|
1 |
Development of Network Event Audit Module Using Data Mining
Han, Seak-Jae;Soh, Woo-Young;
/
Korea convergence Security Association
, v.5, no.2, pp.1-8,
|
|
2 |
Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System
Kim, Seok-Hun;Kim, Eun-Soo;Song, Jung-Gil;
/
Korea convergence Security Association
, v.5, no.2, pp.9-17,
|
|
3 |
RMCS Plan and the Embodiment for the Home Network Service which is Safeent
Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam;
/
Korea convergence Security Association
, v.5, no.2, pp.19-27,
|
|
4 |
A User Authentication Technique for the E-commerce
Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak;
/
Korea convergence Security Association
, v.5, no.2, pp.29-36,
|
|
5 |
A Study on the LCMS Model for u-Learning
Woo, Young-Hwan;Chung, Jin-Wook;Kim, Seok-Soo;
/
Korea convergence Security Association
, v.5, no.2, pp.37-42,
|
|
6 |
Design and Implementation of the Linux Kernel Backdoor Intruder Tracing-Response System
Jeon, Wan-Keun;
/
Korea convergence Security Association
, v.5, no.2, pp.43-50,
|
|
7 |
Design of Intrusion Responsible System For Enterprise Security Management
Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil;
/
Korea convergence Security Association
, v.5, no.2, pp.51-56,
|
|
8 |
A Design and Security of One Card System using Smart Card
Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak;
/
Korea convergence Security Association
, v.5, no.2, pp.57-63,
|
|
9 |
Design and Implementation of the Intrusion Detection Data Web-based Management System on Heterogeneous Environments
Kim, Eun-Soo;Kim, Seok-Hun;Song, Jung-Gil;
/
Korea convergence Security Association
, v.5, no.2, pp.65-74,
|
|