关注
Kibum Choi
Kibum Choi
未知所在单位机构
在 kaist.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Rocking drones with intentional sound noise on gyroscopic sensors
Y Son, H Shin, D Kim, Y Park, J Noh, K Choi, J Choi, Y Kim
24th USENIX security symposium (USENIX Security 15), 881-896, 2015
4532015
Security analysis of FHSS-type drone controller
H Shin, K Choi, Y Park, J Choi, Y Kim
International workshop on information security applications, 240-253, 2015
642015
Dissecting customized protocols: automatic analysis for customized protocols based on IEEE 802.15. 4
K Choi, Y Son, J Noh, H Shin, J Choi, Y Kim
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
202016
Burnfit: Analyzing and exploiting wearable devices
D Kim, S Park, K Choi, Y Kim
Information Security Applications: 16th International Workshop, WISA 2015 …, 2016
162016
Emotions and motivation in learning and performance. JM Spector, MD Merrill, J. Elen, & MJ Bishop (Eds.), Handbook of research on educational communications and technology (pp …
C Kim, R Pekrun
New York: Springer, 2014
7*2014
Information security applications
H Kim, M Yung, HW Lee
Springer, 2014
52014
Frying PAN: Dissecting Customized Protocol for Personal Area Network
K Choi, Y Son, J Lee, S Kim, Y Kim
International Workshop on Information Security Applications, 300-312, 2015
12015
Original Text
Y Park, J Noh, K Choi, J Choi, Y Kim
系统目前无法执行此操作,请稍后再试。
文章 1–8