Browse > Article List

논문
1 Policy-based In-Network Security Management using P4 Network DataPlane Programmability
Cho, Buseung; / Korea convergence Security Association , v.20, no.5, pp.3-10,
2 An Intelligent Bluetooth Intrusion Detection System for the Real Time Detection in Electric Vehicle Charging System
Yun, Young-Hoon;Kim, Dae-Woon;Choi, Jung-Ahn;Kang, Seung-Ho; / Korea convergence Security Association , v.20, no.5, pp.11-17,
3 Comparative Analysis of Cyber Attacks of Korea Government and Policy Countermeasures
Kwon, Hyeokchun;Lee, Youngjun;Park, Wonhyung; / Korea convergence Security Association , v.20, no.5, pp.19-26,
4 XML-based Windows Event Log Forensic tool design and implementation
Kim, Jongmin;Lee, DongHwi; / Korea convergence Security Association , v.20, no.5, pp.27-32,
5 A Study on the Zone-Key based Secure Routing Scheme in MANET
Yang, Hwan Seok;Kim, Young Sun; / Korea convergence Security Association , v.20, no.5, pp.33-39,
6 Development on Filtering Priority Algorithm for Security Signature Search
Jun, Eun-A;Kim, Jeom-goo; / Korea convergence Security Association , v.20, no.5, pp.41-52,
7 Research on technical protection measures through risk analysis of pseudonym information for life-cycle
Cha, Gun-Sang; / Korea convergence Security Association , v.20, no.5, pp.53-63,
8 Developing an XR based Hyper-realistic Counter-Terrorism, Education, Training, and Evaluation System
Shin, Kyuyong;Lee, Sehwan; / Korea convergence Security Association , v.20, no.5, pp.65-74,
9 Ransomware Threat Countermeasures for the Defense Information System: In terms of Information Security Risk Management
Yoo, Jincheol;Moon, Sangwoo;Kim, Jong-hwa; / Korea convergence Security Association , v.20, no.5, pp.75-80,
10 China's Hegemony
Lee, Dae Sung; / Korea convergence Security Association , v.20, no.5, pp.81-88,