Browse > Article List

논문
1 Application of access control policy in ScienceDMZ-based network configuration
Kwon, Woo Chang;Lee, Jae Kwang;Kim, Ki Hyeon; / Korea convergence Security Association , v.21, no.2, pp.3-10,
2 A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow
Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho; / Korea convergence Security Association , v.21, no.2, pp.11-18,
3 A Study on the Perception of Data 3 Act through Big Data Analysis
Oh, Jungjoo;Lee, Hwansoo; / Korea convergence Security Association , v.21, no.2, pp.19-28,
4 Design and Implementation of Secure UART based on Digital Signature and Encryption
Kim, Ju Hyeon;Joo, Young Jin;Hur, Ara;Cho, Min Kyoung;Ryu, Yeon Seung;Lee, Gyu Ho;Jang, Woo Hyun;Yu, Jae Gwan; / Korea convergence Security Association , v.21, no.2, pp.29-35,
5 Design and implementation of access control systems using decentralized identifier technology
Lee, Sang-Geun;Kim, Do-Hyeong;Jung, Soon-Ki; / Korea convergence Security Association , v.21, no.2, pp.37-46,
6 A Study on Efficient Network Topology Visualization using Node Centrality
Chang, Beom-Hwan;Ryu, Jemin;Kwon, Koohyung; / Korea convergence Security Association , v.21, no.2, pp.47-56,
7 Detecting Adversarial Example Using Ensemble Method on Deep Neural Network
Kwon, Hyun;Yoon, Joonhyeok;Kim, Junseob;Park, Sangjun;Kim, Yongchul; / Korea convergence Security Association , v.21, no.2, pp.57-66,
8 Technology of Lessons Learned Analysis using Artificial intelligence: Focused on the 'L2-OODA Ensemble Algorithm'
Yang, Seong-sil;Shin, Jin; / Korea convergence Security Association , v.21, no.2, pp.67-79,
9 A study on conflict resolution between officers and noncommissioned officers
Jung, JaeKeak; / Korea convergence Security Association , v.21, no.2, pp.81-88,
10 An Architecture of One-Stop Monitor and Tracking System for Respond to Domestic 'Lone Wolf' Terrorism
Eom, Jung-Ho;Sim, Se-Hyeon;Park, Kwang-Ki; / Korea convergence Security Association , v.21, no.2, pp.89-96,