1 |
Seong-Hoon Lee, Dong-Woo, "A Study on Internet of Things in IT Convergence Period", The Journal of Digital Convergence, Vol. 12, No. 07.6, pp. 267-272, 2014.
DOI
ScienceOn
|
2 |
Kwang-Jae Lee, Keun-Ho Lee, "A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service", The Journal of Digital Convergence, Vol 6, No. 2, p65, 2015
|
3 |
Joo-Hyeon Park, Chang Geun Song, "The design of an external Bluetooth device and its library based on WIPI for the short-range wireless communication between cellular phone and smart phone", Korean Society of Computer Game, Vol. 24, No. 1, pp. 53-61, 2011.
|
4 |
JongHyun Kim, Kwangsue Chung, "An Efficient Beacon Management Technique for Senor Network-Based Indoor Location Systems", 2009.8
|
5 |
David Molnary, Stefan Saroi, AlecWolmany, "Zero-Effort Payments: Design, Deployment, and Lessons", 2014.
|
6 |
Jun Young Park, Huy Kang Kim, "A Study on the Implementation of outdoor type Virtual Private Network Gateway for Smart Grid", 2011
|
7 |
Lee Hyeonjong, "Use of Bug Data Hadoop platform", J-KICS, Vol. 29, No.11, pp. 43-47, 2012
|
8 |
http://ko.wikipedia.org/wiki/hadoop
|
9 |
J. W. Lee, S.K. Kim, "Complementary research and Analysis for hadoop" in The Korea Society of Computer and Information Winter Conference 2012, vol. 20, no. 2, pp.3-6, 2012
|
10 |
Kim Byung-moon"Design and Implementation of Hadoop-Based Mobile Streaming Application for Personalized Multimedia Service" Ph. M.S dissertation, Sejong University, 2014
|
11 |
Hyun-wook Kim, Sung-eun Park, Seong-yul Euh "The Distributed Encryption Processing System for Large Capacity Personal Information based on MapReduce", Vol. 18, No. 3, 2014.
|
12 |
Bae Jeong-min "Detection of Keywords in malicious packets using Hadoop MapReduce", 2015
|
13 |
]http://view.asiae.co.kr/news/view.htm?idxno=2014120208403506820
|
14 |
Byung-chul Kim, "A study on Utilization of Big Data Based on the Personal Information Protection Act ", Journal of Digital Convergence, Vol.12, no.12 pp. 87-92, 2014
DOI
|
15 |
Sung-kyu Cho, Moon-seog Jun, "Privacy Leakage Monitoring System Design for Privacy Protection", Journal of Korea Institute of Information Security and Cryptology, Vol 22, No. 1, pp99-106, 2012
|