|
1 |
A Hybrid Vulnerability of NFC Technology in Smart Phone
Park, Chang Min;Park, Neo;Park, Won Hyung;
/
Korea convergence Security Association
, v.12, no.4, pp.3-8,
|
|
2 |
Detecting Repackaged Applications using the Information of App Installation in Android Smartphones
Joun, Young Nam;Ahn, Woo Hyun;
/
Korea convergence Security Association
, v.12, no.4, pp.9-15,
|
|
3 |
A Pseudo-Random Number Generator based on Segmentation Technique
Jeon, Min-Jung;Kim, Sang-Choon;Lee, Je-Hoon;
/
Korea convergence Security Association
, v.12, no.4, pp.17-23,
|
|
4 |
A Study on Models for Technical Security Maturity Level Based on SSE-CMM
Kim, Jeom Goo;Noh, Si Choon;
/
Korea convergence Security Association
, v.12, no.4, pp.25-31,
|
|
5 |
Comparative Study on Legal System on Cybersecurity Stages in South Korea and the United States
Park, Sangdon;Kim, Injung;
/
Korea convergence Security Association
, v.12, no.4, pp.33-40,
|
|
6 |
A Study on Efficient Facial Expression Recognition System for Customer Satisfaction Feedback
Kang, Min-Sik;
/
Korea convergence Security Association
, v.12, no.4, pp.41-47,
|
|
7 |
Trustworthy authentication and key management for NSDR ad-hoc network
Rhee, Chung Sei;
/
Korea convergence Security Association
, v.12, no.4, pp.49-55,
|
|
8 |
C4ISR Systems IDS Performance Enhancing Method
Choi, Junesung;Kook, Kwangho;
/
Korea convergence Security Association
, v.12, no.4, pp.57-69,
|
|
9 |
Vulnerability Analysis using the Web Vulnerability Scanner
Jang, Hee-Seon;
/
Korea convergence Security Association
, v.12, no.4, pp.71-76,
|
|
10 |
A Study of an Anomalous Event Detection using White-List on Control Networks
Lee, DongHwi;Choi, KyongHo;
/
Korea convergence Security Association
, v.12, no.4, pp.77-84,
|
|
11 |
A Study of DES(Data Encryption Standard) Property, Diagnosis and How to Apply Enhanced Symmetric Key Encryption Algorithm
Noh, Si Choon;
/
Korea convergence Security Association
, v.12, no.4, pp.85-90,
|
|
12 |
A Study on Caching Management Technique in Mobile Ad-hoc Network
Yang, Hwan Seok;Yoo, Seung Jae;
/
Korea convergence Security Association
, v.12, no.4, pp.91-96,
|
|
13 |
The Analysis of the Malware Trend and the Prediction on the Defense Service and Industry
Choi, Junesung;Kook, Kwangho;
/
Korea convergence Security Association
, v.12, no.4, pp.97-108,
|
|
14 |
Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray
Kim, JongMin;Choi, KyongHo;Lee, DongHwi;
/
Korea convergence Security Association
, v.12, no.4, pp.109-114,
|
|
15 |
A Study of Quality-based Software Architecture Design Model under Web Application Development Environment
Moon, Song Chul;Noh, Si Choon;
/
Korea convergence Security Association
, v.12, no.4, pp.115-122,
|
|
16 |
A Study of Guranteeing Security of A Building by Uinsg the Double Entrance-Control System
Kim, Min Su;Lee, DongHwi;Kim, Kuinam J.;
/
Korea convergence Security Association
, v.12, no.4, pp.123-129,
|
|