|
1 |
A Study Of Mining ESM based on Data-Mining
Kim, Min-Jun;Kim, Kui-Nam;
/
Korea convergence Security Association
, v.11, no.6, pp.3-8,
|
|
2 |
Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns
Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun;
/
Korea convergence Security Association
, v.11, no.6, pp.9-15,
|
|
3 |
Mobile Augmented Reality for Smart-Learning System
Lee, Jae-Young;Kim, Young-Tae;Lee, Seok-Han;Kim, Tae-Eun;Choi, Jong-Soo;
/
Korea convergence Security Association
, v.11, no.6, pp.17-23,
|
|
4 |
A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network
Yang, Hwan-Seok;Yoo, Seung-Jae;
/
Korea convergence Security Association
, v.11, no.6, pp.25-30,
|
|
5 |
Design of An Authentication System Proper for Hybrid Cloud Computing System
Lee, Geuk;Ji, Jae-Won;Chun, Hyun-Woo;Lee, Kyu-Won;
/
Korea convergence Security Association
, v.11, no.6, pp.31-36,
|
|
6 |
V2I Authentication Protocol using Error Correcting Code in VANET Environment
Lee, Su-Youn;
/
Korea convergence Security Association
, v.11, no.6, pp.37-44,
|
|
7 |
Algorithm of certificate security based-on using query language
Lee, Chang-Jo;
/
Korea convergence Security Association
, v.11, no.6, pp.45-51,
|
|
8 |
ICS Security Risk Analysis Using Attack Tree
Kim, Kyung-Ah;Lee, Dae-Sung;Kim, Kui-Nam;
/
Korea convergence Security Association
, v.11, no.6, pp.53-58,
|
|
9 |
A Study on the Analysis of U.S.A Navy and R.O.K Military C4I System and Future Development
Cha, Hyun-Jong;Yang, Ho-Kyung;Jo, Yong-Gun;Ryou, Hwang-Bin;
/
Korea convergence Security Association
, v.11, no.6, pp.59-66,
|
|
10 |
An Approach to a Quantitative Evaluation of U-Service Survivability Reflecting Cyber-terrorism
Kim, Sung-Ki;
/
Korea convergence Security Association
, v.11, no.6, pp.67-72,
|
|
11 |
The Comparative Study for the Property of Learning Effect based on Delay ed Software S-Shaped Reliability Model
Kim, Hee-Cheul;Shin, Hyun-Cheul;
/
Korea convergence Security Association
, v.11, no.6, pp.73-80,
|
|