Browse > Article List

논문
1 A Study on Protection Model of Propagation through Smartphone Malware Analysis
Lim, Su-Jin;Lee, Jung-Hyun;Kang, Hyung;Park, Won-Hyung;Kook, Kwang-Ho; / Korea convergence Security Association , v.10, no.1, pp.1-8,
2 A Designing Method of Intranet Security Architecture Model for Network Security Efficiency
Noh, Si-Choon; / Korea convergence Security Association , v.10, no.1, pp.9-17,
3 A Study on Detection and Responding Technology through Windows Malware Analysis
Lim, Won-Gyu;Lee, Jung-Hyun;Lim, Su-Jin;Park, Won-Hyung;Kook, Kwang-Ho; / Korea convergence Security Association , v.10, no.1, pp.19-27,
4 Metrics for Measuring a Structural Complexity of Softwares Based on SOA
Kim, Eun-Mi; / Korea convergence Security Association , v.10, no.1, pp.29-34,
5 Developing an Archive for the 'Heungtaryeong'
Kim, Tae-Eun;Kim, Jeom-Goo; / Korea convergence Security Association , v.10, no.1, pp.35-40,
6 Forwarding Protocol Along with Angle Priority in Vehicular Networks
Yu, Suk-Dea;Lee, Dong-Chun; / Korea convergence Security Association , v.10, no.1, pp.41-48,
7 A Study on Design of the Image Retrieval System Using Embedded System
Kim, Kyung-Soo; / Korea convergence Security Association , v.10, no.1, pp.49-53,
8 The Property of Software Optimal Release Time Based on Log Poission Execution Time Model Using Interval Failure Times
Sin, Hyun-Cheul;Kim, Hee-Cheul; / Korea convergence Security Association , v.10, no.1, pp.55-61,