Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Charlie Y. Shim is active.

Publication


Featured researches published by Charlie Y. Shim.


international symposium on communications and information technologies | 2014

A taxonomy for DOS attacks in VANET

Yeongkwun Kim; Injoo Kim; Charlie Y. Shim

Vehicular Ad hoc Network (VANET) has become an attractive topic in fields of academia and industry due to its potential role in helping to improve traffic management and safety on the road. The information transmitted over a vehicular network is sensitive and can affect important safety decisions. However, they face various types of security attacks, such as Denial of Service (DOS) attacks. DOS and distributed DOS attacks are a rapidly growing problem and offer an important point of consideration as such attacks do not require the penetration of the target network. In this paper, we explore DOS in VANET to propose taxonomy as a means of identifying the attacker, its capabilities, the target, the type of vulnerability used for attack, and the impact on the victim.


international conference on information networking | 2014

Towards a trust management for VANETs

Yeongkwun Kim; Injoo Kim; Charlie Y. Shim

Information transmitted over a vehicular network may be sensitive and affect important safety decisions. Exchanging information must be based on trust; however, an issue that arises is the degree to which drivers can trust the received information from other (previously unknown) drivers. Thus, trust management is a fundamental and critical issue in vehicular ad-hoc networks (VANETs). However, studies and research have yet to thoroughly address this important problem. In this paper, we offer some discussion on the topic and propose a possible way of building an effective trust management system. Finally, we also present a discussion on the topics of privacy and reputation in VANETs.


world congress on engineering | 2008

Practical User Identification for Masquerade Detection

Charlie Y. Shim; Jung Yeop Kim; Rex E. Gantenbein

Masquerade detection discovers suspicious activities in a computer system by creating userspsila normal profiles, then raising an alert when the audited behavior does not fit. We propose to apply the SVM algorithm to the concurrently employed patterns that have been weighted according to their frequencies in order to identify masquerading attacks. Our approach not only reduces the complexity of the system but also is more robust in controlling noisy instances of the audited behavior.


electro information technology | 2005

Two approaches to improve Java MIDP record management system in wireless devices

H. Kimm; Sung Y. Shin; Charlie Y. Shim

In this paper, we propose two approaches to improve current Java mobile information device profile (MIDP) record management system (RMS) in wireless devices and compare the approaches with current MIDP RMS. These approaches promote the efficient use of Java MIDP RMS in wireless devices such that a faster record retrieval using a smaller memory is achieved, which makes the device consume less battery power. The comparable program segments, which show how to use Java MIDP RMS with or without record-enumeration interface efficiently, are presented and analyzed. The first approach in the paper proposes to use a circular linked list in RMS RecordEnumeration interface. This requires less storage to represent a recordID as a node in the circular linked list than the current RecordEnumeration interface that uses a doubly linked list. The second approach supports the faster access of record traversal, which shows O(log n) time to retrieve any record in MIDP RMS file, while the record retrieval in the current Java MIDP RMS takes O(n) time. In addition, the second approach uses less RMS storage than the method using RecordEnumeration interface does


acm symposium on applied computing | 2005

A comparison on information fusion methods for air target identification

Dongseob Jang; Sung Y. Shin; Charlie Y. Shim; Chih-Cheng Hung

We compared the performance of Bayes Theory, Fuzzy Set Theory, Heuristic method and Dempster-Shafer Theory in the identification of aircrafts by using the information from different sensors. From the results of the simulation, the Fuzzy method produces the best result. The final identification could be improved if specific features of each type of aircraft are available. To get more accurate object identification, the results from each method can be combined with the best assignment of values for each method.


fuzzy systems and knowledge discovery | 2005

Using feedback cycle for developing an adjustable security design metric

Charlie Y. Shim; Jung-Yeop Kim; Sung Y. Shin; Jiman Hong

In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a reliability model and scenario testing technique to produce a feedback cycle.


World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering | 2009

Promoting Collaborative Learning in Software Engineering by Adapting the PBL Strategy

Charlie Y. Shim; Mina Choi; Jung Y. Kim


Archive | 2001

Developing a Probabilistic Security Measure Using a Software Reliability Model

Charlie Y. Shim; Rex E. Gantenbein; Sung-yong Shin


computers and their applications | 2002

An Approach from Software Reliability Modeling to Security Modeling.

Charlie Y. Shim; Alireza Salehnia; Sung Y. Shin


computers and their applications | 2004

Fault-Tolerance Implementation on P2P Data Mining.

Rex E. Gantenbein; Jung P. Kim; Chang Oan Sung; Charlie Y. Shim

Collaboration


Dive into the Charlie Y. Shim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sung Y. Shin

South Dakota State University

View shared research outputs
Top Co-Authors

Avatar

Chang Oan Sung

Indiana University Southeast

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yeongkwun Kim

Western Illinois University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chih-Cheng Hung

Southern Polytechnic State University

View shared research outputs
Top Co-Authors

Avatar

H. Kimm

East Stroudsburg University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge