Charlie Y. Shim
Kutztown University of Pennsylvania
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Charlie Y. Shim.
international symposium on communications and information technologies | 2014
Yeongkwun Kim; Injoo Kim; Charlie Y. Shim
Vehicular Ad hoc Network (VANET) has become an attractive topic in fields of academia and industry due to its potential role in helping to improve traffic management and safety on the road. The information transmitted over a vehicular network is sensitive and can affect important safety decisions. However, they face various types of security attacks, such as Denial of Service (DOS) attacks. DOS and distributed DOS attacks are a rapidly growing problem and offer an important point of consideration as such attacks do not require the penetration of the target network. In this paper, we explore DOS in VANET to propose taxonomy as a means of identifying the attacker, its capabilities, the target, the type of vulnerability used for attack, and the impact on the victim.
international conference on information networking | 2014
Yeongkwun Kim; Injoo Kim; Charlie Y. Shim
Information transmitted over a vehicular network may be sensitive and affect important safety decisions. Exchanging information must be based on trust; however, an issue that arises is the degree to which drivers can trust the received information from other (previously unknown) drivers. Thus, trust management is a fundamental and critical issue in vehicular ad-hoc networks (VANETs). However, studies and research have yet to thoroughly address this important problem. In this paper, we offer some discussion on the topic and propose a possible way of building an effective trust management system. Finally, we also present a discussion on the topics of privacy and reputation in VANETs.
world congress on engineering | 2008
Charlie Y. Shim; Jung Yeop Kim; Rex E. Gantenbein
Masquerade detection discovers suspicious activities in a computer system by creating userspsila normal profiles, then raising an alert when the audited behavior does not fit. We propose to apply the SVM algorithm to the concurrently employed patterns that have been weighted according to their frequencies in order to identify masquerading attacks. Our approach not only reduces the complexity of the system but also is more robust in controlling noisy instances of the audited behavior.
electro information technology | 2005
H. Kimm; Sung Y. Shin; Charlie Y. Shim
In this paper, we propose two approaches to improve current Java mobile information device profile (MIDP) record management system (RMS) in wireless devices and compare the approaches with current MIDP RMS. These approaches promote the efficient use of Java MIDP RMS in wireless devices such that a faster record retrieval using a smaller memory is achieved, which makes the device consume less battery power. The comparable program segments, which show how to use Java MIDP RMS with or without record-enumeration interface efficiently, are presented and analyzed. The first approach in the paper proposes to use a circular linked list in RMS RecordEnumeration interface. This requires less storage to represent a recordID as a node in the circular linked list than the current RecordEnumeration interface that uses a doubly linked list. The second approach supports the faster access of record traversal, which shows O(log n) time to retrieve any record in MIDP RMS file, while the record retrieval in the current Java MIDP RMS takes O(n) time. In addition, the second approach uses less RMS storage than the method using RecordEnumeration interface does
acm symposium on applied computing | 2005
Dongseob Jang; Sung Y. Shin; Charlie Y. Shim; Chih-Cheng Hung
We compared the performance of Bayes Theory, Fuzzy Set Theory, Heuristic method and Dempster-Shafer Theory in the identification of aircrafts by using the information from different sensors. From the results of the simulation, the Fuzzy method produces the best result. The final identification could be improved if specific features of each type of aircraft are available. To get more accurate object identification, the results from each method can be combined with the best assignment of values for each method.
fuzzy systems and knowledge discovery | 2005
Charlie Y. Shim; Jung-Yeop Kim; Sung Y. Shin; Jiman Hong
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a reliability model and scenario testing technique to produce a feedback cycle.
World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering | 2009
Charlie Y. Shim; Mina Choi; Jung Y. Kim
Archive | 2001
Charlie Y. Shim; Rex E. Gantenbein; Sung-yong Shin
computers and their applications | 2002
Charlie Y. Shim; Alireza Salehnia; Sung Y. Shin
computers and their applications | 2004
Rex E. Gantenbein; Jung P. Kim; Chang Oan Sung; Charlie Y. Shim