Browse > Article List

논문
1 A Comparative Study on Function and Performance of Snort and Suricata
Jeong, Myeong Ki;Ahn, Seongjin;Park, Won Hyung; / Korea convergence Security Association , v.14, no.5, pp.3-8,
2 A Data Service of Managing Favorite Broadcasting Programs for helping Viewer's Program Searching Task
Ko, Kwangil;Lee, Chang-Jo; / Korea convergence Security Association , v.14, no.5, pp.9-15,
3 A Study on Local Micro Pattern for Facial Expression Recognition
Jung, Woong Kyung;Cho, Young Tak;Ahn, Yong Hak;Chae, Ok Sam; / Korea convergence Security Association , v.14, no.5, pp.17-24,
4 Development of an HMI Evaluation Tool Supporting Test of Interaction with IoT-based Systems
Lee, YoungRan; / Korea convergence Security Association , v.14, no.5, pp.25-30,
5 Countermeasure for Preventing a Secondary Damage of Information Leakage using Financial ISAC
Jeong, Gi Seog; / Korea convergence Security Association , v.14, no.5, pp.31-36,
6 ESP model for predictions Trojan
Kim, JongMin;Kim, MinSu;Kim, Kuinam J.; / Korea convergence Security Association , v.14, no.5, pp.37-47,
7 A study on local facial features using LDP
Cho, Young Tak;Jung, Woong Kyung;Ahn, Yong Hak;Chae, Ok Sam; / Korea convergence Security Association , v.14, no.5, pp.49-56,
8 Design and Implementation of Authority Management for the Integrated Medical Information System in a Hospital Environment
Cha, Hyo Soung;Chung, Seung Hyun;Ryu, Keun Ho;Hwang, Jeong Hee; / Korea convergence Security Association , v.14, no.5, pp.57-64,
9 A Study of the Analysis and Countermeasure about the Phishing Scam
Kang, Hyun Joong; / Korea convergence Security Association , v.14, no.5, pp.65-74,