Search > Reference Search
Search Result
학술지
No Reference Title /Author/Journal Title Citing Article
1 D.-H. Bae, H.-S. Lee, and J.-W. Lee, "Low latency uplink transmission," in Proc. Int. Conf. Electron. Inform. Commun (ICEIC), 2017./ View Article
2 Information technology - Interconnection of information technology equipment - Home Electronic System - Application models - Part 3-3: Model of a system of interacting Energy Management Agents (EMAs) for demand response energy management, ISO/IEC 15067-3-3: CD N1857, 2017/ View Article
3 H. S. Jung and D. K. No, "A study on demand management method for home through a power profile analysis," in Proc. KICS Winter Conf., pp. 459-460, 2017./ View Article
4 Jonghoon Oh, Minho Park, "Linked Implementation of Legacy Network Using Mininet and ONOS Controller," KICS int. Conf. Commun, pp.435-436, Jan, 2017./ View Article
5 H. Lim, W. Kim, H. Noh, and J. Lim, "Research on malware classification with network activity for classification and attack prediction of attack group," J. KICS, vol. 42, no. 1, pp. 193-204, Jan. 2017/   DOI View Article
6 S. Y. Kim, Fake official paper to remote control ... voice phishing becomes increasingly tricky, Yonhapnews, 1st, Apr. 2017./ View Article
7 S. Moon, M. Kim, and T. Kwon, "Trends on lightweight encryption for IoT communication environments," J. KICS, vol. 33, no. 3, pp. 80-86, Feb. 2016./ View Article
8 S. He, S. Member, S. G. Chan, and S. Member, "Wi-Fi fingerprint-based indoor positioning : Recent advances and comparisons," IEEE Commun. Surveys & Tuts., vol. 18, no. 1, pp. 466-490, 2016./   DOI View Article
9 M. Lim and N. Kim, "Investigating dynamic mutation process of issues using unstructured text analysis," J. Intell. Inf. Syst., vol. 22, no. 1, pp. 1-18, Mar. 2016./   DOI View Article
10 P. Xanthopoulos, O. P. Panagopoulos, G. A. Bakamitsos, and E. Freudmann, "Hashtag hijacking: What it is, why it happens and how to avoid it," J. Digital & Social Media Marketing, vol. 3, no. 4, pp. 353-362, Feb. 2016./ View Article