InJung Kim

  • Citations Per Year
Learn More
We consider the problem of placing services in a telecommunication network in the presence of failures. In contrast to existing service placement algorithms that focus on optimizing the quality of service (QoS), we consider the performance of monitoring failures from end-to-end connection states between clients and servers, and investigate service placement(More)
In this paper, implementation results of a surveillance test-bed in Taean airport by ADS-B concepts is described in detail. The surveillance test-bed consists of ADS-B transponders adopting VDL based on STDMA protocol, CDTIs for aircraft pilots, ground vehicle drivers and air traffic controllers. Surveillance functions of ADS-B system such as runway(More)
While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital(More)
Automatic Dependent Surveillance - Broadcast (ADS-B) is a novel surveillance concept using the Global Positioning System (GPS) and a digital data-link. ADS-B provides a variety of benefits such as air-to-air surveillance capability, real-time traffic and aeronautical information in the cockpit, surveillance to remote or inhospitable areas that do not(More)
As the age of Internet of Things (IoT) has come, national-level cyber security measures should be prepared and concrete implementation plans should be established, so that critical infrastructure can be operated and maintained safely, protected from cyber attacks. In addition, IoT services for such infrastructure should be capable of closely obtaining and(More)
Malicious codes cause system failures by altering system files on computers or secretly placing Trojan horses within a system, which after a certain period of time steal/destroy key information on a computer or create mass packets. Such malicious codes approach computers by avoiding information protection systems (intrusion blocking/detection systems) that(More)
  • 1