1 |
Shen Y, Feng J, Ma W J, Jiang L and Yin M., "Overlay multicast update strategy based on perturbation theory," KSII Transactions on Internet and Information Systems, vol. 11, no. 1, pp. 171-192, January, 2017./
|
|
2 |
S. F. Jianjun Li, Zhihui Wang, Haojie Li and Chin-Chen Chang, "An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification," KSII Transactions on Internet and Information Systems, vol. 11, pp. 288-301, January, 2017./
|
|
3 |
고장혁 외 6인, "Indicator-based Behavior Ontology for Detecting insider Threats in Network Systems," KSII Transactions on Internet and Information Systems, Vol. 11, No.10, 2017, pp.5062-5079./
|
|
4 |
Y. Hao, M. Xia, N. Wen, R. Hou, H. Deng, L. Wang, and Q. Wang, "Parallel Task Scheduling under Multi-Clouds," TIIS, Vol.11, No.1, pp.39-60, 2017./
|
|
5 |
X. Liu, Y. Li, J. Qu and Y. Ding, "A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS", KSII Transactions on Internet and Information Systems, Vol. 11, no. 2, pp. 924-944, 2017. https://doi.org/10.3837/tiis.2017.02.016/
|
|
6 |
X. Liu, Y. Li, J. Qu and Y. Ding, "A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS", KSII Transactions on Internet and Information Systems, Vol.11, no.2, pp. 924-944, 2017./
|
|
7 |
J. G. Lee, J. Kim, S. W .Lee, and Y. W. Ko, "A location tracking system using BLE beacon exploiting a double gaussian filter," KSII Transactions on Internet and Information Systems, Vol. 11, No. 02, pp. 1162-1179, Feb. 2017./
|
|