Search > Reference Search
Search Result
학술지
No Reference Title /Author/Journal Title Citing Article
1 Shen Y, Feng J, Ma W J, Jiang L and Yin M., "Overlay multicast update strategy based on perturbation theory," KSII Transactions on Internet and Information Systems, vol. 11, no. 1, pp. 171-192, January, 2017./   DOI View Article
2 S. F. Jianjun Li, Zhihui Wang, Haojie Li and Chin-Chen Chang, "An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification," KSII Transactions on Internet and Information Systems, vol. 11, pp. 288-301, January, 2017./ View Article
3 고장혁 외 6인, "Indicator-based Behavior Ontology for Detecting insider Threats in Network Systems," KSII Transactions on Internet and Information Systems, Vol. 11, No.10, 2017, pp.5062-5079./ View Article
4 Y. Hao, M. Xia, N. Wen, R. Hou, H. Deng, L. Wang, and Q. Wang, "Parallel Task Scheduling under Multi-Clouds," TIIS, Vol.11, No.1, pp.39-60, 2017./ View Article
5 X. Liu, Y. Li, J. Qu and Y. Ding, "A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS", KSII Transactions on Internet and Information Systems, Vol. 11, no. 2, pp. 924-944, 2017. https://doi.org/10.3837/tiis.2017.02.016/   DOI View Article
6 X. Liu, Y. Li, J. Qu and Y. Ding, "A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS", KSII Transactions on Internet and Information Systems, Vol.11, no.2, pp. 924-944, 2017./   DOI View Article
7 J. G. Lee, J. Kim, S. W .Lee, and Y. W. Ko, "A location tracking system using BLE beacon exploiting a double gaussian filter," KSII Transactions on Internet and Information Systems, Vol. 11, No. 02, pp. 1162-1179, Feb. 2017./ View Article
  • [ 1 ]
  •