|
1 |
Autonomous control of bicycle using Deep Deterministic Policy Gradient Algorithm
Choi, Seung Yoon;Le, Pham Tuyen;Chung, Tae Choong;
/
Korea convergence Security Association
, v.18, no.3, pp.3-9,
|
|
2 |
Security Consideration of Virtual Reality Service
Lim, Sanghyeok;Jeon, Junhyun;Lee, Youngsook;
/
Korea convergence Security Association
, v.18, no.3, pp.11-17,
|
|
3 |
Study on Improving Endpoint Security Technology
Yoo, Seung Jae;
/
Korea convergence Security Association
, v.18, no.3, pp.19-25,
|
|
4 |
A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android
Yoon, Hanj Jae;Lee, Man Hee;
/
Korea convergence Security Association
, v.18, no.3, pp.27-35,
|
|
5 |
A Study on Web Vulnerability Assessment and Prioritization of Measures by Vulnerabilities
Seong, JongHyuk;Lee, HooKi;Ko, InJe;Kim, Kuinam J.;
/
Korea convergence Security Association
, v.18, no.3, pp.37-44,
|
|
6 |
Study on the Carbon Dioxide Emission from Crypto currency Mining
Jeon, Jeong Hoon;
/
Korea convergence Security Association
, v.18, no.3, pp.45-51,
|
|
7 |
Design and Implementation of Hierarchical Image Classification System for Efficient Image Classification of Objects
You, Taewoo;Kim, Yunuk;Jeong, Hamin;Yoo, Hyunsoo;Ahn, Yonghak;
/
Korea convergence Security Association
, v.18, no.3, pp.53-59,
|
|
8 |
A Design of a Data Service providing Additional Information of ID Advertising
KO, Kwangil;
/
Korea convergence Security Association
, v.18, no.3, pp.61-68,
|
|
9 |
Smart Vehicle Security Vulnerability Analysis and Solution Support
Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young;
/
Korea convergence Security Association
, v.18, no.3, pp.69-76,
|
|
10 |
A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System
Kim, Jongmin;Kim, DongMin;Lee, DongHwi;
/
Korea convergence Security Association
, v.18, no.3, pp.77-85,
|
|
11 |
Improvement Proposals for Biometric Information Protection Guideline based on the Analysis of Global Bio Information Privacy Issues
Jung, Boo-geum;Kwon, Hun-yeong;Park, Hea-sook;Lim, Jong-in;
/
Korea convergence Security Association
, v.18, no.3, pp.87-94,
|
|
12 |
A Study on the Education Status and Improvement of Military Children due to Special Environmental Factors of National Security and Survival Rights
Kim, Byoung Jin;
/
Korea convergence Security Association
, v.18, no.3, pp.95-103,
|
|
13 |
Strategy for South Korea-Vietnamese Military Cooperation in the field of defense
Lee, Kang Kyong;
/
Korea convergence Security Association
, v.18, no.3, pp.105-112,
|
|
14 |
Evaluation and Forecast of North Korea's Nuclear Policy through Libya Model
Han, Seung Jo;Shin, Jin;
/
Korea convergence Security Association
, v.18, no.3, pp.113-122,
|
|
15 |
A Plan for Strengthening Cyber Security Capability toward North Korea: focusing on the Preparation of Cyber Warfare
Kim, Ho Jung;Kim, Jong-ha;
/
Korea convergence Security Association
, v.18, no.3, pp.123-132,
|
|
16 |
The Modeling of Management Data and Drones Recommendation for Military Operation Support Mission
Park, Keun-Seog;cheon, Sang-pil;Eom, Jung-ho;
/
Korea convergence Security Association
, v.18, no.3, pp.133-140,
|
|
17 |
Analysis of Relation between Safety Needs and Life Satisfaction of Security Safety System Users
Choi, Jeong-Il;Jang, Ye-Jin;
/
Korea convergence Security Association
, v.18, no.3, pp.141-148,
|
|
18 |
A Study on Utilization and its Model of the Private Military Companies(PMCs) in Introducing the Legal System in Korea
Kwak, SunJo;
/
Korea convergence Security Association
, v.18, no.3, pp.149-161,
|
|