- Eissa Tameem and Gihwan Cho, "¡°Lightweight Anti-Censorship Online Network for Anonymity and Privacy in Middle Eastern Countries,¡± International Arab Journal of Information Technology, IAJIT First Online Publications Dec. 2015
- A. S. M. Sanwar Hosen, Jong Seon Park and Gi Hwan Cho, ¡°Utilizing the Virtual Triangulation for Wireless Indoor Localization of Mobile Devices with Channel State Information,¡± International Journal of Multimedia and Ubiquitous Engineering (IJMUE), 10 (8), ISSN 1975-0080, SERSC, pp. 265-276, Aug 2015
- Gideon Rajan and Gihwan Cho, "Applying a Security Architecture with Key Management Framework to the Delay/Disruption Tolerant Networks,¡± International Journal of Security and Its Applications (IJSIA), 9 (4), ISSN 1738-9976, SERSC, pp. 327-336, April 2015
- Sung-Jin Go and Gihwan Cho, "An Improved Similarity Measurement Method of WBS Payload Attribution Scheme for Network Forensic,¡± International Journal of Software Engineering and Its Applications (IJSEIA), 9 (4), ISSN 1738-9984, SERSC, pp. 1-10, April 2015
- Jeong-Woo Yang and Gi-hwan Cho, "Utilizing CSI to Improve Distance Estimation Precision in the Indoor Environment,¡± International Journal of Software Engineering and Its Applications (IJSEIA), 9 (3), ISSN 1738-9984, SERSC, pp. 49-56, Mar. 2015
- Eissa Tameem and Gihwan Cho, "Providing Privacy and Access Control in Cloud Storage Services Using a KPABE System with Secret Attributes,¡± Arabian Journal for Science and Engineering, 39 (11), Springer, ISSN: 1319-8025, pp. 7877-7884, Nov. 2014
- Gicheol Wang, Sangwon Bang, and Gihwan Cho, "Secure Cluster Formation Employing Two-hop Conformity Verification in Wireless Sensor Networks,¡± Applied Mathematics & Information Sciences, 8 (1L), ISSN 2325-0399 (online), ISSN 1935-0090 (print), Natural Sciences Publishing, pp. 175-184, April 2014
- Gicheol Wang and Gihwan Cho, "Securing Cluster Formation and Cluster Head Elections in Wireless Sensor Networks,¡± International Journal of Communication Networks and Information Security (IJCNIS), 6 (1), ISSN 2076-0930, KUST, pp. 70-88, April 2014
- Dolgormaa Bayarjargal, Gihwan Cho, "Detecting an Anomalous Traffic Attack Area based on Entropy Distribution and Mahalanobis Distance,¡± International Journal of Security and Its Applications, 8 (2), ISSN 1738-9976, SERSC, pp. 87-94, Mar. 2014
- Seungmin Park, A. S. M. Sanwar Hosen, and Gihwan Cho, "An DDS based Architecture in Supporting of Data Centric Wireless Sensor Network Environments,¡± International Journal of Control and Automation (IJCA),7 (1), ISSN 2005-4297, SERSC, pp. 251-258, Jan. 2014
- Haeng-Gon Lee, Jung-Suk Song, Sang-Soo Choi and Gi-Hwan Cho, "An Advanced Incident Response Methodology based on Correlation Analysis of Polymorphic Security Events,¡± IEICE Transactions on Communications, E96-B (7), The Institute of Electronics, Information and Communication Engineers, ISSN 0916-8516, pp. 1803-1813, July 2013
- Gicheol Wang and Gihwan Cho, "Reputation-based Cluster Head Elections in Wireless Sensor Networks,¡± Simulation (Transactions of the Society for Modelling and Simulation International), 89 (7), SAGE, ISSN: 0037-5497, pp. 829-845, July 2013
- Do-sik An, Byong-lae Ha and Gi-hwan Cho, "A Robust Trust Management Scheme against the Malicious Nodes in Distributed P2P Network,¡± International Journal of Security and Is Applications, 7 (3), ISSN 1738-9976, SERSC, pp. 317-326, May. 2013.
- Gicheol Wang, Dongkyun Kim, and Gihwan Cho, "A Secure Cluster Formation Scheme in Wireless Sensor Networks,¡± International Journal of Distributed Sensor Networks, vol. 2012, Article ID 301750, 14 pages, Oct. 2012.
- Gicheol Wang and Gihwan Cho, "Secure Cluster Head Election Using Mark Based Exclusion in Wireless Sensor Networks,¡± IEICE Transactions on Communications, E93-B (11), The Institute of Electronics, Information and Communication Engineers, pp. 2925-2935, Nov. 2010.
- Gicheol Wang and Gihwan Cho, "Proactive Key Variation Owing to Dynamic Clustering(PERIODIC) in Sensor Networks," Security of Self-organizing Networks: MANET, WSN, WMN, VANET (Book Chapter 18), CRC Press, pp. 437-465, Oct. 2010.
- Gicheol Wang, Kang-Suk Song, and Gihwan Cho, "DIRECT : Dynamic Key Renewal using Secure Cluster Head Election in Wireless Sensor Networks,¡± IEICE Transactions on Information and Systems, E93-D (6), The Institute of Electronics, Information and Communication Engineers, pp. 1560-1571, June 2010.
- Gicheol Wang, Seunghae Kim, Daewook Kang, Deokjai Choi and Gihwan Cho, "Lightweight Key Renewals for Clustered Sensor Networks,¡± Journal of Networks, 5 (3), Academy Publisher, pp. 300-312, March 2010.
- Gicheol Wang and Gihwan Cho, "Secure Cluster Head Sensor Elections using Signal Strength Estimation and Ordered Transmissions,¡± Sensors, 9 (6), MDPI(Molecular Diversity Preservation International), pp. 4709-4727, June 2009.
- Gicheol Wang and Gihwan Cho, "Clustering-based Key Renewals for Wireless Sensor Networks,¡± IEICE Transactions on Communications, E92-B (2), The Institute of Electronics, Information and Communication Engineers, pp. 612-615, Feb. 2009.
- Gicheol Wang and Gihwan Cho, "Pairwise Key Establishments without Key Pre-distribution for Mobile Ad hoc Network Environment,¡± IEE Proceeding of Communications, 153 (6), IEE, pp. 822-827, Dec. 2006, currently IET Communications
- Gicheol Wang and Gihwan Cho, "Compromise-Resistant Pairwise Key Establishments for Mobile Ad hoc Networks,¡± ETRI Journal, 28 (3), pp. 375-378, 2006. 6.
- Gicheol Wang and Gihwan Cho, "An On-demand Cluster Formation Scheme for Efficient Flooding in Ad-hoc Networks,¡± IEICE Transactions on Communications, E88-B (9), The Institute of Electronics, Information and Communication Engineers, pp. 3563-3569, 2005. 9.
- Seungmin Park, Daeyoung Kim and Gihwan Cho, "Improving Prediction Level of Prefetching for Location-aware Mobile Information Service,¡± Future Generation Computer Systems, 20 (2), Elsevier, pp. 197-203, 2004. 2.
- Gihwan Cho, "A Location Management Scheme Supporting Route Optimization for Mobile Hosts," Journal of Network and Systems Management, Vol. 6, No. 1, pp. 31-50, Mar. 1998
.
- Gihwan Cho, Lindsay F. Marshall, "An Efficient Location and Routing Scheme for Mobile Computing Environments," IEEE Journal on Selected Areas in Communications, Vol. 13, No. 5, pp. 868-879, June. 1995
.
Domestic Journals
- ±èÅ¿¬, Á¶±âȯ, ¡°Å¬¶ó¿ìµå ÄÄÇ»ÆÃ¿¡¼ µ¿Àû µ¥ÀÌÅÍ ¹«°á¼ºÀ» À§ÇÑ °³¼±µÈ °¨»ç ½Ã½ºÅÛ (A Novel Auditing System for Dynamic Data Integrity in Cloud Computing),¡± Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö, 19 (8), pp. 1818-1824, 2015. 8.
- ¹ÚÁ¾¼±, ÀåÇöÈñ, Á¶±âȯ, ¡°UDT ÇÃ·Î¿ì °£ °øÆò¼º Çâ»óÀ» À§ÇÑ È¥Àâµµ ±â¹ÝÀÇ °¡¿ë´ë¿ªÆø ÃßÁ¤ ±â¹ý (Congestion Degree based Available Bandwidth Estimation Method for Enhancement of UDT Fairness)," ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 52 (7), pp. 1287-1297, 2015. 7.
- ¿Õ±âö, Á¶Áø¿À, Á¶±âȯ, ¡°±¹³» ±Û·Î¹ú ¹«¼±·£ ·Î¹Ö ±¸Ãà ÇöȲ ¹× ¹ßÀü¹æ¾È(Global Wireless LAN Roaming Status in Korea and Its Development Methods)," ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 52 (7), pp. 1239-1245, 2015. 7.
- ¹ÚÁ¤¿í, Á¶±âȯ, "³»ºÎ ³×Æ®¿öÅ©¿¡¼ ¾Ë·ÁÁöÁö ¾ÊÀº Çǽ̻çÀÌÆ® ŽÁö¹æ¾È (A Unknown Phishing Site Detection Method in the Interior Network Environment)," Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, 25 (2), pp. 313-320, 2015. 4.
- Gicheol Wang and Gihwan Cho, ¡°Securing Cluster Head Elections in Wireless Sensor Networks,¡± Journal of Advances in Computer Networks, 2 (4), pp. 243-247, ISSN: 1793-8244, Dec. 2014. (Jul. 2014 online)
- ¾çÁ¤¿ì, ¾È°³ÀÏ, ±è½ÅÈ¿, Á¤º´È£, ±èÅ¿¬, Æí±âÇö, Á¶±âȯ, ¡°WLAN ÀüÆÄƯ¼º ±â¹Ý ½Ç³» À§Ä¡¼³Á¤À» À§ÇÑ À̵¿´Ü¸»ÀÇ °Å¸®ÃßÁ¤ ±â¹ý (A Distance Estimation Scheme Based on WLAN RF Properties for Localization of Mobile Terminals),¡± Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö,39B (7), pp. 449-458, 2014. 7.
- °íºÀ±¸, ¹ÚÁ¾¼±, Á¤¼ºÁ¾, Á¶±âȯ, ¡°Ä·ÆÛ½º ȯ°æ¿¡¼ ÀûÀÀÀûÀÎ Á¤º¸º¸¾ÈÀ» À§ÇÑ ÅëÇÕ º¸¾ÈÁ¤Ã¥ÀÇ ¼³°è (A Design of Integrated Security Polices for Enabling Adaptive Security in Campus Environment),¡± Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö,18 (3), pp. 617-624, 2014. 3.
- ¹ÚÁ¾¼±, Á¶±âȯ, ¡°°í¼Ó³×Æ®¿öÅ©¿¡¼ ³×Æ®¿öÅ© È¥Àâ»óÅ¿¡ ÀûÀÀÀûÀÎ UDT º´·ÄÀü¼Û ±â¹ý (UDT Parallel Transfer Technologies Adaptive to Network Status in High Speed Network),¡± ½º¸¶Æ®¹Ìµð¾îÀú³Î, Çѱ¹½º¸¶Æ®¹Ìµð¾îÇÐȸ, 2 (4), pp. 51-59, 2013. 12.
- ¿Õ±âö, Á¶±âȯ, ¡°¹«¼± ¼¾¼ ³×Æ®¿öÅ©¸¦ À§ÇÑ ½Å·Ú ±â¹ÝÀÇ ¾ÈÀüÇÑ Å¬·¯½ºÅÍ Çìµå ¼±Ãâ (Secure Cluster Head Election based on Trust for Wireless Sensor Networks),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 50 (10), pp. 2502-2516, 2013. 10.
- ±èÅ¿¬, ¾Èµµ½Ä, Á¶±âȯ, ¡°Â÷·® ³×Æ®¿öÅ©¿¡¼ °ÇÑ ÀÍ¸í¼ºÀÌ Áö¿øµÇ´Â ÀÎÁõ ÇÁ·ÎÅäÄÝÀ» À§ÇÑ È®·ü·ÐÀû Á¢±Ù¹æ½Ä (A Probabilistic Approach for Robust Anonymous Authentication Protocol in VANETs),¡± Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö, 17 (10), pp. 2309-2315, 2013. 10.
- ±èº¹¼ø, ¹ÚÃá°É, ÀÓÇü¹¬, Á¶±âȯ, ¡°¸ð¹ÙÀÏ ¾ÛÀ» ÅëÇÑ »ç¿ëÀÚ Âü¿© ±â¹ÝÀÇ ½º¸¶Æ® Æ®·¡ÇÈ °ü¸® ¹æ¾È ¹× ½Ã½ºÅÛ ¼³°è (A Smart Traffic Management Scheme and Its System Design based on User¡¯s Participating with the Mobile Application),¡± Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö, 38C (8), pp. 674-682, 2013. 8.
- ±èº¹¼ø, ¹é±¤Çö, Á¶±âȯ, ¡°VoIP¿Í VoLTE À½¼º ǰÁú ÃøÁ¤À» À§ÇÑ ÅëÇÕ E-model ±¸Çö (An Integrated E-model Implementation for Speech Quality Measurement in VoIP and VoLTE),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 50 (7), pp. 1638-1646, 2013. 7.
- °íºÀ±¸, Á¤¼ºÁ¾, Á¶±âȯ, "ARP spoofing ¹ÙÀÌ·¯½º¿¡ °¨¿°µÈ ´Ü¸»À» È¿À²ÀûÀ¸·Î ºÐ¸®Çϱâ À§ÇÑ ³×Æ®¿öÅ© °ü¸®½Ã½ºÅÛÀÇ ¼³°è (A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus)¡± Çѱ¹Á¤º¸Åë½ÅÇÐȸ³í¹®Áö, 17 (3), pp. 641-648, 2013. 3.
- ¹ÚÁ¾¼±, ¿Õ±âö, ±è½ÂÇØ, Á¶±âȯ, "UDT º´·ÄÀü¼Û ÇÁ·ÎÅäÄÝÀ» À§ÇÑ Ã¤³Î¼ö ¿¹Ãø±â¹ý (On Predicting Method of the Number of Channels for UDT Parallel Transfer Protocol),¡± Á¤º¸°úÇÐȸ³í¹®Áö: Á¤º¸Åë½Å, 40 (1), pp. 12-18, 2013. 2.
- ¿¡ÀÌ¿¡½º¿¥ »ê¿Í¸£ È£¼¾, ÀÌÇõ·Î, Á¶±âȯ, "¹«¼±¼¾¼³×Æ®¿öÅ©¸¦ À§ÇÑ ¿¡³ÊÁö ÀÎÁöÇü ³×Æ®¿öÅ© ±¸¼º ¹× ¶ó¿ìÆÃ ±â¹ý (AN Envergy Aware Network Construction and Routing Method for Wireless Sensor Network),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 49 (9), pp. 225-233, 2012. 9.
- ¿Õ±âö, Á¶±âȯ, "¹«¼± ¼¾¼ ³×Æ®¿öÅ©¿¡¼ ¾ÈÀüÇÑ Å¬·¯½ºÅÍ ±¸¼º ¹æ¾È (A Secure Cluster Formation Scheme in Wireless Sensor Networks),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 49 (8), pp. 84-97, 2012. 8.
- ÀÌÇà°ï, ÃÖ»ó¼ö, ¼ÛÁß¼®, Á¶±âȯ, "º¸¾ÈÀ̺¥Æ® ¿¬°ü°ü°èºÐ¼® ±â¹ÝÀÇ È¿À²ÀûÀÎ º¸¾È°üÁ¦Ã¼°è ¿¬±¸ (An Efficient Security Monitoring Scheme Based on Correlation Analysis of Multiple Security Events),¡± Çѱ¹Áö½ÄÁ¤º¸±â¼úÇÐȸ ³í¹®Áö, 7 (2), pp. 49-58, 2012. 4.
- ¹ÚÁ¾¼±, ±è½ÂÇØ, Ȳ°ÇÁØ, Á¶±âȯ, "UDT ±â¹ÝÀÇ ´ë¿ë·® µ¥ÀÌÅÍ Àü¼Ûµµ±¸ ¼³°è ¹× ±¸Çö (A Design and Implementation of Bulk Data Transmission Tool based on UDT),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 49 (2), pp. 23-31, 2012. 2.
- ÀÌ´ëÈ£, Á¶±âȯ, "Ãʵî Á¤º¸Åë½Å À±¸®¼öÁØ °³¼±À» À§ÇÑ »ç·Ê±â¹Ý ±³¼öÇнÀ¸ðÇü (A Case based Multiplex Teaching and Learning Model to Improve the Educational Level of Information and Communication Ethics in Elementary School),¡± ÄÄÇ»Åͱ³À°ÇÐȸ ³í¹®Áö, 14 (6), pp. 31-40, 2011. 11.
- ÀÌ´ëÈ£, Á¶±âȯ, "Ãʵî Á¤º¸Åë½ÅÀ±¸® ±³À°¼öÁØ Á¦°í¸¦ À§ÇÑ 3Áß ¿¬°è±³¼öÇнÀ¸ðÇü ¿¬±¸(A Triple Connected Teaching and Learning Model to Improve the Educational Level of Information and Communication Ethics in Elementary School),¡± Á¤º¸±³À°ÇÐȸ ³í¹®Áö, 15 (3), pp. 345-354, 2011. 9.
- ¾Èµµ½Ä, ¿Õ±âö, ±è½ÂÇØ, Á¶±âȯ, "³×Æ®¿öÅ© Æ®·¡ÇÈ »óÅ¿¡ ÀûÀÀÀûÀÎ UDT Rate Control ±â¹ý (An Adaptive UDT Rate Control Method on Network Traffic Condition),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 48 (3), pp. 19-27, 2011. 3.
- ¹ÚÀ纹, °í±¤½Å, Á¶±âȯ, "±³Â÷·Î ȯ°æ¿¡¼ Range-based¿Í Range-free À§Ä¡ÃøÁ¤±â¹ýÀ» È¥ÇÕÇÑ °³¼±µÈ Â÷·®À§Ä¡ÃßÀû±â¹ý (An Improved Vehicle Tracking Scheme Combining Range-based and Range-free Localization in Intersection Environment),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, CI 48 (2), pp. 246-256, 2011. 3.
- ¹ÚÁ¾¼±, À̽¾Æ, ±è½ÂÇØ, Á¶±âȯ, "UDT ȯ°æ¿¡¼ È¥Àâ»óȲ ¿¹Ãø ¹× ÆÐŶ¼Õ½ÇÀ» °í·ÁÇÑ ¼º´ÉÇâ»ó ±â¹ý (A Performance Improvement Method with Considering of Congestion Prediction and Packet Loss on UDT Environment),¡± Çѱ¹ÄÜÅÙÃ÷ÇÐȸ ³í¹®Áö, 11 (2), pp. 69-78, 2011. 2.
- ¾Èµµ½Ä, Á¶±âȯ, "An Efficient Route Selection Scheme with Considering Traffic Density in VANET,¡± International Journal of Maritime Information and Communication Sciences(ÇØ¾çÁ¤º¸Åë½ÅÇÐ ¿µ¹®³í¹®Áö), 8 (6), pp. 623-629, 2010. 12.
- ÀÌÁßÇö, ±èÅ¿¬, Á¶±âȯ, "¹«¼± ¼¾¼ ³×Æ®¿öÅ©¸¦ À§ÇÑ °ÇÑ ÀÍ¸í¼º Áö¿ø ±¸Á¶ (A Strong Anonymity Scheme for Wireless Sensor Networks),¡± ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 11 (3), pp. 139-148, 2010. 6.
- ¹ÚÀ纹, Á¶±âȯ, "Àú¹Ðµµ USN ȯ°æÀ» À§ÇÑ Range-hybrid ±â¹ÝÀÇ Çâ»óµÈ À̵¿°´Ã¼ ÃßÀû±â¹ý,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, CI 46 (2), pp. 245-255, 2010. 3.
- ¿Õ±âö, Á¶±âȯ, "¼¾¼ ³×Æ®¿öÅ©¿¡¼ º¹¿ø·ÂÀ» Áö´Ñ ۰»½Å ¹æ¾È,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 47 (2), pp. 103-112, 2010. 2.
- ÀåÇöÈñ, ¹ÚÀ纹, °í±¤½Å, ±è½ÂÇØ, Á¶±âȯ, "±Û·Î¹ú¿¬±¸¸ÁÀ» À§ÇÑ È¿À²ÀûÀÎ Ä¿¹Â´ÏƼ ¶ó¿ìÆÃ Á¤Ã¥ÀÇ ºÐ¼® ¹× ¼³°è,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 10 (5), pp. 1-12, 2009. 10.
- ÀåÇöÈñ, À¯¼®´ë, ¹ÚÀ纹, Á¶±âȯ, "°í¼ÓÀ¸·Î À̵¿ÇÏ´Â Â÷·®°£ Åë½Å¿¡¼ Çâ»óµÈ Ž¿å ¸Þ½ÃÁö Æ÷¿öµù ÇÁ·ÎÅäÄÝ,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 46 (3), pp. 341-351, 2009. 3.
- °ø±æ, ±è±¤È£, °í±¤¼·, Á¶±âȯ, "¹«¼± ¼¾¼ ³×Æ®¿öÅ©¿¡¼ ½Ã°£Áö¿¬ ±â¹Ý Çâ»óµÈ Ä¿¹ö¸®Áö È¿À²ÀûÀΠŬ·¯½ºÅ͸µ ¹æ¾È,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 46 (2), pp. 133-142, 2009. 2.
- ¿ÂÁøÈ£, ÃÖ¿Ï, Á¶±âȯ, À̹®±Ù, "À̵¿ »ç¹«È¯°æÀ» À§ÇÑ ¸Þ½ÅÀú ÇÁ·ÎÅäÄÝ ¼³°è ¹× ¼¹öÀÇ ±¸Çö ¹× ºÐ¼®,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 9 (2), pp. 1-13, 2008. 4.
- ¿Õ±âö, ±è±â¿µ, ¹Ú¿øÁÖ, Á¶±âȯ, "¿À¿°¿¡ Ãë¾àÇÑ ¼¾¼ ³ëµåµéÀ» À§ÇÑ ÁÖ±âÀûÀΠŰ °»½Å ¹æ¾È,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 44 (11), pp. 67-77, 2007. 11.
- À¯¼®´ë, Á¶±âȯ, "Â÷·®µ¿À§±×¸¨À» ÀÌ¿ëÇÑ Â÷·®°£ ±ä±Þ¸Þ½ÃÁö ÀüÆÄ¹æ¹ý,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö, 34 (5), pp. 340-347, 2007. 10.
- À¯±â¼º, ±èÀçȯ, ½ÅÀç¿í, Á¶±âȯ, Á¤Áø¿í, "ÀÎÅÍ³Ý ¶ó¿ìÅÍ ÅëÇÕ ¼º´ÉÃøÁ¤ ½Ã½ºÅÛÀÇ ¼³°è ¹× ±¸Çö,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 8 (4), pp. 31-40, 2007. 8.
- Â÷¿ì¼®, ±èÀº¹Ì, ¹èÈ£¿µ, À̹èÈ£, Á¶±âȯ, "Mobile IPv6 ȯ°æ¿¡¼ µ¿Àû ºÐ±â ¶ó¿ìÅ͸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ ÀÚ¿ø ¿¹¾à ¹æ¹ý,¡± Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 14C (3), pp. 255-266, 2007. 6.
- ±è¸¸¼®, ±è»ó¼ö, °í±¤½Å, Á¶±âȯ, À̹®È£, "¼¾¼ ³×Æ®¿öÅ©¿¡¼ µ¥ÀÌÅÍ Àü¼Û Áö¿¬À» ÃÖ¼ÒÈÇÏ´Â MAC ÇÁ·ÎÅäÄÝÀÇ ¼³°è,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 8 (2), pp. 43-54, 2007. 4.
- À¯¼®´ë, Á¶±âȯ, "Â÷·®¾ÈÀüÅë½ÅÀ» À§ÇÑ ÁÙ±â¿Í °¡Áö ±¸Á¶¸¦ ÀÌ¿ëÇÑ ±ä±Þ ¸Þ½ÃÁö ÀüÆÄ¹æ¹ý,¡± Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö, 32 (2), pp. 203-212, 2007. 2.
- Àü¿ëÁØ, ¾çº´¿ì, Á¶±âȯ, ¿À¹Î±Ç, "Á¤º¸º¸È£ »ê¾÷ Åë°èÁ¶»ç º¸¿ÏÀ» À§ÇÑ ±â¾÷°æ±âÀü¸ÁÁ¶»ç ½Ã½ºÅÛ ¼³°è ¹× ±¸Çö,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 8 (1), pp. 82-93, 2007. 2.
- Â÷¿ì¼®, ±èÀº¹Ì, ¹èÈ£¿µ, Á¶±âȯ, "ÁöÇ⼺ ºê·Îµåij½ºÆ®¸¦ À§ÇÑ MNDB ÇÁ·ÎÅäÄÝ,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 43 (11), pp. 118-127, 2006. 11.
- Àü¿ëÁØ, Á¶±âȯ, ±è¿ø±Ô, "°ø°ø±â°üÀÇ Á¤º¸º¸È£°ü¸®Ã¼°è °¨»ç½Ã½ºÅÛÀÇ ¼³°è ¹× ±¸Çö,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 7 (5), pp. 81-93, 2006. 10.
- ÃÖÀμ±, Á¶±âȯ, "À̵¿ÄÄÇ»ÆÃ ȯ°æ¿¡¼ »ç¿ëÀÚÀÇ ¼±È£µµ¸¦ °í·ÁÇÑ ÇÁ¸®ÆÐĪ,¡± Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 13-C (5), pp. 651-658, 2006. 10.
- À¯¼®´ë, À̹®±Ù, Á¶±âȯ, "±³Åë»ç°í ¿¹¹æÀ» À§ÇÑ Â÷·®¾ÈÀü¸Þ½ÃÁö Áß°è³ëµå ¼±Åùæ¹ý,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 43 (9), pp. 60-68, 2006. 9.
- ±è½ÂÇØ, Á¤º´È£, ¿Õ±âö, Á¶±âȯ, "¾Öµå Ȥ ¼¾¼ ³×Æ®¿öÅ©¸¦ À§ÇÑ Å° °ü¸® ¹æ¾È,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 43 (7), pp. 32-40, 2006. 7.
- Seung-Hae Kim, Won-Hyuk Lee, and Gi-Hwan Cho, "A Study of a Server Selection Model for Selecting a Replicated Server based on Downstream Measurement in the Server-side,¡± International Journal of Information Processing Systems, 2 (2), KIPS, pp. 32-36, June. 2006.
- ±èÀçȯ, ¹ÚűÔ, Á¶±âȯ, "»ç¿ëÀÚ Åõ¸í¼ºÀ» °®´Â Ä¿³Î ¼öÁØÀÇ ÆÄÀÏ ¾ÏÈ£È ¸ÞÄ«´ÏÁò,¡± Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, 16 (3), pp. 3-16, 2006. 6.
- Â÷¿ì¼®, Á¶±âȯ, "ÁöÇ⼺ ºê·ÎµåÄɽºÆ®¸¦ À§ÇÑ ¹«¼± LAN MAC ÇÁ·ÎÅäÄÝ,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 33 (1), pp. 16-27, 2006. 2.
- ¿Õ±âö, ±èÅ¿¬, Á¶±âȯ, "¾Öµå Ȥ ³×Æ®¿öÅ©¿¡¼ Ŭ·¯½ºÅ͸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ Ç÷¯µù ¹æ¾È,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 32 (6), pp. 696-704, 2005. 12.
- ¿Õ±âö, Á¤º´È£, Á¶±âȯ, "À̵¿ ¾ÖµåȤ ³×Æ®¿öÅ©¿¡¼ ¼¼¼Ç Ű ¼³Á¤¹æ¾È,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 31 (4), pp. 353-362, 2004. 8.
- ¿Õ±âö, ¹æ»ó¿ø, Á¤º´È£, Á¶±âȯ, "Ad-Hoc ³×Æ®¿öÅ©¿¡¼ ¼±Çà Ű ºÐ¹è ¾ø´Â ´Ü ´ë ´Ü Ű ¼³Á¤ ¹æ¾È,¡± Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö, 29 (7C), pp. 1015-1023. 2004. 7.
- °í±¤½Å, Â÷¿ì¼®, ±èÇüÁØ, Á¶±âȯ, "¹«¼± LAN ȯ°æ¿¡¼ ¸¶ÀÌÅ©·Î À̵¿¼º Áö¿ø ¹æ¾È,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 31 (2), pp. 158-170. 2004. 4.
- ¿Õ±âö, ¹æ»ó¿ø, Á¶±âȯ, "Ad hoc ³×Æ®¿öÅ©¿¡¼ Á¦¾î¸Þ½ÃÁö ºÎÇϸ¦ °¨¼Ò½ÃŰ´Â Ŭ·¯½ºÅÍ À¯Áö ¹æ¹ý,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 31(1), pp. 62-69, 2004. 2.
- ¹ÚÁö¿¬, Á¶±âȯ, À̹®±Ù, "½Ç½Ã°£ ½Ã½ºÅÛÀÇ ½ÇÇà °ø°£»ó¿¡¼ÀÇ ±¸¹®°ú ÀÇ¹Ì ÆÐÅÏ¿¡ ±â¹ÝÀ» µÐ »óÅ ÃÖ¼Òȸ¦ À§ÇÑ Ãß»óÈ ¹æ¹ý," Á¤º¸°úÇÐȸ ³í¹®Áö, ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë, 30 (2), pp. 103-116, 2003. 2.
- °í±¤½Å, Â÷¿ì¼®, ¾ÈÀ翵, Á¶±âȯ, "´Ü¸»ÀÇ ¸¶ÀÌÅ©·Î À̵¿¼ºÀ» °í·ÁÇÑ ÀÚ¿ø¿¹¾à ¸ÞÄ¿´ÏÁòÀÇ ¼³°è," Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C, 9 (5), pp. 733-742, 2002. 10.
- ÃÖÀçÈÆ, ±èÁö¼÷, Á¶±âȯ, "¹®Á¦ ÀºÇà¿¡¼ ¿¬»óÇнÀÀ» Áö¿øÇÏ´Â ÆÛÁö°Ë»ö ½Ã½ºÅÛ," Á¤º¸°úÇÐȸ ³í¹®Áö, ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë, 29 (4), pp. 278-288, 2002. 4.
- ±è¹®ÀÚ, Â÷¿ì¼®, Á¶ÀÎÁØ, Á¶±âȯ, "À§Ä¡ÀÎ½Ä À̵¿Á¤º¸¼ºñ½º¸¦ À§ÇÑ ÇÁ¸®ÆÐĪ ¹æ¹ý·Ð," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 8-C (6), pp. 831-838, 2001. 12.
- Á¶ÀÎÁØ, Á¶±âȯ, "ÀÎÅÍ³Ý È£½ºÆ® À̵¿¼ºÀ» Áö¿øÇÏ´Â DNS ±â¹Ý À§Ä¡¼öÁ¤ ¹æ¾È," Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å, 27 (4), pp. 429-440, 2000. 12.
- ¹ÚÁØÈñ, ¹®°æ´ö, ±èűÙ, Á¶±âȯ, "´Ù¸ñÀû Ŭ·¯½ºÅ͸µ ½Ã½ºÅÛÀ» À§ÇÑ °í¼Ó ¸Þ½Ã¡ °èÃþ ±¸Çö," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 7 (3), pp. 909-922, 2000. 3.
- Gihwan Cho, "Simulation-based Comparison of Location and Routing Optimization Schemes for Internet Host Mobility," Telecommunications Review, 9 (3), pp. 301-313, 1999. 6.
- Á¶ÀÎÁØ, ±è¹®ÀÚ, Á¶±âȯ, ±èµ¿±Ô, "À̵¿ÄÄÇ»ÆÃ ȯ°æÀ» À§ÇÑ °èÃþ±¸Á¶ ±â¹Ý À§Ä¡¼öÁ¤ ¹× °æ·Î¼³Á¤," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 5 (12), pp. 3221-3229, 1998. 12.
- ¹æ»ó¿ø, Á¶±âȯ, ±èº´±â, "ÀÎÅͳݻ󿡼 È£½ºÆ® À̵¿¼ºÀ» Áö¿øÇÏ´Â ¸ÖƼij½ºÆ® ÇÁ·ÎÅäÄÝ," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 4 (5), pp. 1231-1242, 1997. 5.
- ¹æ»ó¿ø, Á¶±âȯ, ±èº´±â, "À̵¿ È£½ºÆ®¸¦ À§ÇÑ ¸ÖƼij½ºÆ® ¼ºñ½º ¹æ¾È," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 4 (4), pp.973-981, 1997. 4.
|