ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Search Results

Showing 30711-30720 of 42,167.

Display
논문 검색결과
Type Year Title Cited Download
Conference
2008 Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System   Seung Yong Yoon   International Conference on Applied Computer Science (ACS) 2008, pp.1-6
Conference
2008 Ranging Supporting MAC with GTS based on IEEE 802.15.4a   Cheol Hyo Lee   International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-4
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference
2008 A Study on Target Market Selection for Mobile WiMAX Deployment   Jeong Tae Kim   International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-5
Conference
2008 Forensic Index Search of Large Scale Digital Evidences   Su Hyung Jo   International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-4
Conference
2008 The Service-Oriented SLA Management System Development in the VPN Service   Hyun-Chul Kang   International Conference on Computer Applications in Industry and Engineering (CAINE)2008, pp.1-5
Conference
2008 An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware   Byoung Koo Kim   International Conference on Applied Computer Science (ACS) 2008, pp.199-204
Conference
2008 Wireless Body Area Network in a Ubiquitous Healthcare System for Physiological Signal Monitoring and Health Consulting   Joon Young Jung   International Conference on Future Generation Communication and Networking (FGCN) 2008, pp.1-8
Conference
2008 Recognition of Voice and Hand Activities Through Fusion of Acceleration and Speech   Young-Giu Jung   International Conference on Semantic and Digital Media Technologies (SAMT) 2008, pp.67-74
Journal
2009 Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection   Byoung Koo Kim   International Journal of Computers, v.3, no.1, pp.115-124