1 |
Y. Lee, "A Design and Analysis of Multiple Intrusion Detection Model," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 619-626.
DOI
|
2 |
K. Kim, D. Wang, and S. Han, "Home Security System Based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 1, 2017, pp. 147-154.
DOI
|
3 |
K. Kim, Y. Park, S. Ro, and B. Kim, "Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method," J. of the Korea Institute of Electronic Communication Sciences, vol. 16 no. 9, 2012, pp. 1955-1962.
|
4 |
C. Choi, Y. Lee, and Tae. Lee, "Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 11, 2016, pp. 1017-1024.
DOI
|
5 |
S. Paik, S. Kim, and H. Park, "Design and Implementation of Network Access Control for Security of Company Network," J. of the Korea Institute of Electronic Communication Sciences, vol. 47, no. 12, 2010, pp. 90-96.
|
6 |
J. Yun, "A Study on the Short Term Curriculum for Strengthening Information Security Capability in Public Sector," Journal of the Korean Institute of Information Security and Cryptology, vol. 226 no. 3, 2016, pp. 769-776.
DOI
|
7 |
S. Park and N. Kim, "A Verification Case Study about the Authentication of a Network using AAA," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, 2017, pp. 295-300.
DOI
|
8 |
M. Yim, "Why Security Awareness Education is not Effective?," J. of digital convergence, vol. 12, no. 2, 2014, pp. 27-37.
DOI
|
9 |
J. Jang, C. Choi, and D. Kim, "Design of Smart Tourism in Big Data,"J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 637-644.
DOI
|
10 |
B. Cha, J. Kim, and S. Park, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 8, 2015, pp. 891-900.
DOI
|