Genetic algorithm: A tutorial review DM Mukhopadhyay, MO Balitanas, A Farkhod, SH Jeon, D Bhattacharyya International journal of grid and distributed computing 2 (3), 25-32, 2009 | 84 | 2009 |
Medical imaging: A review D Ganguly, S Chakraborty, M Balitanas, T Kim International Conference on Security-Enriched Urban Computing and Smart Grid …, 2010 | 69 | 2010 |
Data hiding in video AK Bhaumik, M Choi, RJ Robles, MO Balitanas International Journal of database theory and Application 2 (2), 9-16, 2009 | 54 | 2009 |
Crossed crypto-scheme in WPA PSK mode MO Balitanas, RJ Robles, N Kim, T Kim 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security …, 2009 | 22 | 2009 |
Security threats for RFID-sensor network anti-collision protocol MO Balitanas, T Kim International Journal of Smart Home 4 (1), 23-36, 2010 | 15 | 2010 |
Vulnerabilities of VPN using IPSec and defensive measures BH Kang, MO Balitanas International journal of advanced science and technology 8 (7), 9-18, 2009 | 15 | 2009 |
Comparison of encryption schemes as used in communication between SCADA components RJ Robles, M Balitanas, R Caytiles, Y Gelogo, TH Kim 2011 International Conference on Ubiquitous Computing and Multimedia …, 2011 | 14 | 2011 |
Security encryption schemes for internet SCADA: comparison of the solutions RJ Robles, M Balitanas, T Kim Security-Enriched Urban Computing and Smart Grid: Second International …, 2011 | 12 | 2011 |
Hiding data in audio signal D Bhattacharyya, P Dutta, MO Balitanas, T Kim, P Das Advanced Communication and Networking: Second International Conference, ACN …, 2010 | 12 | 2010 |
Wi Fi protected access-pre-shared key hybrid algorithm M Balitanas International Journal of Advanced Science and Technolog 12, 2009 | 12 | 2009 |
Cipher for internet-based supervisory control and data acquisition architecture M Drahansky, M Balitanas J. Secur. Eng 8 (10.1109), 2011 | 11 | 2011 |
Peer to peer content sharing on smart phones technology M Balitanas, RJ Robles Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities …, 2012 | 4 | 2012 |
Security Management for Distributed Denial of Service Attack D Ryu, MO Balitanas 보안공학연구논문지 7 (2), 99-110, 2010 | 4 | 2010 |
Using Incentives for Heterogeneous peer-to-peer Network MO Balitanas, T KiM International Journal of Advanced Science and Technology 15, 23-36, 2010 | 4 | 2010 |
Vulnerabilities in Control Systems, Critical Infrastructure Systems and SCADA RJ Robles, M Choi, MO Balitanas, FS Yusufovna, FA Alisherovich, N Kim, ... Proceedings of KIIT Conference, 454-457, 2009 | 4 | 2009 |
Architecture for Automatic Management of ParcTab Ubiquitous Computing MO Balitanas, T Kim, RJ Robles, T Kim, S Barman, AK Samanta, ... Architecture 15, 2010 | 2 | 2010 |
Defensive Measures to Vulnerabilities of VPN using IPsec MO Balitanas, M Choi, T Kim Proceedings of KIIT Conference, 921-925, 2009 | 2 | 2009 |
Duplex Defensive Approach in Network Infrastructure MO Balitanas, M Choi, T Kim Proceedings of KIIT Conference, 926-929, 2009 | 2 | 2009 |
Mobile Network Protocol Vulnerabilities in Advent of IPV6 KT Seo, MO Balitanas, E Cho, S Kim 보안공학연구논문지 6 (3), 159-174, 2009 | 2 | 2009 |
Advanced Computer Science and Information Technology: Third International Conference, AST 2011, Seoul, Korea, September 27-29, 2011. Proceedings T Kim, H Adeli, RJ Robles, M Balitanas Springer, 2011 | 1 | 2011 |