Browse > Article List

논문
1 A Study Of Mining ESM based on Data-Mining
Kim, Min-Jun;Kim, Kui-Nam; / Korea convergence Security Association , v.11, no.6, pp.3-8,
2 Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns
Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun; / Korea convergence Security Association , v.11, no.6, pp.9-15,
3 Mobile Augmented Reality for Smart-Learning System
Lee, Jae-Young;Kim, Young-Tae;Lee, Seok-Han;Kim, Tae-Eun;Choi, Jong-Soo; / Korea convergence Security Association , v.11, no.6, pp.17-23,
4 A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network
Yang, Hwan-Seok;Yoo, Seung-Jae; / Korea convergence Security Association , v.11, no.6, pp.25-30,
5 Design of An Authentication System Proper for Hybrid Cloud Computing System
Lee, Geuk;Ji, Jae-Won;Chun, Hyun-Woo;Lee, Kyu-Won; / Korea convergence Security Association , v.11, no.6, pp.31-36,
6 V2I Authentication Protocol using Error Correcting Code in VANET Environment
Lee, Su-Youn; / Korea convergence Security Association , v.11, no.6, pp.37-44,
7 Algorithm of certificate security based-on using query language
Lee, Chang-Jo; / Korea convergence Security Association , v.11, no.6, pp.45-51,
8 ICS Security Risk Analysis Using Attack Tree
Kim, Kyung-Ah;Lee, Dae-Sung;Kim, Kui-Nam; / Korea convergence Security Association , v.11, no.6, pp.53-58,
9 A Study on the Analysis of U.S.A Navy and R.O.K Military C4I System and Future Development
Cha, Hyun-Jong;Yang, Ho-Kyung;Jo, Yong-Gun;Ryou, Hwang-Bin; / Korea convergence Security Association , v.11, no.6, pp.59-66,
10 An Approach to a Quantitative Evaluation of U-Service Survivability Reflecting Cyber-terrorism
Kim, Sung-Ki; / Korea convergence Security Association , v.11, no.6, pp.67-72,
11 The Comparative Study for the Property of Learning Effect based on Delay ed Software S-Shaped Reliability Model
Kim, Hee-Cheul;Shin, Hyun-Cheul; / Korea convergence Security Association , v.11, no.6, pp.73-80,