print this page
  1. No Image 27Feb
    by
    in 국제

    ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a Machine Learning Approach

  2. No Image 09Dec
    by
    in 국제

    Qualitative Method-based The Effective Risk Mitigation Method in The Risk Management (SCIE)

  3. No Image 11Dec
    by
    in 국제

    Risk Assessment Method based on Business Process-Oriented Asset Evaluation for Information System Security

  4. No Image 08Dec
    by
    in 국제

    Secure Active Node for Security Management

  5. No Image 09Dec
    by
    in 국제

    Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain (SCIE)

  6. No Image 09Dec
    by
    in 국제

    Security Analysis of Extensible Authentication Protocol Methods based on AAA Architecture

  7. No Image 08Dec
    by
    in 국제

    Security Management by Zone Cooperation in Active Network Environment

  8. No Image 09Dec
    by
    in 국제

    Service Negotiation Model for Response Time in Distributed networks

  9. No Image 09Dec
    by
    in 국제

    Session Key Forwarding Scheme based on AAA Architecture in Wireless Networks (SCIE)

  10. No Image 11Dec
    by
    in 국제

    Shall we apply paging technologies to Proxy Mobile IPv6?

  11. No Image 11Dec
    by
    in 국제

    SNMP-based Integrated Wire/wireless Device Management System

  12. No Image 09Dec
    by
    in 국제

    Specifying Policies for Service Negotiation of Response Time (SCIE)

  13. No Image 08Dec
    by
    in 국제

    Study on the Policy Management in PB-ISMS

  14. No Image 09Dec
    by
    in 국제

    SVAM: the Scalable Vulnerability Analysis Model based on Active Networks (SCIE)

  15. No Image 11Dec
    by
    in 국제

    The Concentric Clustering for Efficient Energy Consumption in PEGASIS

  16. No Image 11Dec
    by
    in 국제

    The Concentric-Cluster Routing Scheme adapted to Large-Scale Sensor Networks

  17. No Image 09Dec
    by
    in 국제

    The Design of XML-based Internet Security Integrated System Architecture (SCIE)

  18. No Image 11Dec
    by
    in 국제

    The Dynamic Buffer Overflow Detection and Prevention Tool for Windows Executables Using Binary Rewriting

  19. No Image 09Dec
    by
    in 국제

    The effective group key agreement protocol for ad-hoc networks for medical emergency environments

  20. No Image 09Dec
    by
    in 국제

    The Firewall Selection Algorithm for Integrated Security Management

Board Pagination Prev 1 2 3 4 5 6 7 Next
/ 7

로그인

로그인폼

로그인 유지