|
1 |
A Comparative Study on Function and Performance of Snort and Suricata
Jeong, Myeong Ki;Ahn, Seongjin;Park, Won Hyung;
/
Korea convergence Security Association
, v.14, no.5, pp.3-8,
|
|
2 |
A Data Service of Managing Favorite Broadcasting Programs for helping Viewer's Program Searching Task
Ko, Kwangil;Lee, Chang-Jo;
/
Korea convergence Security Association
, v.14, no.5, pp.9-15,
|
|
3 |
A Study on Local Micro Pattern for Facial Expression Recognition
Jung, Woong Kyung;Cho, Young Tak;Ahn, Yong Hak;Chae, Ok Sam;
/
Korea convergence Security Association
, v.14, no.5, pp.17-24,
|
|
4 |
Development of an HMI Evaluation Tool Supporting Test of Interaction with IoT-based Systems
Lee, YoungRan;
/
Korea convergence Security Association
, v.14, no.5, pp.25-30,
|
|
5 |
Countermeasure for Preventing a Secondary Damage of Information Leakage using Financial ISAC
Jeong, Gi Seog;
/
Korea convergence Security Association
, v.14, no.5, pp.31-36,
|
|
6 |
ESP model for predictions Trojan
Kim, JongMin;Kim, MinSu;Kim, Kuinam J.;
/
Korea convergence Security Association
, v.14, no.5, pp.37-47,
|
|
7 |
A study on local facial features using LDP
Cho, Young Tak;Jung, Woong Kyung;Ahn, Yong Hak;Chae, Ok Sam;
/
Korea convergence Security Association
, v.14, no.5, pp.49-56,
|
|
8 |
Design and Implementation of Authority Management for the Integrated Medical Information System in a Hospital Environment
Cha, Hyo Soung;Chung, Seung Hyun;Ryu, Keun Ho;Hwang, Jeong Hee;
/
Korea convergence Security Association
, v.14, no.5, pp.57-64,
|
|
9 |
A Study of the Analysis and Countermeasure about the Phishing Scam
Kang, Hyun Joong;
/
Korea convergence Security Association
, v.14, no.5, pp.65-74,
|
|