J. KIMS Technol Search

CLOSE


Search

  • HOME
  • Search
A Routing Protocol for Improving Node Survivability in Tactical Ad-hoc Network
Young-An Kim, Gun-Woo Park
J. KIMS Technol. 2013;16(1):56-64.
PDF    
An Intrusion Detection Technique Suitable for TICN
Yun-Ho Lee, Soo-Jin Lee
J. KIMS Technol. 2011;14(6):1097-1106.
PDF    
Detection and Management of Misbehaving Node in Tactical Ad-Hoc Networks
Beom-Geun Jang, Soo-Jin Lee
J. KIMS Technol. 2009;12(3):333-343.
PDF    
An Efficient Key Management Scheme in Tactical Ad-Hoc Network
Eun-Ho Kim, Soo-Jin Lee
J. KIMS Technol. 2009;12(3):317-324.
PDF    
A Study on Analysis Method of Underwater Electric Field Signature due to Ship's Corrosion and Corrosion Protection System
Hyun-Ju Chung, Chang-Seob Yang, Jae-Jin Jeon
J. KIMS Technol. 2008;11(2):43-52.
PDF    
A Study on Operational Concept of Military Guard and Surveillance Robots
Dong-Cheul Seo, Woo-Chan Lee, Chun-Sik Hwang
J. KIMS Technol. 2008;11(1):5-14.
PDF    


ABOUT
ARTICLE CATEGORY

Browse all articles >

BROWSE ARTICLES
FOR CONTRIBUTORS
Editorial Office
160 Bugyuseong-daero 488beon-gil, Yuseong-gu, Daejeon 34060, Korea
Tel: +82-42-823-4603    Fax: +82-42-823-4605    E-mail: kimst@kimst.or.kr                

Copyright © 2026 by The Korea Institute of Military Science and Technology.

Developed in M2PI

Close layer
prev next