c\uc2b9\uc624, A Push-Enabling Scheme for Live Streaming System in Content-Centric Networking , ACM Conext Student Workwhop&#8217;2013 , pp.1 -3 (Dec, 2013)<\/li>\n<li>\uae40\uc740\ud638, \ub178\ubcd1\ud76c, \uae40\ubcf4\uc131, Enhanced Message Concatenation(EMC) Scheme for QoS Provision in Multi-hop Combat Net Radio , IEEE MILCOM&#8217;2013 , pp.1057 -1062 (Nov, 2013)<\/li>\n<li>\uc774\uc2b9\ud604, \ub178\ubcd1\ud76c, \ub958\uae30\uc5f4, Pre-Authentication Information Exchange to Minimize Handoff Delay in SIP Mobility Environment , CAIPT&#8217;2013 (Jun, 2013)<\/li>\n<li>WELDU HAILE BERHE, \ub178\ubcd1\ud76c, \uae40\ubcf4\uc131, DARCAH: Distributed Approach to Rendezvous Channel Setup in Cognitive Radio Ad Hoc Networks , ICCM&#8217;2013 , Vol.14 , pp.445 -448 (Jun, 2013)<\/li>\n<li>\uae40\uc218\uc9c4, \ub178\ubcd1\ud76c, \ucd5c\uc2b9\uc624, A Survey of Attacks on the BitTorrent Protocol from Its Operational Viewpoints , ICCM&#8217;2013 , Vol.14 , pp.449 -452 (Jun, 2013)<\/li>\n<li>Saad Muhammad, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, \ucd5c\uc2b9\uc624, Cluster-based Mobility Support in Content-Centric Networking , ICCM&#8217;2013 , Vol.14 , pp.441 -444 (Jun, 2013)<\/li>\n<li>WELDU HAILE BERHE, \ub178\ubcd1\ud76c, \uae40\ubcf4\uc131, Deterministic Approach to Rendezvous Channel Setup in Cognitive Radio Networks , ICOIN&#8217;2013 , pp.690 -695 (Jan, 2013)<\/li>\n<li>\ucd5c\uc2b9\uc624, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, \uae40\uc131\ubbfc, Threat of DoS by Interest Flooding Attack in Content-Centric Networking , ICOIN 2013 , pp.315 -319 (Jan, 2013)<\/li>\n<li>\uae40\uc885\uc5f0, \ub178\ubcd1\ud76c, \uae40\ubcf4\uc131, An Enhanced DAP-NAD Scheme for Multi-hop Broadcast based on MIL-STD-188-220 Networks , ICACT 2013 , pp.552 -557 (Jan, 2013)<\/li>\n<li>\uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, Nguyen Tuan, \uae40\ub300\uc601, \ubc15\uc218\ubc94, Decentralized Spectrum Selection Algorithm to Consider Hardware Constraints in Cognitive Radio Ad-hoc Networks , ICACT 2013 , pp.755 -759 (Jan, 2013)<\/li>\n<li>\uae40\uc885\uc5f0, \ub178\ubcd1\ud76c, \uae40\uc740\ud638, \uc815\uc885\uad00, Additional Bump Slot Allocation Scheme for QoS guarantee of Urgent Messages in TDMA-based Tactical Wireless Networks , ICACT 2013 , pp.439 -444 (Jan, 2013)<\/li>\n<\/ol>\n<h2>2012<\/h2>\n<ol>\n<li>\uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, \ucd5c\uadfc\uacbd, Efficient Capacity Allocation for Real-Time Traffic in MF-TDMA based GEO Satellite Systems , CUTE 2012 (Dec, 2012)<\/li>\n<li>\uc774\uc131\ud615, \uae40\uc7ac\ud604, \ub178\ubcd1\ud76c, \uc774\ud604\uc9c4, \uae40\ud0dc\uc644, \uc2e0\uc0c1\ud5cc, \ud5c8\ubbf8\uc815, Active Buffer Management Algorithm for Silence Suppressed Voice Applications , MILCOM 2012 (Nov, 2012)<\/li>\n<li>\uc774\uc5f0\uc8fc, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, DDoS Attack by File Request Redirection in Kad P2P Network , IEEE CyberC&#8217;2012 (Oct, 2012)<\/li>\n<li>\uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, Nguyen Tuan, \uad8c\uc138\ud6c8, \uae40\uc885\uc5f0, \ubc15\uc218\ubc94, \ucd5c\uc815\uc6b1, Modeling and Simulation for Cognitive Radio Networks in OPNET , OPNETNWORK 2012 (Aug, 2012)<\/li>\n<li>\uae40\uc131\ubbfc, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, \uae40\ubcf4\uc131, \ucd5c\uc2b9\uc624, An Implementation of Content-Centric Network, using OPNET Modeler , OPNETWORK 2012 (Aug, 2012)<\/li>\n<li>Ismail Atif, \ub178\ubcd1\ud76c, Enhancing MIH for optimum network performance and handovers in heterogeneous networks , IEEE SECON&#8217;2012 (Jun, 2012)<\/li>\n<li>\uc774\uc5f0\uc8fc, \ub178\ubcd1\ud76c, \uad6c\ud61c\ub9bc, \uc774\ucca0\ud638, \ucd5c\uc2b9\uc624, Advanced node insertion attack with availability falsification in Kademlia-based P2P networks , ICACT&#8217;2012 (Feb, 2012)<\/li>\n<li>\uad6c\ud61c\ub9bc, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, \uc774\uc5f0\uc8fc, \uc774\ucca0\ud638, A DDoS attack by flooding normal control messages in Kad P2P networks , ICACT&#8217;2012 (Feb, 2012)<\/li>\n<\/ol>\n<h2>2011<\/h2>\n<ol>\n<li>\ucd5c\uadfc\uacbd, \ub178\ubcd1\ud76c, \uace0\uc601\ubc30, \ub958\uae30\uc5f4, Simulation Study on Performance Evaluation of MF-TDMA-based Military Satellite Communication Systems , International Conference on Information and Communication Technologies and Applications (Dec, 2011)<\/li>\n<li>\ub178\ubcd1\ud76c, \uae40\uc8fc\uc644, \ub958\uae30\uc5f4, Whitelist-based SIP Flooding Attack Detection Using a Bloom Filter , International Conference on Information and Communication Technologies and Applications , pp.191 -195 (Dec, 2011)<\/li>\n<li>\uc544\ud2f0\ud504, \ub178\ubcd1\ud76c, Adaptive Handovers in Heterogeneous Networks using Fuzzy MADM , IEEE ICMIC&#8217;2011 (Sep, 2011)<\/li>\n<li>\uae40\uad11\uc218, \ub178\ubcd1\ud76c, \uac15\uc9c4\uc11d, \uad6c\ud61c\ub9bc, \uc774\uc5f0\uc8fc, \uc7a5\uc900\uc601, A Mobility Management Framework for Group Mobility Models in Mobiel Networks , OPNETWORKS&#8217;2011 (Aug, 2011)<\/li>\n<li>\uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, \uace0\uc601\ubc30, \uc7a5\uc900\uc601, Control Packet Scheduling First for Fast Route Discovery in Tactical MANET , IEEE ICACT&#8217;2011 (Feb, 2011)<\/li>\n<li>\uae40\uad11\uc218, \ub178\ubcd1\ud76c, \uace0\uc601\ubc30, \uc190\uc758\uc2b9, \ucd5c\uc6b0\uc9c4, Survivability Measure for Multichannel MANETbased Tactical Networks , IEEE ICACT&#8217;2011 (Feb, 2011)<\/li>\n<\/ol>\n<h2>2010<\/h2>\n<ol>\n<li>\uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, \uae40\uad11\uc218, \ubc15\ud615\uc900, Label-Switched Multi-Path Routing for Mission-Critical Tactical Message Delivery , IEEE CUTE&#8217;2010 , pp.1 -6 (Dec, 2010)<\/li>\n<li>\ub178\uc0c1\ud638, \ub178\ubcd1\ud76c, \ubc15\ud615\uc900, \ubc31\uc740\uacbd, \uc190\uc758\uc2b9, \ucd5c\uc6b0\uc9c4, Group Mobility Model Based On Mobility Prediction in Tactical Network On-The-Move , IEEE CUTE&#8217;2010 , pp.1 -6 (Dec, 2010)<\/li>\n<li>\uc2e0\uc9c4\ubc30, \ub178\ubcd1\ud76c, TDMA frame format analysis for applying Policy based management to TDL system , IEEE CUTE&#8217;2010 , pp.1 -7 (Dec, 2010)<\/li>\n<li>\ubc15\ud615\uc900, \ub178\ubcd1\ud76c, Accurate Passive Bandwidth Estimation (APBE) in IEEE 802.11 Wireless LANs , IEEE CUTE&#8217;2010 , pp.1 -4 (Dec, 2010)<\/li>\n<li>\uace0\uc601\ubc30, \ub178\ubcd1\ud76c, \uc774\uc131\uc6d0, \uc784\uadfc\uc6b0, \ucd5c\uc9c0\uc6a9, A Reliable and Hybrid Multi-path Routing Protocol for Multi-Interface Tactical Ad Hoc Networks , IEEE MILCOM 2010 , pp.1531 -1536 (Nov, 2010)<\/li>\n<li>\uac15\uc9c4\uc11d, \ub178\ubcd1\ud76c, Development of tangible user interface for linking context modeling and 3D map in smartphone , 2010 International Congress on Ultra Modern Telecommunications and Control System and Workshops , pp.1 -6 (Oct, 2010)<\/li>\n<li>\uae40\uc885\uc6b1, \ud64d\ub9cc\ud45c, \uac15\uc11d\uc778, \ub178\ubcd1\ud76c, \uc774\uc131\uc6b1, Autonomous defense against Flooding-based Denial of Service of a SIP system , Applications and Technology Conference (LISAT), 2010 Long Island Systems , pp.1 -7 (May, 2010)<\/li>\n<li>\uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, \uad6c\ud61c\ub9bc, \uae40\uad11\uc218, \uae40\uc720\uc120, \uc9c4\uc885\uc0bc, Tactical network design and simulator with Wireless Mesh Network-based Backbone architecture , IEEE LISAT&#8217;2010 , pp.1 -5 (May, 2010)<\/li>\n<li>\uc815\uc885\uad00, \ub178\ubcd1\ud76c, \ub958\uae30\uc5f4, Mission-critical packet transfer with explicit path selection in WMN-based tactical networks , IEEE WTS&#8217;2010 , Vol.1 , No.1 , pp.1 -5 (Apr, 2010)<\/li>\n<\/ol>\n<h2>2009<\/h2>\n<ol>\n<li>\ub178\ubcd1\ud76c, Tactical Network Design and Simulator with Wireless Mesh Network-based Backbone Architecture , CEWIT 2009 , Vol.1 , No.1 , pp.1 -1 (Oct, 2009)<\/li>\n<li>\ud558\uc0c1\uc6a9, \ub178\ubcd1\ud76c, \uac15\uc0c1\uc6b1, \uae40\uc9c4\ucca0, Korean Public Sector Plan for the Enhancement of IPTV Service , IEEE ISCIT 2009 , Vol.1 , No.1 , pp.284 -289 (Sep, 2009)<\/li>\n<li>\ub178\ubcd1\ud76c, \uad6c\ud61c\ub9bc, \uae40\uc0c1\uc5b8, \uae40\uc720\uc120, \ubc15\uc601\uadfc, Data Delivery with end-to-end QoS Guarantee in Tactical Network Interconnected with Wireless Ad-hoc Network and Heterogeneous Networks , IEEE ICACT&#8217;2009 , Vol.2009 , No.1 , pp.804 -809 (Feb, 2009)<\/li>\n<li>\ub178\ubcd1\ud76c, \ud64d\uae30\ud0dc, Service Differentiation with the Adjustment of Remaining Backoff Time in IEEE 802.11 Wireless LAN , IEEE ICACT&#8217;2009 , Vol.2009 , No.1 , pp.1863 -1866 (Feb, 2009)<\/li>\n<\/ol>\n<h2>2008<\/h2>\n<ol>\n<li>\ub178\ubcd1\ud76c, \uae40\uc815\uc6b1, \ub958\uc81c\ud0dd, \ud64d\ub9cc\ud45c, \uae40\ud658\uad6d, Analysis and Its Solution on Security Threats in SIP-based Mobility Support Environment , IEEE Innovations&#8217;08 , Vol.5 , No.1 , pp.1 -5 (Dec, 2008)<\/li>\n<li>\ub178\ubcd1\ud76c, \uc774\uc815\ud6c8, \uc815\uc131\ub85d, An Optimized Node-Disjoint Multi-path Routing Protocol for Multimedia Data Transmission over Wireless Sensor Networks , International Workshop on Adaptation in Wireless Sensor Networks(AWSN) 2008 , Vol.1 , No.1 , pp.958 -963 (Dec, 2008)<\/li>\n<li>\ub178\ubcd1\ud76c, \ub958\uc81c\ud0dd, \uc815\ud604\ucca0, \ucc28\ud604\uc218, \uae40\uc815\uc6b1, Detection of SIP De-Registration and Call-Disruption Attacks Using a Retransmission Mechanism and a Countermeasure Scheme , SITIS &#8216;2008 , Vol.4 , No.1 , pp.650 -656 (Nov, 2008)<\/li>\n<li>\ub178\ubcd1\ud76c, \uae40\uc885\uc6b1, \ub958\uc81c\ud0dd, \ud64d\ub9cc\ud45c, On the Threat to SIP-based Applications and Corresponding Counteract Mechanisms , 2008 International Conference cutting Edge Wireless and Information Technology , Vol.1 , No.1 , pp.42 -42 (Oct, 2008)<\/li>\n<li>\ub178\ubcd1\ud76c, \uad6c\ud61c\ub9bc, \uae40\uc7ac\ud604, End-to-end QoS Architecture for Ubiquitous Military Tactical Networks in AJOU-TNRC , CEWIT 2008 , Vol.1 , No.1 , pp.44 -44 (Oct, 2008)<\/li>\n<li>\ub178\ubcd1\ud76c, \uae40\uc120\ud638, Classification of Patterns of Distributed Global-Scale Network Attacks in Highspeed Backbone Networks , ICESIT&#8217;2008 , Vol.1 , No.1 , pp.29 -33 (Feb, 2008)<\/li>\n<\/ol>\n<h2>2007<\/h2>\n<ol>\n<li>\ub178\ubcd1\ud76c, \uae40\ud6a8\uc21c, \ub958\uc81c\ud0dd, Sensor Backbone Network: New Paradigm to Deploy Sensor Networks and Application , International Conference on Next-Generation Computing 2007 , Vol.1 , No.1 , pp.1 -5 (Nov, 2007)<\/li>\n<li>\ub178\ubcd1\ud76c, \uad6c\ud61c\ub9bc, \uc774\uc815\ud6c8, A Cross-Layer based Channel Adaptation using Frame Skipping for Real-time Video Transmission , 4th Conference on New Exploratory Technologies , Vol.1 , No.1 , pp.799 -804 (Oct, 2007)<\/li>\n<li>\ub178\ubcd1\ud76c, \uae40\ud6a8\uc21c, Data Prefetching Using Cross Layer-based Estimation of Integrated Message Handover Time for Seamless Mobile Multimedia Services , 4th Conference on New Exploratory Technologies , Vol.1 , No.1 , pp.813 -817 (Oct, 2007)<\/li>\n<li>\ub178\ubcd1\ud76c, \uae40\uae30\ud615, \uc54c\ub9ac \ud558\ub9c8\ub4dc, \uc815\uc11d, Multiple Routers-based Architecture for IPv6-Based Wireless Sensor Netowrks(6LoWPANs) , 4th Conference on New Exploratory Technologies , Vol.1 , No.1 , pp.805 -808 (Oct, 2007)<\/li>\n<li>\ub178\ubcd1\ud76c, \uae40\ud6a8\uc21c, Reliable and Secure Authentication Protocol without Master Clock Information in Mobile IPv6 Route Optimization , ITC-CSCC 2007 , Vol.2 , No.1 , pp.879 -880 (Jul, 2007)<\/li>\n<\/ol>\n<h2>2005<\/h2>\n<ol>\n<li>\ub178\ubcd1\ud76c, \uae40\uc740\uc9c4, \uc720\uc2b9\ud654, Security Issues and Architecture for Protecting Privacy in RFID-based Service , CEWIT&#8217;2005 , Vol.1 , pp.37 (Dec, 2005)<\/li>\n<li>\uae40\uae30\ud615, Yasir Malik, \ub178\ubcd1\ud76c, \uc11c\ud604\uace4, Design of JXTA Super Peer Network over Wired and Wireless Network , Next Generation PC 2005 International Conference , Vol.1 , No.1 , pp.176 -181 (Nov, 2005)<\/li>\n<li>\ub178\ubcd1\ud76c, \uae40\uae30\ud615, \uae40\uc120\ud638, \uae40\uc740\uc9c4, \uc720\uc2b9\ud654, Security Issues of RFID-Based Services , Next Generation PC 2005 International Conference , Vol.1 , pp.69 -73 (Nov, 2005)<\/li>\n<li>\uc720\uc2b9\ud654, \uae40\ud76c\uc815, \ub178\ubcd1\ud76c, \uc774\uc6a9\ud658, Tree-Based Classification Algorithm of Unique Item ID for the Global RFID Network , Next Generation PC 2005 International Conference , Vol.1 , pp.33 -37 (Nov, 2005)<\/li>\n<\/ol>\n<h2>2004<\/h2>\n<ol>\n<li>\ub178\ubcd1\ud76c, \uc720\uc2b9\ud654, \ucd5c\uc6d0\uc900, A Modified Randomized Tree Walking Scheme for RFID Tag Security , CEWIT 2004 , Vol.1 , No.1 , pp.57 -57 (Nov, 2004)<\/li>\n<li>\uc720\uc2b9\ud654, \uace0\ud604\ubd09, \ub178\ubcd1\ud76c, A Router Advertisement Interval Adjustment Scheme Ti Improve Handoff Performance in Mobile IPv6 Environments , ICIS2004 , Vol.1 , No.1 , pp.282 -287 (Aug, 2004)<\/li>\n<li>\ub178\ubcd1\ud76c, \uae40\uc120\ud638, \uc720\uc2b9\ud654, \ubc15\uc6a9\ub300, An Efficient Motion Vector Estimation For Frame Skipping-Based Video Transcoding , ICIS 2004 , Vol.2004 , No.1 , pp.288 -292 (Aug, 2004)<\/li>\n<li>\uc720\uc2b9\ud654, \ub178\ubcd1\ud76c, \uc774\ud5a5\ud0dd, \uc870\uc6a9\ud604, An Adaptive Cluster Head Election Algorithm in Wireless Microsensor Networks , ICIS 2004 , Vol.2004 , No.1 , pp.242 -247 (Aug, 2004)<\/li>\n<li>\uc720\uc2b9\ud654, \uace0\ud604\ubd09, \ub178\ubcd1\ud76c, \ubc15\uc740\uc815, Multi-code Naming Service Architecture for the Global RFID Network , ICIS 2004 , Vol.1 , No.1 , pp.105 -110 (Aug, 2004)<\/li>\n<li>\ub178\ubcd1\ud76c, \uc720\uc2b9\ud654, \uc774\uc6a9\ud658, Traffic Characterization And Control Of Network Attacks With Spoofed IP Addresses On the Internet Backbone Links , SCI2004(8th World Multi-Conference on Systemics, Cybernetics and Informatics) , Vol.3 , No.1 , pp.379 -383 (Jul, 2004)<\/li>\n<li>\ub178\ubcd1\ud76c, \uc720\uc2b9\ud654, \uc804\uc6a9\uc7ac, \uae40\uc9c4\uc218, Traffic Characterization Of Nework Attack Flows On the Internet Backbone Links , Internet Computing 2004 (IC&#8217;2004) , Vol.1 , No.1 , pp.335 -338 (Jun, 2004)<\/li>\n<li>\ub178\ubcd1\ud76c, \uc720\uc2b9\ud654, \ucd5c\uc6d0\uc900, \ubbfc\uc2b9\uc6b1, Measures For Detecting Network Attacks At The Aggregate Traffic Level On High-Speed Internet Backbone Links , SAM&#8217;2004 , Vol.1 , No.1 , pp.173 -176 (Jun, 2004)<\/li>\n<li>\ub178\ubcd1\ud76c, \uace0\ud604\ubd09, \uc720\uc2b9\ud654, \ubc15\uc885\ud601, A Network Element Management System for Managing H.323 Gatekeepers , The 6th International Conference on Advanced Communication Technology , Vol.1 , No.2 , pp.782 -785 (Feb, 2004)<\/li>\n<\/ol>\n<h2>2003<\/h2>\n<ol>\n<li>\ub178\ubcd1\ud76c, \uc2e0\uc0c1\ucca0, An Empirical Study On Characteristics of Feedback Information For Streaming Real-Time Multimedia in the Internet , Internet Computing&#8217;03 , Vol.1 , pp.272 -277 (Jun, 2003)<\/li>\n<\/ol>\n<h2>2002<\/h2>\n<ol>\n<li>\ub178\ubcd1\ud76c, \uae40\ud76c\ub300, \uc720\uc2b9\ud654, Online RTP Packet Classification For The Real-Time Multimedia Traffic Management In the Internet , ICIS 2002(International Conference On Computer and Information Science) , Vol.1 , No.1 , pp.523 -528 (Aug, 2002)<\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>2025 \uc784\uc815\ud604, CHEN CHANGWEN, \ubc15\ub178\uc131, \ub178\ubcd1\ud76c, Design and Implementation of a Modular Learning Management System (LMS) for Training Highly-skilled Equipment Maintenance Personnel, The 11th International Conference on Next Generation Computing (ICNGC 2025) (Dec, 2025) \uc784\uc815\ud604, SHAN GAOYANG, \ub178\ubcd1\ud76c, FL-IoT: Integration of Federated Learning and oneM2M-based IoT Platform, International Conference on Electrical, Computer and Energy Technologies &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/?p=56\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;International Conference&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/posts\/56"}],"collection":[{"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=56"}],"version-history":[{"count":53,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/posts\/56\/revisions"}],"predecessor-version":[{"id":1525,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/posts\/56\/revisions\/1525"}],"wp:attachment":[{"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}