1 |
J. Hom, S. Heon, and T. Mhung, "A Sudy on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability," J. of the Korea Society of Digital Industry and Information Management, vol. 6, no. 3, Sept. 2010, pp. 49-57.
|
2 |
J. Jang, D. Mim, and C. Jhoi, "Study on Hybird Type Cloud System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, June 2016, pp. 611-618.
DOI
|
3 |
S. Park and N. Kim, "A Verification Csae Study about the Authentication of a Network using AAA," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, Apr. 2017, pp. 295-300.
DOI
|
4 |
J. Song, B. Kim, and H. Kim, "A Design of A Modbus Application Protocol for Multiple SCU Connections," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 4, Apr. 2018, pp. 642-649.
DOI
|
5 |
H. Choi and Y. Cho, "Analysis of Security Threats from Increased Usage of Mobile App Services," J. of the Korea Society of Digital Industry and Information Management, vol. 14, no. 1, Mar. 2018, pp. 45-55.
DOI
|
6 |
I. Kim, H. Lim, D. Ji, and J. Park, "A Efficient Network Security Management Model in Industrial Control System Environments," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 4, Apr. 2018, pp. 664-673.
DOI
|
7 |
B. Cha, S. Park, and J. Kim, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 8, Aug. 2015, pp.891-900.
DOI
|
8 |
Y. Shin, S. Han, I. Jae, and J. Lee, "A Study on the Linkage between Intelligent Security Techno.logy based on Spatial Information and other Technologies for Demonstration of Convergence Technology," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 1, Jan. 2018, pp. 622-632.
DOI
|
9 |
K. Kim, D. Wang, and S. Ban, "Home Security System Based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 1, Feb. 2017, pp. 147-154.
DOI
|
10 |
Y. Hee, Y. Seo, and W. Kim, "Hardware Implementation for High-Speed Generation of Computer Generated Hologram," J. of the Korea Society of Digital Industry and Information Management, vol. 9, no. 1, Mar. 2013, pp. 129-139.
|
11 |
J. Lee and J. Lee, "Efficient Hierarchical Mobility Management Scheme for Mobile Content Centric Networking," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 2, Feb. 2018, pp. 37-41.
DOI
|
12 |
S. Jung, D. Kum, and S. Choi, "Channel Grade Method of multi-mode mobile device for avoiding Interference at WPAN," J. of the Korea Society of Digital Industry and Information Management, vol. 11, no. 3, Sept. 2015, pp. 91-98.
DOI
|