Æȷοì
Kyuyong Shin
Kyuyong Shin
Professor in the Department of Computer Science, Korea Military Academy
kma.ac.krÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Treat-before-trick: Free-riding prevention for bittorrent-like peer-to-peer networks
K Shin, DS Reeves, I Rhee
2009 IEEE International Symposium on Parallel & Distributed Processing, 1-12, 2009
612009
T-Chain: A General Incentive Scheme for Cooperative Computing
K Shin, C Joe-Wong, S Ha, Y Yi, I Rhee, DS Reeves
IEEE/ACM Transactions on Networking 25 (4), 2122-2137, 2017
262017
Simplified clique detection for collusion-resistant reputation management scheme in p2p networks
HY Lee, JW Kim, K Shin
2010 10th International Symposium on Communications and Information ¡¦, 2010
172010
SVC-TChain: Incentivizing good behavior in layered P2P video streaming
P Rahimzadeh, C Joe-Wong, K Shin, Y Im, J Lee, S Ha
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
142017
The current applications and future directions of artificial intelligence for military logistics
KY Shin, JK Lee, KH Kang, WG Hong, CH Han
Journal of Digital Contents Society 20 (12), 2433-2444, 2019
122019
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
K Shin, DS Reeves
Journal of Network and Computer Applications 35 (1), 72-84, 2012
122012
Preventing misbehavior in cooperative distributed systems
K Shin
North Carolina State University, 2009
112009
Developing a digital twin and extended reality based future integrated combat training platform under 5g
K Shin, HJ Choi, S Park
Journal of Digital Contents Society 22 (4), 727-735, 2021
102021
Developing an XR based hyper-realistic counter-terrorism, education, training, and evaluation system
K Shin, S Lee
Convergence Security Journal 20 (5), 65-74, 2020
92020
A performance analysis of incentive mechanisms for cooperative computing
C Joe-Wong, Y Im, K Shin, S Ha
2016 IEEE 36th International Conference on Distributed Computing Systems ¡¦, 2016
92016
A study on building a cyber attack database using Open Source Intelligence (OSINT)
K Shin, J Yoo, C Han, KM Kim, S Kang, M Moon, J Lee
Convergence Security Journal 19 (2), 113-121, 2019
62019
A study on the concept of social engineering cyber kill chain for social engineering based cyber operations
K Shin, KM Kim, J Lee
Journal of The Korea Institute of Information Security & Cryptology 28 (5 ¡¦, 2018
62018
A Study on the Relationship between Social Engineering and Cyberspace Operations
J Kang, K Shin, J Yoo, J Kim, S Kang, H Lim, Y Kim
Ministry of Defense, 2017
62017
Developing an Augmented Reality-based Integrated Command and Control Platform under 5G Technologies and Its Applications
K Shin, W Lee, D Kim
Journal of Digital Contents Society 21 (5), 855-864, 2020
52020
A Study on the Concept of Social Engineering based Cyber Operations
K Shin, J Kang, J Yoo, J Kim, S Kang, H Lim, Y Kim
Journal of The Korea Institute of Information Security & Cryptology 28 (3 ¡¦, 2018
52018
Winnowing: Protecting p2p systems against pollution by cooperative index filtering
K Shin, DS Reeves, I Rhee, Y Song
North Carolina State University. Dept. of Computer Science, 2009
42009
A study on priority analysis of evaluation factors for cyber threats using open source intelligence (OSINT)
S Kang, M Moon, K Shin, J Lee
Convergence security journal 20 (1), 49-57, 2020
32020
A Methodology of Decision Making Condition-based Data Modeling for Constructing AI Staff
C Han, K Shin, S Choi, S Moon, C Lee, J Lee
Journal of Internet Computing and Services 21 (1), 237-246, 2020
32020
Design and implementation of the repository for archiving educational resources
J Lee, K Shin, J Yoo
The Journal of Korean Association of Computer Education 16 (6), 95-102, 2013
32013
Efficacy analysis for the Radar-based Artificial Intelligence (AI) Scientific Guard System based on AHP
M Moon, K Shin, H Lee, S Gwak
Convergence Security Journal 22 (5), 135-143, 2022
2022
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20