James Kang
Title
Cited by
Cited by
Year
A review of security protocols in mHealth wireless body area networks (WBAN)
J Kang, S Adibi
International Conference on Future Network Systems and Security, 61-83, 2015
262015
Predictive data mining for converged internet of things: A mobile health perspective
JJ Kang, S Adibi, H Larkin, T Luan
2015 International Telecommunication Networks and Applications Conference …, 2015
212015
Inference of personal sensors in the internet of things
JJ Kang, H Larkin
International Journal of Information, Communication Technology and …, 2016
122016
An inference system framework for personal sensor devices in mobile health and internet of things networks
JJW Kang
Deakin University, 2017
102017
Enhancement of sensor data transmission by inference and efficient data processing
JJ Kang, TH Luan, H Larkin
International Conference on Applications and Techniques in Information …, 2016
82016
Data processing of physiological sensor data and alarm determination utilising activity recognition
JJ Kang, TH Luan, H Larkin
International journal of information, communication technology and …, 2016
72016
A disaster recovery system for location identification-based low power wide area networks (LPWAN)
JJ Kang, I Khodasevych, S Adibi
2017 27th International Telecommunication Networks and Applications …, 2017
62017
Alarm Notification of Body Sensors Utilising Activity Recognition and Smart Device Application
JJ Kang, TH Luan, H Larkin
Proceedings of the 14th International Conference on Advances in Mobile …, 2016
52016
Application of an Emergency Alarm System for Physiological Sensors Utilizing Smart Devices
J Kang, H Larkin
MDPI technologies 5 (2), 2017
42017
Inference system of body sensors for health and internet of things networks
JJ Kang, TH Luan, H Larkin
Proceedings of the 14th International Conference on Advances in Mobile …, 2016
42016
Intelligent Personal Health Devices Converged with Internet of Things Networks
JJ Kang, H Larkin
Journal of Mobile Multimedia 12 (3&4), 197-212, 2017
32017
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
JJ Kang, K Fahd, S Venkatraman
Cryptography 2 (4), 38, 2018
22018
Systematic Predictive Analysis of Personalized Life Expectancy Using Smart Devices
J Kang
Technologies 6 (3), 74, 2018
22018
How to boost your internet speed when everyone is working from home
JJ Kang, P Haskell-Dowland
The Conversation, 2020
12020
An Integrated mHealth and Vehicular Sensor Based Alarm System Emergency Alarm Notification System for Long Distance Drivers using Smart Devices and Cloud Networks
JJ Kang, S Venkatraman
2018 28th International Telecommunication Networks and Applications …, 2018
12018
How safe is COVIDSafe? What you should know about the app’s issues, and Bluetooth-related risks
J Kang
The Conversation, 2020
2020
A Framework of Military Wireless Body Area Networks Converged with Low Power Wide Area Networks
JJ Kang
Cyber Defence Next Generation Technology & science Conference Brisbane 24 …, 2020
2020
Systematic Analysis of Security Implementation for Internet of Health Things in Mobile Health Networks
JJ Kang
Data Science in Cybersecurity and Cyberthreat Intelligence, pp 87-113, 2020
2020
Don’t die wondering: apps may soon be able to predict your life expectancy, but do you want to know?
J Kang
The Conversation, 2020
2020
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks
JJ Kang, K Fahd, S Venkatraman, R Trujillo-Rasua, P Haskell-Dowland
2019 29th International Telecommunication Networks and Applications …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20