CCTV video processing metadata security scheme using character order preserving-transformation in the emerging multimedia J Kim, N Park, G Kim, S Jin Electronics 8 (4), 412, 2019 | 61 | 2019 |
Development of a board game-based gamification learning model for training on the principles of artificial intelligence learning in elementary courses J Kim, N Park Journal of The Korean Association of Information Education 23 (3), 229-235, 2019 | 51 | 2019 |
Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing J Kim, N Park Personal and Ubiquitous Computing 26 (2), 345-353, 2022 | 49 | 2022 |
Blockchain-based data-preserving AI learning environment model for AI cybersecurity systems in IoT service environments J Kim, N Park Applied Sciences 10 (14), 4718, 2020 | 49 | 2020 |
A Mechanism of Masking Identification Information regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission N Park, BG Kim, J Kim Electronics 8 (7), 735, 2019 | 41 | 2019 |
A face image virtualization mechanism for privacy intrusion prevention in healthcare video surveillance systems J Kim, N Park Symmetry 12 (6), 891, 2020 | 32 | 2020 |
Network log-based SSH brute-force attack detection model. J Park, J Kim, BB Gupta, N Park Computers, Materials & Continua 68 (1), 2021 | 27 | 2021 |
CCTV-RFID enabled multifactor authentication model for secure differential level video access control J Kim, D Lee, N Park Multimedia Tools and Applications 79, 23461-23481, 2020 | 19 | 2020 |
Rolebased Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment J Kim, N Park Transactions on Emerging Telecommunications Technologies 33 (4), e4227, 2022 | 16 | 2022 |
Blockchain technology core principle education of elementary school student using gamification J Kim, N Park Journal of The Korean Association of Information Education 23 (2), 141-148, 2019 | 16 | 2019 |
초등과정 인공지능 학습 원리 이해를 위한 보드게임 기반 게이미피케이션 교육 실증 김진수, 박남제 정보교육학회논문지 23 (3), 229-235, 2019 | 11 | 2019 |
De-identification mechanism of user data in video systems according to risk level for preventing leakage of personal healthcare information J Kim, N Park Sensors 22 (7), 2589, 2022 | 10 | 2022 |
Dynamic/Static Object Segmentation and Visual Encryption Mechanism for Storage Space Management of Image Information J Kim, N Park Journal of Korea Multimedia Society 22 (10), 1199-1207, 2019 | 8 | 2019 |
Inteligent Video Surveilance Incubating Security Mechanism in Open Cloud Environments J Kim, N Park Journal of KIIT 17 (5), 105-116, 2019 | 7 | 2019 |
Web-browsing application using web scraping technology in korean network separation application WC Jung, J Kim, N Park Symmetry 13 (8), 1550, 2021 | 6 | 2021 |
Block Chain Based CCTV Image Forgery· Modulation Verification Mechanism J Kim, J Cho, N Park The Journal of Korean Institute of Information Technology 17 (8), 107-114, 2019 | 6 | 2019 |
Face Information Conversion Mechanism to Prevent Privacy Infringement J Kim, S Kim, N Park Journal of KIIT 17 (6), 115-112, 2019 | 6 | 2019 |
Understanding and education measures of the prevention of forgery and falsification of blockchain for elementary school students Y Jung, J Kim, N Park Journal of The Korean Association of Information Education 23 (6), 513-520, 2019 | 6 | 2019 |
Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications. J Kim, S Ryu, N Park Computers, Materials & Continua 70 (2), 2022 | 5 | 2022 |
Preemptive Prediction-Based Automated Cyberattack Framework Modeling S Ryu, J Kim, N Park, Y Seo Symmetry 13 (5), 793, 2021 | 5 | 2021 |