|
1 |
Application of access control policy in ScienceDMZ-based network configuration
Kwon, Woo Chang;Lee, Jae Kwang;Kim, Ki Hyeon;
/
Korea convergence Security Association
, v.21, no.2, pp.3-10,
|
|
2 |
A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow
Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho;
/
Korea convergence Security Association
, v.21, no.2, pp.11-18,
|
|
3 |
A Study on the Perception of Data 3 Act through Big Data Analysis
Oh, Jungjoo;Lee, Hwansoo;
/
Korea convergence Security Association
, v.21, no.2, pp.19-28,
|
|
4 |
Design and Implementation of Secure UART based on Digital Signature and Encryption
Kim, Ju Hyeon;Joo, Young Jin;Hur, Ara;Cho, Min Kyoung;Ryu, Yeon Seung;Lee, Gyu Ho;Jang, Woo Hyun;Yu, Jae Gwan;
/
Korea convergence Security Association
, v.21, no.2, pp.29-35,
|
|
5 |
Design and implementation of access control systems using decentralized identifier technology
Lee, Sang-Geun;Kim, Do-Hyeong;Jung, Soon-Ki;
/
Korea convergence Security Association
, v.21, no.2, pp.37-46,
|
|
6 |
A Study on Efficient Network Topology Visualization using Node Centrality
Chang, Beom-Hwan;Ryu, Jemin;Kwon, Koohyung;
/
Korea convergence Security Association
, v.21, no.2, pp.47-56,
|
|
7 |
Detecting Adversarial Example Using Ensemble Method on Deep Neural Network
Kwon, Hyun;Yoon, Joonhyeok;Kim, Junseob;Park, Sangjun;Kim, Yongchul;
/
Korea convergence Security Association
, v.21, no.2, pp.57-66,
|
|
8 |
Technology of Lessons Learned Analysis using Artificial intelligence: Focused on the 'L2-OODA Ensemble Algorithm'
Yang, Seong-sil;Shin, Jin;
/
Korea convergence Security Association
, v.21, no.2, pp.67-79,
|
|
9 |
A study on conflict resolution between officers and noncommissioned officers
Jung, JaeKeak;
/
Korea convergence Security Association
, v.21, no.2, pp.81-88,
|
|
10 |
An Architecture of One-Stop Monitor and Tracking System for Respond to Domestic 'Lone Wolf' Terrorism
Eom, Jung-Ho;Sim, Se-Hyeon;Park, Kwang-Ki;
/
Korea convergence Security Association
, v.21, no.2, pp.89-96,
|
|