Follow
Chunghyo Kim
Chunghyo Kim
KEPCO
Verified email at kepco.co.kr
Title
Cited by
Cited by
Year
High speed decoding of context-based adaptive binary arithmetic codes using most probable symbol prediction
CH Kim, IC Park
2006 IEEE International Symposium on Circuits and Systems (ISCAS), 4 pp., 2006
462006
Parallel decoding of context-based adaptive binary arithmetic codes based on most probable symbol prediction
CH Kim, IC Park
IEICE transactions on information and systems 90 (2), 609-612, 2007
192007
Device and method for calculating stability and predicting error of power system network
CH Kim, YH Lim, SH Ju, KS Jeon, JK Kim, CH Sung
US Patent 10,394,975, 2019
82019
System and method for unidirectional data transmission
JM Baek, MS Choi, CH Kim, Y Chang, BG Min, WN Kim, MS Jang, JH Yun
US Patent 9,397,790, 2016
82016
Security data extraction from IEC 61850 ACSI models for network and system management
CH Kim, MS Choi, SH Ju, YH Lim, JM Baek
International Workshop on Information Security Applications, 142-150, 2011
62011
A guide to design of security protocol for advanced metering infrastructure
MS Choi, SO Kim, CH Kim, SH Ju, YH Lim, JM Baek
Proc. Int. Workshop Info. Sec. Appl.(WISA), 2011
42011
System and method for providing information on current state of business of local goods or services provider
YS Lee, C Kim, JS Bae
US Patent App. 15/569,725, 2018
22018
Security Architecture for Advanced Metering Infrastructure
S Ju, M Choi, C Kim, Y Lim
Advances in Computer Science: An International Journal 2 (3), 71-75, 2013
22013
Apparatus and method for generating data quality information of electric power equipment
CH Kim, JC Yoon, YS Lee, YH Lim, SH Ju
US Patent 11,657,031, 2023
2023
Apparatus and method for detecting abnormal behavior
Y Lim, SH Ju, C Kim, K Yoo-Jin
US Patent 10,356,113, 2019
2019
Development of Low Latency Secure Communication Device for Legacy SCADA
MS Choi, CH Kim, YS Lim, SH Ju, YH Lim, KS Jeon
Journal of the Korea Institute of Information Security & Cryptology 23 (2 …, 2013
2013
The Implementation of BPLC based AMR security Module
J Baek, C Kim, M Choi
Proceedings of the KIPE Conference, 390-391, 2011
2011
The study of BPLC security technology trend
J Baek, S Ju, C Kim
Proceedings of the KIPE Conference, 392-393, 2011
2011
Design of Secure multi-server AMR Model in BPLC network
JM Baek, CH Kim, SH Ju
Proceedings of the Korean Society of Computer Information Conference, 321-322, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–14