1 |
C. Choi, Y. Lee, and T. Lee, "Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 11, 2016, pp. 1017-1024.
DOI
|
2 |
S. Park and N. Kim, "A Verification Case Study about the Authentication of a Network using AAA," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, 2017, pp. 295-300.
DOI
|
3 |
J. Jeong and M. Choi, "A Study on Awareness of Information Security Influencing Trustness," J. of the Korean Institute of Information Security and Cryptology, vol. 25, no. 5, 2015, pp. 1225-1233.
DOI
|
4 |
M. Yim, "Why Security Awareness Education is not Effective?," J. of Digital Convergence, vol. 12, no. 2, 2014, pp. 27-37.
DOI
|
5 |
J. Jang, C. Choi, and D. Kim, "Design of Smart Tourism in Big Data," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 637-644.
DOI
|
6 |
J. Kim, "A Mobile-Sink based Energy-efficient Clustering Scheme in Mobile Wireless Sensor Networks," J. of Korea Academia-Industrial Cooperation Society, vol. 18, no. 5, 2017, pp. 1-9.
DOI
|
7 |
B. Cha, J. Kim, and S. Park, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 8, 2015, pp. 891-900.
DOI
|
8 |
J. Bae and O. Park, "A case analysis on the effects of HRM on innovative performance," J. of Korea Academy of Organization and Management, vol. 30, no. 1, 2006, pp. 177-209.
|
9 |
J. Kim, S. Kim, and S. Ryu, "The Impact of HR Involvement on HR Effectiveness," J. of Korea Academy of Management, vol. 12, no. 3, 2004, pp. 127-161.
|
10 |
J. Jang, D. Kim, and C. Choi, "Study on Hybrid Type Cloud System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 611-618.
DOI
|