This map shows the geographic impact of Taeshik Shon's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Taeshik Shon with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Taeshik Shon more than expected).
This network shows the impact of papers produced by Taeshik Shon. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Taeshik Shon. The network helps show where Taeshik Shon may publish in the future.
Co-authorship network of co-authors of Taeshik Shon
This figure shows the co-authorship network connecting the top 25 collaborators of Taeshik Shon.
A scholar is included among the top collaborators of Taeshik Shon based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Taeshik Shon. Taeshik Shon is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Shon, Taeshik, et al.. (2016). A Hybrid EV Authentication Approach in Smart Grid Based Distributed Network.. Ad Hoc & Sensor Wireless Networks. 31. 89–99.1 indexed citations
Han, Kyusuk, et al.. (2012). Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.. Ad Hoc & Sensor Wireless Networks. 14. 251–269.4 indexed citations
13.
Shon, Taeshik, et al.. (2012). Malicious Code Detection using the Effective Preprocessing Method Based on Native API. Information Security and Cryptology. 22(4). 785–796.1 indexed citations
14.
Shon, Taeshik, et al.. (2012). A Method for Detecting Unauthorized Access Point over 3G Network. Information Security and Cryptology. 22(2). 259–266.2 indexed citations
15.
Shon, Taeshik, et al.. (2012). Efficient and Secure User Authentication and SDP Encryption Method in SIP. Information Security and Cryptology. 22(3). 463–472.1 indexed citations
16.
Shon, Taeshik, et al.. (2012). A Study on the Korean-Stroke based Graphical Password Approach. Information Security and Cryptology. 22(2). 189–200.1 indexed citations
Shon, Taeshik, et al.. (2009). WIVA : WSN Monitoring Framework based on 3D Visualization and Augmented Reality in Mobile Devices. Journal of the Institute of Electronics Engineers of Korea. 46(2). 106–113.1 indexed citations
19.
Shon, Taeshik, et al.. (2008). Design and Implementation of Multi-Sensor based Smart Sensor Network using Mobile Devices. Journal of the Institute of Electronics Engineers of Korea. 45(5). 1–11.1 indexed citations
20.
Shon, Taeshik, et al.. (2003). Safe Patch Distribution Architecture in Intranet Environments.. Security and Management. 455–460.3 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.