References
- S. Youn and K. Seok, "Design and implementation of TDMA-based wireless IP video transmission system," J. of the Korea Institute of Electronic Communication Sciences, vol. 17, no. 6, 2022, pp. 1025-1032.
- B. Jung and K. Seok, "A study on 2.4/5GHz dual-band RF design technology," J. of the Korea Institute of Electronic Communication Sciences, vol. 18, no. 2, 2023, pp. 259-268.
- S. Youn, M. Kim, and K. Seok, "Inter-module interworking evaluation of TDMA-based wireless IP video transmission system," J. of the Korea Institute of Electronic Communication Sciences, vol. 18, no. 1, 2023, pp. 1-9.
- J. Cho and K. Jeong, "Remote Controlled Robots Used for the Mitigation of the Fukushima Nuclear Power Plant Accident," J. of Institute of Control, Robotics and Systems, vol. 2011, no. 12, 2011, pp. 148-151.
- X. Hao and C. Kim, "Design and Implementation of a Smart Home Cloud Control System Using Bridge based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 5, 2017, pp. 865-872.
- S. Park, W. Choi, B. Chung, J. N. Kim, and J. M. Kim, "The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks," J. of Institute of Embedded Engineering of Korea, vol. 7, no. 5, 2012, pp. 255-265. https://doi.org/10.14372/IEMEK.2012.7.5.255
- Y. Shin and J. Ryu, "Study on Adoption of Suitable Encryption Scheme According to Data Properties on MySQL Database," Proc. Korea Computer Congress 2010, Jeju island, South Korea, June 2010.
- R. D. Silverman, "A Cost-Based Security Analysis of Symmetric and Asymmetric Key Lengths," Bulletin of RSA Laboratories, no. 13, Apr. 2000.
- B. S. Dhillon, Engineering Safety. Singapore: World Scientific, 2003.
- C. Kong and L. Semyeong, "A Study of Inverse Modeling from Micro Gas Turbine Experimental Test Data," J. of Korean Society of Propulsion Engineers, vol. 13, no. 6, 2009, pp. 1-7.
- A. Selby and C. Mitchel, "Algorithms for Software Implementations of RSA," IEE Proc. E - Computer and Digital Techniques, vol. 136, no. 3, 1989, pp. 166-170. https://doi.org/10.1049/ip-e.1989.0023
- T. Fujita, K. Kogiso, K. Sawada, and S. Shin, "Security Enhancement of Networked Control Systems Using RSA Public-key Cryptosystem," Proc. 10th Asian Control Conf., Kota Kinabalu, Malaysia, May 2015.
- W. Choi and K. Seok, "Survey on ways to improve the system in preparation for changes in the radio management system," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 6, 2018, pp. 1145-1154.
- J. Yang, K. Seok, and H. Sin, "Technological and Social Significance of the Revision of the Radio Law," J. of the Korea Institute of Electronic Communication Sciences, vol. 14, no. 4, 2019, pp. 627-636.
- C. Yeon and K. Seok, "A study on radio wave management regulations in the United States to improve the domestic radio wave management system," J. of the Korea Institute of Electronic Communication Sciences, vol. 15, no. 3, 2020, pp. 379-388.