Book
사이버 공격과 보안 기술
by
IMTL
posted
Dec 08, 2017
?
단축키
Prev
이전 문서
Next
다음 문서
ESC
닫기
가
크게
작게
위로
아래로
댓글로 가기
인쇄
Extra Form
제목 : 사이버 공격과 보안 기술
저자 :
정태명 외
출판사 :
홍릉과학출판사
출간일 :
2009년 01월 15일 출간
위로
아래로
댓글로 가기
인쇄
목록
열기
닫기
Articles
A Study on decrase of transaction overheads in DNSSEC using PreProcessor
2017.12.09 22:17
Policy Based Handoff in MIPv6 Networks (SCIE)
2017.12.09 22:25
New Binding Update Method sing GDMHA in Hierarchical Mobile IPv6 (SCIE)
2017.12.09 22:31
A Model and Evaluation of Route Optimization in Nested NEMO Environment (SCI)
2017.12.09 22:51
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using ...
2017.12.09 22:54
An Analysis and Evaluation of Policy-based Network Management Approaches (SCIE)
2017.12.09 22:55
Distributing Multiple Home Agents in MIPv6 Networks (SCIE)
2017.12.09 22:56
Correlation Analysis System using VA data, IDS alerts (SCIE)
2017.12.09 22:57
A Study for Security and Efficient Broadcasting of Sensor Network
2017.12.09 22:59
An Architecture Design of Distributed Internet Worm Detection System for Fast Res...
2017.12.09 22:59
A Study on Mobile IPv4 Authentication Mechanisms
2017.12.09 23:00
A study about weight grant of Authentication level in USN environment
2017.12.09 23:01
A Study on Cooperation between Kerberos system and Credit-Control Server
2017.12.09 23:01
Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Orien...
2017.12.09 23:02
An Empirical Study of Quality and Cost Based Security Engineering (SCIE)
2017.12.09 23:06
Enhanced SCORM Sequencing Rulefor e-Learning System (SCIE)
2017.12.09 23:07
A Study on Agent-based Integrated Security Management System for Managing Heterog...
2017.12.09 23:08
Qualitative Method-based The Effective Risk Mitigation Method in The Risk Managem...
2017.12.09 23:09
Comparative Analysis of IPv6 VPN Transition in NEMO Environments (SCIE)
2017.12.09 23:12
An Analysis of Policy Provisioning Complexity in Accordance with the Application ...
2017.12.09 23:13
5
6
7
8
9
10
11
12
13
14
X