Subject

Subjects : security system

  • Articles (57)
  • Patents (2)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2022 MFA-net: Object detection for complex X-ray cargo and baggage security imagery   Thanaporn Viriyasaranon  PLOS ONE, v.17, no.9, pp.1-20 12 원문
Conference 2022 ArtBrain-K: AI Processor based-on 5-PetaFLOPS AI Server System   Han Jin Ho  International Conference on Artificial Intelligence Circuits and Systems (AICAS) 2022, pp.1-3 1 원문
Conference 2021 Anomaly Detection based on User Feedback Learning using Multi-layered Surveillance Map   Shin Hochul  International Conference on Control, Automation and Systems (ICCAS) 2021, pp.1-2
Conference 2021 Abnormal Situation Detection using Global Surveillance Map   Shin Hochul  International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-4 1 원문
Conference 2021 Network Failover in Multiple WAN Environment for Reliable Sensor Network   Lee Hoo Sung  International Conference on Advanced Engineering and ICT-Convergence (ICAEIC) 2021, v.4, no.2, pp.272-274
Conference 2020 Anomaly Detection Algorithm Based on Global Object Map for Video Surveillance System   Shin Hochul  International Conference on Control, Automation and Systems (ICCAS) 2020, pp.1-3 3 원문
Journal 2020 User Recognition Based on Human Body Impulse Response: A Feasibility Study   정진호  IEEE Access, v.8, pp.6627-6637 4 원문
Journal 2019 Trends of Intelligent Public Safety Service Technologies   Bang Junseong  전자통신동향분석, v.34, no.1, pp.111-122 원문
Conference 2018 AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps   Lee Sung-Hoon  International Symposium on Software Reliability Engineering Workshops (ISSREW) 2018, pp.36-41 2 원문
Conference 2017 Embedded Face Identification System for a Smart Home   Yoo Jang-Hee  International Conference on Internet (ICONI) 2017 : Symposium, pp.1-2
Conference 2017 Side Channel Attack on Digital Door Lock with Vibration Signal Analysis: Longer Password does not Guarantee Higher Security Level   Youngmok Ha  International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI) 2017, pp.103-110 5 원문
Conference 2017 Building a Big Data Platform for Large-scale Security Data Analysis   Jong-Hoon Lee  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 5 원문
Journal 2017 Face Recognition Performance Comparison between Fake Faces and Live Faces   Cho Mi Young  Soft Computing, v.21, no.12, pp.3429-3437 18 원문
Journal 2016 RTNSS: A Routing Trace-based Network Security System for Preventing ARP Spoofing Attacks   Moon Dae Sung  Journal of Supercomputing, v.72, no.5, pp.1740-1756 9 원문
Journal 2016 Single Authentication Through in Convergence Space Using Collaborative Smart Cameras   Kim Geonwoo  Security and Communication Networks, v.9, no.6, pp.561-570 0 원문
Conference 2015 Transmitted File Extraction and Reconstruction from Network Packets   Choi Yangseo  World Congress on Internet Security (WorldCIS) 2015, pp.164-165 2 원문
Conference 2015 Smart Agricultural Framework over RCAS in CATV Network   Han Seung Koo  International Conference on Advanced Communication Technology (ICACT) 2015, pp.209-212 0 원문
Conference 2015 Design Challenges and Implementation of a Shipborne Gateway for Safe and Secure Navigational Networks   Lee Kwangil  International Conference on Future Information Technology (FutureTech) 2015 (LNEE 354), v.354, pp.129-135 0 원문
Journal 2015 Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments   오두환  ETRI Journal, v.37, no.2, pp.348-358 13 원문
Conference 2014 Secure Virtualised Environment   Pushpinder Kaur Chouhan  International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 0 원문
Conference 2014 Face Recognition Performance Comparison of Fake Faces with Real Faces in Relation to Lighting   Cho Mi Young  International Workshop on Managing Insider Security Threats (MIST) 2014, pp.1-9 0
Conference 2014 Implementation of a Video Streaming Security System for Smart Device   Jeon Yong-Sung  International Conference on Consumer Electronics (ICCE) 2014, pp.97-100 5 원문
Conference 2013 A Study on Implementation of Active Localization System Using a Microphone Array and a Loudspeaker in a Small Room   김기현  International Congress and Exposition on Noise Control Engineering (Inter-Noise) 2013, pp.1-6
Conference 2013 SCADA Network Security System Using NSM Data Objects   Youngjun Heo  International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.1145-1147
Journal 2012 Multicore Flow Processor with Wire-Speed Flow Admission Control   Doo Kyeong Hwan  ETRI Journal, v.34, no.6, pp.827-837 5 원문
Conference 2012 Active Localization of a Silent Intruder with Audible Frequency in 2D Security Space   김기현  International Congress and Exposition on Noise Control Engineering (Inter-Noise) 2012, pp.1-8
Conference 2012 Active Localization of a Silent Intruder using Acoustic Imaging in Anechoic Space   김기현  Internaltional Congress on Sound and Vibration (ICSV) 2012, pp.1-8
Journal 2012 A Rule Based Event Correlation Approach for Physical and Logical Security Convergence   Dong Ho Kang  International Journal of Computer Science and Network Security, v.12, no.1, pp.28-31
Journal 2012 System Architecture for Physical/IT Security Event Integration   Seon-Gyoung Sohn  International Journal of Computer Science and Network Security, v.12, no.1, pp.66-70
Conference 2010 A Modified Multi-Resolution Approach for Port Scan Detection   Moon Jiwoo  Global Telecommunications Conference (GLOBECOM) 2010, pp.1-5 3 원문
Conference 2010 Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File   Kim Dae Won  International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 1 원문
Conference 2010 An Efficient Anti-DDoS Mechanism using Flow-based Forwarding Technology   Namseok Ko  International Conference on Optical Internet (COIN) 2010, pp.1-3 4 원문
Conference 2009 Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique   Kim Dae Won  International Conference on Communications (ICC) 2009, pp.1-6 0 원문
Conference 2009 Identity Data Security System for the Digital Identity Wallet   Choi Dae Seon  International Conference on Advanced Communication Technology (ICACT) 2009, pp.1678-1681
Conference 2008 A Survey on Visualization for Wireless Security   Jeong Chi Yoon  International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.129-132 5 원문
Journal 2008 Tracing Stored Program Counter to Detect Polymorphic Shellcode   Kim Dae Won  IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 3 원문
Conference 2008 Development of PP for Security System on MID   Jeong Youn Seo  International Conference on Electronics, Informations and Communications (ICEIC) 2008, pp.911-914
Conference 2008 Intelligent Security for Inter-space Surveillance Applications   Kim Geonwoo  International Conference on Multimedia and Ubiquitous Engineering (MUE) 2008, pp.419-422 1 원문
Conference 2008 Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals   Jeong Youn Seo  International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 2 원문
Conference 2007 Integrating Evidences of Independently Developed Face and Speaker Recognition Systems by Using Discrete Probability Density Function   Lee Jae Yeon  International Symposium on Robot and Human Interactive Communication (RO-MAN) 2007, pp.667-672 1 원문
Journal 2007 A Non-Cooperative User Authentication System in Robot Environments   Kim Do-Hyung  IEEE Transactions on Consumer Electronics, v.53, no.2, pp.804-811 34 원문
Conference 2006 High-Performance Stateful Intrusion Detection System   Yoon Seung Yong  International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 4 원문
Conference 2006 Packet Filter Algorithm to Prevent the Security Hole of Routing Header in IPv6   Lim Jae Deok  SICE-ICASE International Joint Conference 2006, pp.3924-3927 1 원문
Conference 2006 Face Identification for Human Robot Interaction: Intelligent Security System for Multi-user Working Environment on PC   Kim Do-Hyung  International Symposium on Robot and Human Interactive Communication (ROMAN) 2006, pp.617-622 3 원문
Conference 2006 Hardware Supports for Network Traffic Anomaly Detection   Kim Dae Won  International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5
Conference 2006 Protection Algorithm Against Security Holes of IPv6 Routing Header   Lim Jae Deok  International Conference on Advanced Communication Technology (ICACT) 2006, pp.2004-2007 2
Conference 2006 Implementation of 10 Giga VPN Accelerator Board   Kim Ki Hyun  International Conference on Advanced Communication Technology (ICACT) 2006, pp.1552-1556 0
Conference 2006 A Developing of Signature-based Network Security Tester for NGSS   Jeong Youn Seo  International Conference on Advanced Communication Technology (ICACT) 2006, pp.1543-1546 0
Conference 2005 Design and Implementation of Crypto Co-processor and Its Application to Security Systems   Kim Ho Won  International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.1104-1109 1 원문
Conference 2005 An Analysis of ISPs’ role as Managed Security Service Providers (MSSPs)   Choi Yangseo  International Conference on Advanced Communication Technology (ICACT) 2005, pp.624-626
Conference 2004 The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network   Park So Hee  International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 0 원문
Journal 2004 Design and implementation of a private and public key crypto processor and its application to a security system   Kim Ho Won  IEEE Transactions on Consumer Electronics, v.50, no.1, pp.214-224 50 원문
Conference 2003 Design of Secure Monitor In the Secure Zone Cooperation   안계순  International Conference on Computational Science and Its Applications (ICCSA) 2003 (LNCS 2668), v.2668, pp.320-327 0 원문
Conference 2002 Design and Implementation of a Crypto Processor and Its Application to Security System   Kim Ho Won  International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.315-318
Conference 2002 Information Model for Policy-Based Network Security Management   Kim Sook Yeon  International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 3 원문
Conference 2002 Security Policy Deployment in IPsec   Kim Geonwoo  International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.453-464 0 원문
Conference 2001 Design of key recovery system using multiple agent technology for electronic commerce   Lim Shin Young  International Symposium on Industrial Electronics (ISIE) 2001, pp.1351-1356 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2010 SECURITY SYSTEM AND METHOD USING MEASUREMENT OF SOUND FIELD VARIATION UNITED STATES
Registered 2012 SECURITY SYSTEM BASED ON SOUND FIELD VARIATION PATTERN ANALYSIS AND THE METHOD UNITED STATES
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.