1 | Á¦¸ñ(Title) | Recent Trends on Smart City Security: A Comprehensive Overview | |
---|---|---|---|
ÀúÀÚ(Author) | Hyuk-Jun Kwon Mikail Mohammed Salim Jong Hyuk Park | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 19 NO. 01 PP. 0118 ~ 0129 2023. 02 | ||
2 | Á¦¸ñ(Title) | A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment | |
ÀúÀÚ(Author) | Khaled H. Abuhmaidan Ahmad K. Kayed Maryam Alrisia Reetu Gupta Priyesh Kanungo Nirmal Dagdee | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 17 NO. 01 PP. 0145 ~ 0164 2023. 01 | ||
3 | Á¦¸ñ(Title) | IIoTBC: A Lightweight Block Cipher for Industrial IoT Security | |
ÀúÀÚ(Author) | Juanli Kuang Ying Guo Lang Li | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 17 NO. 01 PP. 0097 ~ 0119 2023. 01 | ||
4 | Á¦¸ñ(Title) | Identity-Based Key Management Scheme for Smart Grid over Lattice | |
ÀúÀÚ(Author) | Wangke Yu Shuhua Wang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 17 NO. 01 PP. 0074 ~ 0096 2023. 01 | ||
5 | Á¦¸ñ(Title) | GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks | |
ÀúÀÚ(Author) | Hongyu Pan Yong Fang Cheng Huang Wenbo Guo Xuelin Wan | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 12 PP. 4008 ~ 4023 2022. 12 | ||
6 | Á¦¸ñ(Title) | Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System | |
ÀúÀÚ(Author) | Fareena N Yogesh C Selvakumar K Sai Ramesh L Jun Wu Ze Chen Jianrong Bao Jipeng Gan Zehao Chen Jia Zhang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 11 PP. 3738 ~ 3760 2022. 11 | ||
7 | Á¦¸ñ(Title) | The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic | |
ÀúÀÚ(Author) | Hasan Beyari Mohammed Hejazi Othman Alrusaini | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 10 PP. 3313 ~ 3332 2022. 10 | ||
8 | Á¦¸ñ(Title) | Analysis of Security Vulnerabilities for IoT Devices | |
ÀúÀÚ(Author) | Hee-Hyun Kim Jinho Yoo | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 18 NO. 04 PP. 0489 ~ 0499 2022. 08 | ||
9 | Á¦¸ñ(Title) | Analysis of Security Vulnerabilities for IoT Devices | |
ÀúÀÚ(Author) | Hee-Hyun Kim Jinho Yoo | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 18 NO. 04 PP. 0489 ~ 0499 2022. 08 | ||
10 | Á¦¸ñ(Title) | SHOMY: Detection of Small Hazardous Objects using the You Only Look Once Algorithm | |
ÀúÀÚ(Author) | Eunchan Kim Jinyoung Lee Hyunjik Jo Kwangtek Na Eunsook Moon Gahgene Gweon Byungjoon Yoo Yeunwoong Kyung | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 8 PP. 2688 ~ 2703 2022. 8 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.