|
1 |
The Study of Response Model & Mechanism Against Windows Kernel Compromises
Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam;
/
Korea convergence Security Association
, v.6, no.3, pp.1-12,
|
|
2 |
A Stable Evidence Collection Procedure of a Volatile Data in Research
Kim, Yong-Ho;Lee, Dong-Hwi;J. Kim, Kui-Nam;
/
Korea convergence Security Association
, v.6, no.3, pp.13-19,
|
|
3 |
Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management
Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon;
/
Korea convergence Security Association
, v.6, no.3, pp.21-28,
|
|
4 |
Development of Edge Detection System Based on Adaptive Directional Derivative
Kim, Eun-Mi;
/
Korea convergence Security Association
, v.6, no.3, pp.29-35,
|
|
5 |
A Study on Characteristics of an Terrestrial Magnetism Sensor with Bluetooth
Park, Sun-Jin;Jeong, Jung-Su;
/
Korea convergence Security Association
, v.6, no.3, pp.37-47,
|
|
6 |
A Study on Evaluation System based on Characteristics of BcN
Na, Yun-Ji;Ko, Il-Seok;Cho, Young-Suk;
/
Korea convergence Security Association
, v.6, no.3, pp.49-58,
|
|
7 |
Memory Injection Technique and Injected DLL Analysis Technique in Windows Environment
Hwang, Hyun-Uk;Chae, Jong-Ho;Yun, Young-Tae;
/
Korea convergence Security Association
, v.6, no.3, pp.59-67,
|
|
8 |
A Study on the Design and Implementation of Algorithm for Next Generation Cyber Certificate Security
Lee, Chang-Jo;Kim, Sang-Bok;
/
Korea convergence Security Association
, v.6, no.3, pp.69-78,
|
|
9 |
A Study on Characteristics of an IR Sensor with Bluetooth
Park, Sun-Jin;Jeong, Jung-Su;
/
Korea convergence Security Association
, v.6, no.3, pp.79-86,
|
|
10 |
A Study for Feature Selection in the Intrusion Detection System
Han, Myung-Mook;
/
Korea convergence Security Association
, v.6, no.3, pp.87-95,
|
|
11 |
A Study for Implement of Generalize Valuation System for A Performance Assessment
Lee, Jin-Kwan;Jang, Hae-Suk;Lee, Jong-Chan;Park, Ki-Hong;
/
Korea convergence Security Association
, v.6, no.3, pp.97-106,
|
|
12 |
Analysis of Design Error in Windows Update and Automatic Updates, and the Solutions
Kim, Yun-Ju;Yun, Young-Tae;Kang, Sung-Moon;
/
Korea convergence Security Association
, v.6, no.3, pp.107-115,
|
|
13 |
The NHPP Bayesian Software Reliability Model Using Latent Variables
Kim, Hee-Cheul;Shin, Hyun-Cheul;
/
Korea convergence Security Association
, v.6, no.3, pp.117-126,
|
|
14 |
Design and Implementation of a Web based Collaboration Learning System for Question Marking
Choi, Yue-Soon;Jung, Suck-Tae;Park, Jong-Goo;
/
Korea convergence Security Association
, v.6, no.3, pp.127-133,
|
|
15 |
A Study on the Evaluation Indices for Evaluation of the Information Security Level on the Enterprise Organization
Na, Yun-Ji;Ko, Il-Seok;Cho, Young-Suk;
/
Korea convergence Security Association
, v.6, no.3, pp.135-144,
|
|
16 |
A Study of Infinite Failure NHPP Software Reliability Growth Model base on Record Value Statistics with Gamma Family of Lifetime Distribution
Kim, Hee-Cheul;Sin, Hyun-Cheul;
/
Korea convergence Security Association
, v.6, no.3, pp.145-153,
|
|