|
1 |
A Study on Intrusion Alert Redustion Method for IDS Management
Kim, Seok-Hun;Jeong, Jin-Young;Song, Jung-Gil;
/
Korea convergence Security Association
, v.5, no.4, pp.1-6,
|
|
2 |
Analysis on Common Criteria Improvements in Version 3.0
No, Byung-Gyu;Kim, Young-Tae;Park, Doo-Soon;Kim, Jeom-Goo;
/
Korea convergence Security Association
, v.5, no.4, pp.7-18,
|
|
3 |
On Design and Implementation of Incremental LR Parsing Algorithm Using Changed Threed Tree
Lee, Dae-Sik;
/
Korea convergence Security Association
, v.5, no.4, pp.19-25,
|
|
4 |
Response and Threat of Home Network System in Ubiquitous Environment
Oh, Dae-Gyun;Jeong, Jin-Young;
/
Korea convergence Security Association
, v.5, no.4, pp.27-32,
|
|
5 |
A Effective LMS Model Using Sensing System
Kim, Seok-Soo;Ju, Min-Seong;
/
Korea convergence Security Association
, v.5, no.4, pp.33-40,
|
|
6 |
Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System
Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam;
/
Korea convergence Security Association
, v.5, no.4, pp.41-48,
|
|
7 |
A Cell-based Secure Sensor Network supporting Multi-casting Communication for the Application of Telemedicine
Sung, Ji-Yeon;Choi, Ju-Young;Kim, Myuhng-Joo;
/
Korea convergence Security Association
, v.5, no.4, pp.49-58,
|
|
8 |
A Study of the Ubiquitous Computing and Network Security
Lee, Dae-Sik;Yun, Dong-Sic;
/
Korea convergence Security Association
, v.5, no.4, pp.59-65,
|
|
9 |
A Study about Early Detection Techniques of Cyber Threats Based Honey-Net
Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam;
/
Korea convergence Security Association
, v.5, no.4, pp.67-72,
|
|