Journal
|
2024 |
Overview of RIS-enabled secure transmission in 6G wireless networks
Jungsook Bae Digital Communications and Networks, v.10, no.6, pp.1553-1565 |
14 |
원문
|
Journal
|
2024 |
Overview of RIS-enabled secure transmission in 6G wireless networks
Waqas Khalid Digital Communications and Networks, v.10, no.6, pp.1553-1565 |
14 |
원문
|
Journal
|
2023 |
Design of Block Codes for Distributed Learning in VR/AR Transmission
황서희 Journal of Information and Communication Convergence Engineering, v.21, no.4, pp.300-305 |
0 |
원문
|
Journal
|
2023 |
Reconfigurable dual-mode optical encryption enabled by block copolymer photonic crystal with micro-imprinted holographic metasurface
문승수 Materials Today, v.70, pp.44-56 |
8 |
원문
|
Journal
|
2023 |
Reconfigurable dual-mode optical encryption enabled by block copolymer photonic crystal with micro-imprinted holographic metasurface
박태현 Materials Today, v.70, pp.44-56 |
8 |
원문
|
Journal
|
2022 |
Technological Trends in Intelligent Cyber Range
Yu Jae Hak 전자통신동향분석, v.37, no.4, pp.36-45 |
|
원문
|
Journal
|
2020 |
Information leakage in bi‐directional IFD communication system with simultaneously transmitted jamming sequence
Ju Hyung Sik ETRI Journal, v.42, no.1, pp.138-149 |
0 |
원문
|
Conference
|
2019 |
Character Detection and Recognition for Personal Information Security in Real-World Document Image
Kye Kyung Kim International Workshop on Frontiers of Computer Vision (IW-FCV) 2019, pp.1-2 |
|
|
Conference
|
2017 |
Design of Unidirectional Security Gateway System for Secure Monitoring of OPC-UA Data
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1288-1290 |
6 |
원문
|
Conference
|
2017 |
Hierarchy Architecture Security Design for Energy Cloud
Hong Yoon Kee International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1188-1190 |
1 |
원문
|
Journal
|
2017 |
DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks
Moon Dae Sung Journal of Supercomputing, v.73, no.7, pp.2881-2895 |
119 |
원문
|
Conference
|
2015 |
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Jung Yeon Hwang International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 |
4 |
원문
|
Journal
|
2015 |
Information Security and Organizational Performance: Empirical Study of Korean Securities Industry
공희경 ETRI Journal, v.37, no.2, pp.428-437 |
11 |
원문
|
Journal
|
2012 |
The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack
Kim Sun Wook IETE Journal of Research, v.58, no.5, pp.398-410 |
0 |
원문
|
Journal
|
2011 |
전자파 보안 국제 표준화 동향 연구
Jang Dong Won 주간기술동향, v.1526, pp.13-24 |
|
|
Conference
|
2010 |
Network Intrusion Prevention System based on TOE
Kim Sun Wook International Workshop on Information Security Applications (WISA) 2010, pp.1-6 |
|
|
Journal
|
2010 |
Fuzzy difference-of-Gaussian–based iris recognition method for noisy iris images
Byung Jun Kang Optical Engineering, v.49, no.6, pp.1-10 |
9 |
원문
|
Journal
|
2010 |
An Analysis on Effects of Information Security Investments: A BSC Perspective
Kong Hee Kyung Journal of Intelligent Manufacturing, v.23, no.4, pp.941-953 |
32 |
원문
|
Journal
|
2009 |
PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems
이종혁 ETRI Journal, v.31, no.5, pp.554-564 |
10 |
원문
|
Journal
|
2009 |
Probabilistic Modeling for Evaluation of Information Security Investment Portfolios
Yang Won Seok 한국경영과학회지, v.34, no.3, pp.155-163 |
|
|
Journal
|
2008 |
A Novel Difference Expansion Transform for Reversible Data Embedding
김형중 IEEE Transactions on Information Forensics and Security, v.3, no.3, pp.456-465 |
346 |
원문
|
Other
|
2008 |
Handbook of Research on Information Security and Assurance
An Gaeil Handbook of Research on Information Security and Assurance [Book], pp.29-41 |
0 |
원문
|
Conference
|
2008 |
Malware and Antivirus Deployment for Enterprise Security
Lee Deok Gyu 한국정보기술학회 학술 발표회 (하계) 2008, pp.1-4 |
|
|
Journal
|
2008 |
A Dynamic Manpower Forecasting Model for the Information Security Industry
박상현 Industrial Management & Data Systems, v.103, no.3, pp.368-384 |
25 |
원문
|
Conference
|
2006 |
Efficient Exponentiation in GF(p m ) Using the Frobenius Map
이문규 International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.584-593 |
0 |
원문
|
Conference
|
2006 |
Building a Dynamic Manpower Planning Model: Focused on the Information Security Manpower Policy of Korea
박상현 International Conference of the System Dynamics Society 2006, pp.1-21 |
|
|
Conference
|
2006 |
Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems
Park Nam Je International Symposium on Consumer Electronics (ISCE) 2006, pp.666-671 |
8 |
|
Conference
|
2005 |
Security Frameworks for Open LBS Based on Web Services Security Mechanism
Moon Ki Young International Symposium on Parallel and Distributed Processing and Applications (ISPA) 2005 (LNCS 3759), v.3759, pp.609-618 |
2 |
원문
|
Conference
|
2005 |
Security and Privacy Management for Effective RFID Lifecycle
Lee Byung-Gil 한국경영정보학회 (KMIS) 학술 대회 2005, pp.1-5 |
|
|
Conference
|
2005 |
An Enhanced LBS Security Protocol in Wireless Networks
Park Nam Je International Geoscience and Remote Sensing Symposium (IGARSS) 2005, pp.1594-1597 |
|
|
Conference
|
2005 |
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services
Park Nam Je International Conference on Computational Science and Its Applications (ICCSA) 2005 (LNCS 3481), v.3481, pp.1146-1155 |
24 |
원문
|
Conference
|
2005 |
An Analysis of ISPs’ role as Managed Security Service Providers (MSSPs)
Choi Yangseo International Conference on Advanced Communication Technology (ICACT) 2005, pp.624-626 |
|
|
Conference
|
2004 |
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network
Park So Hee International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 |
0 |
원문
|
Conference
|
2002 |
Security Policy Deployment in IPsec
Kim Geonwoo International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.453-464 |
0 |
원문
|
Conference
|
2001 |
Design of key recovery system using multiple agent technology for electronic commerce
Lim Shin Young International Symposium on Industrial Electronics (ISIE) 2001, pp.1351-1356 |
|
원문
|