Subjects :
confidential information
논문 검색결과
| Type |
Year |
Title |
Cited |
Download |
|
Journal
|
2020 |
Information leakage in bi‐directional IFD communication system with simultaneously transmitted jamming sequence
Ju Hyung Sik ETRI Journal, v.42, no.1, pp.138-149 |
0 |
원문
|
|
Conference
|
2017 |
Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android
Lee Sung-Hoon International Symposium on Software Reliability Engineering Workshops (ISSREW) 2017, pp.36-39 |
4 |
원문
|
|
Journal
|
2016 |
Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call
Kim Hyun Joo IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 |
6 |
원문
|
|
Conference
|
2014 |
Detection of Suspicious Behavior for Responding to Cyber Targeted Attack on Big Data
Kim Hyun Joo International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 |
|
|
|
Journal
|
2011 |
Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment
Abedelaziz Mohaisen KSII Transactions on Internet and Information Systems, v.5, no.9, pp.1684-1697 |
0 |
원문
|
|
Conference
|
2011 |
Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits
Kim Youngsoo International Conference on Computers, Networks, Systems, and Industrial Engineering (CNSI) 2011 (SCI 365), v.365, pp.201-208 |
13 |
원문
|
|
Conference
|
2009 |
Hardware Based Data Inspection for USB Data Leakage Prevention
Dong Ho Kang Communications in Computer and Information Science (CCIS) 2009, pp.57-63 |
1 |
원문
|
|
Conference
|
2009 |
USB Data Leakage Prevention Using Hardware based Data Inspection Technique
Dong Ho Kang International Conference on Security and Management (SAM) 2009, pp.1-5 |
|
|
연구보고서 검색결과
| Type |
Year |
Research Project |
Primary Investigator |
Download |
|
No search results. |