Browse > Article List

논문
1 Development of Network Event Audit Module Using Data Mining
Han, Seak-Jae;Soh, Woo-Young; / Korea convergence Security Association , v.5, no.2, pp.1-8,
2 Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System
Kim, Seok-Hun;Kim, Eun-Soo;Song, Jung-Gil; / Korea convergence Security Association , v.5, no.2, pp.9-17,
3 RMCS Plan and the Embodiment for the Home Network Service which is Safeent
Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam; / Korea convergence Security Association , v.5, no.2, pp.19-27,
4 A User Authentication Technique for the E-commerce
Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak; / Korea convergence Security Association , v.5, no.2, pp.29-36,
5 A Study on the LCMS Model for u-Learning
Woo, Young-Hwan;Chung, Jin-Wook;Kim, Seok-Soo; / Korea convergence Security Association , v.5, no.2, pp.37-42,
6 Design and Implementation of the Linux Kernel Backdoor Intruder Tracing-Response System
Jeon, Wan-Keun; / Korea convergence Security Association , v.5, no.2, pp.43-50,
7 Design of Intrusion Responsible System For Enterprise Security Management
Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil; / Korea convergence Security Association , v.5, no.2, pp.51-56,
8 A Design and Security of One Card System using Smart Card
Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak; / Korea convergence Security Association , v.5, no.2, pp.57-63,
9 Design and Implementation of the Intrusion Detection Data Web-based Management System on Heterogeneous Environments
Kim, Eun-Soo;Kim, Seok-Hun;Song, Jung-Gil; / Korea convergence Security Association , v.5, no.2, pp.65-74,