Browse > Article List

논문
1 A Designing Method of Digital Forensic Snort Application Model
Noh, Si-Choon; / Korea convergence Security Association , v.10, no.2, pp.1-9,
2 Analysis of Indoor Signal Strength from Zigbee Sensor
Lee, Jong-Chan;Park, Sang-Joon;Park, Ki-Hong; / Korea convergence Security Association , v.10, no.2, pp.11-17,
3 Information Hiding Application Method Using Steganography
Lee, Cheol;Kim, Yong-Man;Yoo, Seung-Jae; / Korea convergence Security Association , v.10, no.2, pp.19-26,
4 Design of User Certification Module of Home Gateway System based on OSGi
Myung, Sun-Kyu;Kim, Gwang-Hyun; / Korea convergence Security Association , v.10, no.2, pp.27-35,
5 An Embedded System for Sensor Networks
Lee, Jong-Chan;Park, Sang-Joon; / Korea convergence Security Association , v.10, no.2, pp.37-41,
6 Malware Analysis and Policy Counterplan Against a Transformation of HTTP Header Information
Lim, Won-Gyu;Heo, Geon-Il;Park, Won-Hyung;Kook, Kwang-Ho; / Korea convergence Security Association , v.10, no.2, pp.43-49,
7 Extended Trust Evaluation Mechanism Considered Confidence Value of Distributed Service in Mobile Ad-hoc Network
Jang, Jong-Deok;Yoon, Chang-Pyo;Ryou, Hwang-Bin; / Korea convergence Security Association , v.10, no.2, pp.51-57,