References
- Kokkonis. George et al. (2017). Real-time wireless multisensory smart surveillance with 3D-HEVC streams for internet-of-things (IoT). The Journal of Supercomputing, 73(3), 1044-1062. https://doi.org/10.1007/s11227-016-1769-9
- Sathishkumar. M. & S. Rajini. (2015). Smart surveillance system using pir sensor network and gsm. International Journal of Advnced Research in Computer Engineering & Technology, 4(1), 70-74.
- Nagothu. Deeraj et al. (2018). A microservice-enabled architecture for smart surveillance using blockchain technology. IEEE International Smart Cities Conference (ISC2), IEEE, 1-4.
- M. G. Ball, B. Qela & S. Wesolkowski. (2016). A review of the use of computational intelligence in the design of military surveillance networks. Recent Advances in Computational Intelligence in Defense and Security, Springer, 663-693.
- Campbell, Dan et al. (2016). Command and Control, Cyber, Communications, Intelligence, Surveillance and Reconnaissance (CRISR) and Cyber Tactical Measures. GEORGIA TECH RESEARCH INSTITUTE (GTRI), AFRL-RI-RS-TR-2016-209, Atlanta United States.
- Lin, C. F., Yuan, S. M., Leu, M. C. & Tsai, C. T. (2012). A framework for scalable cloud video recorder system in surveillance environment. In Ubiquitous intelligence & computing and 9th international conference on autonomic & trusted computing (UIC/ATC), IEEE, 655-660.
- M. Anwar Hossain. (2014). Framework for a cloud-based multimedia surveillance system. International Journal of Distributed Sensor Networks, 10(5), 1-11.
- D. Lee & N. Park. (2017). Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance. The Journal of Supercomputing, 73(3), 1103-1118. https://doi.org/10.1007/s11227-016-1841-5
- J. Kim, N. Park, G. Kim & S. Jin. (2019). CCTV video processing metadata security scheme using character order preserving transformation in the emerging multimedia. Electronics, 8(4), 412. https://doi.org/10.3390/electronics8040412
- D. Lee. (2018). A Privacy Enhanced Video Surveillance Framework using Metadata De-identification, Doctoral dissertation. Jeju National University, Korea.
- N. Park, B. G. Kim & J. S. Kim. (2019). A Mechanism of Masking Identification Information Regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission. Electronics, 8(7), 735. https://doi.org/10.3390/electronics8070735
- D. Lee, N. Park, G. Kim & S. Jin. (2018). De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment. Peer-To-Peer Networking and Applications, 11(6), 1299-1308. https://doi.org/10.1007/s12083-018-0637-1
- N. Park, H. Hu & Q. Jin. (2016). Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT). International Distributed Sensor Networks [Online], https://doi.org/10.1155/2016/2965438
- N. Park, J. Kwak, S. Kim, D. Won & H. Kim. (2006). WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. Advanced Web and Network Technologies, and Applications, LNCS, 741-748.
- D. Lee & N. Park. (2018). Electronic Identity Information Hiding Methods Using a Secret Sharing Scheme in Multimedia-centric Internet of Things Environment. Personal and Ubiquitous Computing, 22(1), 3-10. https://doi.org/10.1007/s00779-017-1017-1
- N. Park & N. Kang. (2015). Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle. Sensors, 16(1), 1-16. https://doi.org/10.3390/s16010001
- N. Park, Y. Sung, Y. Jeong, S. B. Shin & C. Kim. (2018). The Analysis of the Appropriateness of Information Education Curriculum Standard Model for Elementary School in Korea. International Conference on Computer and Information Science, 791, 1-15.
- J. Kim & N. Park. (2019). Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing. Personal and Ubiquitous Computing, 1-9.
- N. Park & M. Kim. (2014). Implementation of load management application system using smart grid privacy policy in energy management service environment. Cluster Computing, 17(3), 653-664. https://doi.org/10.1007/s10586-014-0367-y