1 |
Lin, C. F., Yuan, S. M., Leu, M. C. & Tsai, C. T. (2012). A framework for scalable cloud video recorder system in surveillance environment. In Ubiquitous intelligence & computing and 9th international conference on autonomic & trusted computing (UIC/ATC), IEEE, 655-660.
|
2 |
M. Anwar Hossain. (2014). Framework for a cloud-based multimedia surveillance system. International Journal of Distributed Sensor Networks, 10(5), 1-11.
|
3 |
D. Lee & N. Park. (2017). Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance. The Journal of Supercomputing, 73(3), 1103-1118.
DOI
|
4 |
J. Kim, N. Park, G. Kim & S. Jin. (2019). CCTV video processing metadata security scheme using character order preserving transformation in the emerging multimedia. Electronics, 8(4), 412.
DOI
|
5 |
D. Lee. (2018). A Privacy Enhanced Video Surveillance Framework using Metadata De-identification, Doctoral dissertation. Jeju National University, Korea.
|
6 |
N. Park, B. G. Kim & J. S. Kim. (2019). A Mechanism of Masking Identification Information Regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission. Electronics, 8(7), 735.
DOI
|
7 |
D. Lee, N. Park, G. Kim & S. Jin. (2018). De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment. Peer-To-Peer Networking and Applications, 11(6), 1299-1308.
DOI
|
8 |
N. Park, H. Hu & Q. Jin. (2016). Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT). International Distributed Sensor Networks [Online], https://doi.org/10.1155/2016/2965438
|
9 |
N. Park, J. Kwak, S. Kim, D. Won & H. Kim. (2006). WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. Advanced Web and Network Technologies, and Applications, LNCS, 741-748.
|
10 |
D. Lee & N. Park. (2018). Electronic Identity Information Hiding Methods Using a Secret Sharing Scheme in Multimedia-centric Internet of Things Environment. Personal and Ubiquitous Computing, 22(1), 3-10.
DOI
|
11 |
N. Park & N. Kang. (2015). Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle. Sensors, 16(1), 1-16.
DOI
|
12 |
N. Park, Y. Sung, Y. Jeong, S. B. Shin & C. Kim. (2018). The Analysis of the Appropriateness of Information Education Curriculum Standard Model for Elementary School in Korea. International Conference on Computer and Information Science, 791, 1-15.
|
13 |
J. Kim & N. Park. (2019). Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing. Personal and Ubiquitous Computing, 1-9.
|
14 |
N. Park & M. Kim. (2014). Implementation of load management application system using smart grid privacy policy in energy management service environment. Cluster Computing, 17(3), 653-664.
DOI
|
15 |
M. G. Ball, B. Qela & S. Wesolkowski. (2016). A review of the use of computational intelligence in the design of military surveillance networks. Recent Advances in Computational Intelligence in Defense and Security, Springer, 663-693.
|
16 |
Kokkonis. George et al. (2017). Real-time wireless multisensory smart surveillance with 3D-HEVC streams for internet-of-things (IoT). The Journal of Supercomputing, 73(3), 1044-1062.
DOI
|
17 |
Sathishkumar. M. & S. Rajini. (2015). Smart surveillance system using pir sensor network and gsm. International Journal of Advnced Research in Computer Engineering & Technology, 4(1), 70-74.
|
18 |
Nagothu. Deeraj et al. (2018). A microservice-enabled architecture for smart surveillance using blockchain technology. IEEE International Smart Cities Conference (ISC2), IEEE, 1-4.
|
19 |
Campbell, Dan et al. (2016). Command and Control, Cyber, Communications, Intelligence, Surveillance and Reconnaissance (CRISR) and Cyber Tactical Measures. GEORGIA TECH RESEARCH INSTITUTE (GTRI), AFRL-RI-RS-TR-2016-209, Atlanta United States.
|