Browse > Article List

논문
1 A Building Method of Security Architecture Framework on the Medical Information Network Environment
Lee, Dae-Sung;Noh, Si-Choon; / Korea convergence Security Association , v.11, no.4, pp.3-9,
2 System Design and Implementation of FLV Move Picture Solution Based on IDC apply to Mini IPTV
Kwon, O-Byoung;Shin, Hyun-Cheul; / Korea convergence Security Association , v.11, no.4, pp.11-17,
3 A Study on the New Legislative Trend of Cybersecurity of U.S.A
Park, Sang-Don;Park, Hyun-Dong;Hong, Soon-Jwa; / Korea convergence Security Association , v.11, no.4, pp.19-29,
4 A Study on Industrial Security Outflow Prevention System Based on Network Biometric Authentication
Lee, Dae-Sung; / Korea convergence Security Association , v.11, no.4, pp.31-36,
5 Design of Information Security in Ubiquitous City
Yoon, Seuk-Kyu;Jang, Hee-Seon; / Korea convergence Security Association , v.11, no.4, pp.37-42,
6 A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment
Noh, Si-Choon;Hwang, Jeong-Hee; / Korea convergence Security Association , v.11, no.4, pp.43-49,
7 An EPG Configuration Constructing Method and Structure for Dynamically Implementing Viewer Chosen EPG Configurations
Ko, Kwang-Il; / Korea convergence Security Association , v.11, no.4, pp.51-58,
8 Development of Vision-Based Monitering System Technology for Traffic
Hong, Gwang-Soo;Eom, Tae-Jung;Kim, Byung-Gyu; / Korea convergence Security Association , v.11, no.4, pp.59-66,
9 Design of Device Management System for Removing Smartphone Malware
Jeong, Gi-Seog; / Korea convergence Security Association , v.11, no.4, pp.67-75,
10 A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design
Lee, Dae-Sung;Noh, Si-Choon; / Korea convergence Security Association , v.11, no.4, pp.77-83,
11 The Comparative Study for Truncated Software Reliability Growth Model based on Log-Logistic Distribution
Kim, Hee-Cheul;Shin, Hyun-Cheul; / Korea convergence Security Association , v.11, no.4, pp.85-91,