|
1 |
A Study on The Utilization and Secure Plan of Security in Social Media
Cheon, Woo-Bong;Park, Won-Hyung;Chung, Tai-Myoung;
/
Korea convergence Security Association
, v.10, no.3, pp.1-7,
|
|
2 |
An Information Security Model for Digital Contents
Yoon, Seuk-Kyu;Jang, Hee-Seon;
/
Korea convergence Security Association
, v.10, no.3, pp.9-14,
|
|
3 |
A Study on the Network Centric Warfare Information Security for Ubiquitous Network Computing
Kwon, Moon-Taek;
/
Korea convergence Security Association
, v.10, no.3, pp.15-22,
|
|
4 |
A Study on The Leak of Core Business Technologies Using Preventative Security Methods Such as Clustering
Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam;
/
Korea convergence Security Association
, v.10, no.3, pp.23-28,
|
|
5 |
Group Key Management Scheme for Survelliance and Reconnaissance Sensor Networks based on Probabilistic Key Sharing
Bae, Si-Hyun;Lee, Soo-Jin;
/
Korea convergence Security Association
, v.10, no.3, pp.29-41,
|
|
6 |
A Study on Application of u-Learning System in Network Centric Warfare Environment
Cha, Hyun-Jong;Yang, Ho-Kyung;Ryou, Hwang-Bin;Jo, Yong-Gun;
/
Korea convergence Security Association
, v.10, no.3, pp.43-49,
|
|
7 |
A Study on Malicious Codes Grouping and Analysis Using Visualization
Song, In-Soo;Lee, Dong-Hui;Kim, Kui-Nam;
/
Korea convergence Security Association
, v.10, no.3, pp.51-60,
|
|
8 |
A Study on the Improvement of the Malware Evidence Collection Module Based On Windows
Heo, Geon-Il;Park, Chan-Uk;Park, Won-Hyung;Kuk, Kwang-Ho;
/
Korea convergence Security Association
, v.10, no.3, pp.61-68,
|
|
9 |
Policy-Based QoS Control Management System for VoIP Service
Cho, Bong-Kwan;Jung, Jae-Il;
/
Korea convergence Security Association
, v.10, no.3, pp.69-75,
|
|