|
1 |
A Designing Method of Digital Forensic Snort Application Model
Noh, Si-Choon;
/
Korea convergence Security Association
, v.10, no.2, pp.1-9,
|
|
2 |
Analysis of Indoor Signal Strength from Zigbee Sensor
Lee, Jong-Chan;Park, Sang-Joon;Park, Ki-Hong;
/
Korea convergence Security Association
, v.10, no.2, pp.11-17,
|
|
3 |
Information Hiding Application Method Using Steganography
Lee, Cheol;Kim, Yong-Man;Yoo, Seung-Jae;
/
Korea convergence Security Association
, v.10, no.2, pp.19-26,
|
|
4 |
Design of User Certification Module of Home Gateway System based on OSGi
Myung, Sun-Kyu;Kim, Gwang-Hyun;
/
Korea convergence Security Association
, v.10, no.2, pp.27-35,
|
|
5 |
An Embedded System for Sensor Networks
Lee, Jong-Chan;Park, Sang-Joon;
/
Korea convergence Security Association
, v.10, no.2, pp.37-41,
|
|
6 |
Malware Analysis and Policy Counterplan Against a Transformation of HTTP Header Information
Lim, Won-Gyu;Heo, Geon-Il;Park, Won-Hyung;Kook, Kwang-Ho;
/
Korea convergence Security Association
, v.10, no.2, pp.43-49,
|
|
7 |
Extended Trust Evaluation Mechanism Considered Confidence Value of Distributed Service in Mobile Ad-hoc Network
Jang, Jong-Deok;Yoon, Chang-Pyo;Ryou, Hwang-Bin;
/
Korea convergence Security Association
, v.10, no.2, pp.51-57,
|
|