|
1 |
A Study on Protection Model of Propagation through Smartphone Malware Analysis
Lim, Su-Jin;Lee, Jung-Hyun;Kang, Hyung;Park, Won-Hyung;Kook, Kwang-Ho;
/
Korea convergence Security Association
, v.10, no.1, pp.1-8,
|
|
2 |
A Designing Method of Intranet Security Architecture Model for Network Security Efficiency
Noh, Si-Choon;
/
Korea convergence Security Association
, v.10, no.1, pp.9-17,
|
|
3 |
A Study on Detection and Responding Technology through Windows Malware Analysis
Lim, Won-Gyu;Lee, Jung-Hyun;Lim, Su-Jin;Park, Won-Hyung;Kook, Kwang-Ho;
/
Korea convergence Security Association
, v.10, no.1, pp.19-27,
|
|
4 |
Metrics for Measuring a Structural Complexity of Softwares Based on SOA
Kim, Eun-Mi;
/
Korea convergence Security Association
, v.10, no.1, pp.29-34,
|
|
5 |
Developing an Archive for the 'Heungtaryeong'
Kim, Tae-Eun;Kim, Jeom-Goo;
/
Korea convergence Security Association
, v.10, no.1, pp.35-40,
|
|
6 |
Forwarding Protocol Along with Angle Priority in Vehicular Networks
Yu, Suk-Dea;Lee, Dong-Chun;
/
Korea convergence Security Association
, v.10, no.1, pp.41-48,
|
|
7 |
A Study on Design of the Image Retrieval System Using Embedded System
Kim, Kyung-Soo;
/
Korea convergence Security Association
, v.10, no.1, pp.49-53,
|
|
8 |
The Property of Software Optimal Release Time Based on Log Poission Execution Time Model Using Interval Failure Times
Sin, Hyun-Cheul;Kim, Hee-Cheul;
/
Korea convergence Security Association
, v.10, no.1, pp.55-61,
|
|