Browse > Article List

논문
1 A Study on Intrusion Alert Redustion Method for IDS Management
Kim, Seok-Hun;Jeong, Jin-Young;Song, Jung-Gil; / Korea convergence Security Association , v.5, no.4, pp.1-6,
2 Analysis on Common Criteria Improvements in Version 3.0
No, Byung-Gyu;Kim, Young-Tae;Park, Doo-Soon;Kim, Jeom-Goo; / Korea convergence Security Association , v.5, no.4, pp.7-18,
3 On Design and Implementation of Incremental LR Parsing Algorithm Using Changed Threed Tree
Lee, Dae-Sik; / Korea convergence Security Association , v.5, no.4, pp.19-25,
4 Response and Threat of Home Network System in Ubiquitous Environment
Oh, Dae-Gyun;Jeong, Jin-Young; / Korea convergence Security Association , v.5, no.4, pp.27-32,
5 A Effective LMS Model Using Sensing System
Kim, Seok-Soo;Ju, Min-Seong; / Korea convergence Security Association , v.5, no.4, pp.33-40,
6 Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System
Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam; / Korea convergence Security Association , v.5, no.4, pp.41-48,
7 A Cell-based Secure Sensor Network supporting Multi-casting Communication for the Application of Telemedicine
Sung, Ji-Yeon;Choi, Ju-Young;Kim, Myuhng-Joo; / Korea convergence Security Association , v.5, no.4, pp.49-58,
8 A Study of the Ubiquitous Computing and Network Security
Lee, Dae-Sik;Yun, Dong-Sic; / Korea convergence Security Association , v.5, no.4, pp.59-65,
9 A Study about Early Detection Techniques of Cyber Threats Based Honey-Net
Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam; / Korea convergence Security Association , v.5, no.4, pp.67-72,