Dohoon Kim

Learn More
We consider a model for network platform competition between the current " Best Effort " (BE) network and a hypothetical " Next Generation Network " (NGN). We suppose there are indirect network externalities between content providers (CPs) and users of each platform. Moreover, we suppose that NGN users can access BE content, thus there is a cross-platform,(More)
or distribution of any data or software is prohibited. You must treat the Program and associated materials and any elements thereof like any other copyrighted material. Tous droits du producteur et du propriétaire de ce produit sont réservés. L'OCDE autorise la reproduction d'un seul exemplaire de ce programme pour usage personnel et non commercial(More)
OBJECTIVE With growing demand for health information and rapid development of information technology, health information websites are emerging as the most effective media to meet the public's needs for health information. This article is intended to offer a technical view on the design and operations of health information websites. Along this line, employed(More)
Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical(More)
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable(More)
Cognitive radio (CR) is a promising technology in ad-hoc networks to solve the problems that result from the limited available spectrum and the inefficiency in the spectrum usage by utilizing the existing wireless spectrum advantageously. When the licensed primary user is not using the spectrum, the available channels are allocated for the unlicensed(More)