print this page
  1. ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a Machine Learning Approach

    Category국제
    Read More
  2. Qualitative Method-based The Effective Risk Mitigation Method in The Risk Management (SCIE)

    Category국제
    Read More
  3. Risk Assessment Method based on Business Process-Oriented Asset Evaluation for Information System Security

    Category국제
    Read More
  4. Secure Active Node for Security Management

    Category국제
    Read More
  5. Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain (SCIE)

    Category국제
    Read More
  6. Security Analysis of Extensible Authentication Protocol Methods based on AAA Architecture

    Category국제
    Read More
  7. Security Management by Zone Cooperation in Active Network Environment

    Category국제
    Read More
  8. Service Negotiation Model for Response Time in Distributed networks

    Category국제
    Read More
  9. Session Key Forwarding Scheme based on AAA Architecture in Wireless Networks (SCIE)

    Category국제
    Read More
  10. Shall we apply paging technologies to Proxy Mobile IPv6?

    Category국제
    Read More
  11. SNMP-based Integrated Wire/wireless Device Management System

    Category국제
    Read More
  12. Specifying Policies for Service Negotiation of Response Time (SCIE)

    Category국제
    Read More
  13. Study on the Policy Management in PB-ISMS

    Category국제
    Read More
  14. SVAM: the Scalable Vulnerability Analysis Model based on Active Networks (SCIE)

    Category국제
    Read More
  15. The Concentric Clustering for Efficient Energy Consumption in PEGASIS

    Category국제
    Read More
  16. The Concentric-Cluster Routing Scheme adapted to Large-Scale Sensor Networks

    Category국제
    Read More
  17. The Design of XML-based Internet Security Integrated System Architecture (SCIE)

    Category국제
    Read More
  18. The Dynamic Buffer Overflow Detection and Prevention Tool for Windows Executables Using Binary Rewriting

    Category국제
    Read More
  19. The effective group key agreement protocol for ad-hoc networks for medical emergency environments

    Category국제
    Read More
  20. The Firewall Selection Algorithm for Integrated Security Management

    Category국제
    Read More
Board Pagination Prev 1 2 3 4 5 6 7 Next
/ 7

로그인

로그인폼

로그인 유지