91 | Á¦¸ñ(Title) | Two-Phase Security Protection for the Internet of Things Object | |
---|---|---|---|
ÀúÀÚ(Author) | Vera Suryani Selo Sulistyo Widyawan Widyawan | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 06 PP. 1431 ~ 1437 2018. 12 | ||
92 | Á¦¸ñ(Title) | A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions | |
ÀúÀÚ(Author) | Nam Yong Kim Shailendra Rathore Jung Hyun Ryu Jin Ho Park Jong Hyuk Park | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 06 PP. 1361 ~ 1384 2018. 12 | ||
93 | Á¦¸ñ(Title) | Agent Based Information Security Framework for Hybrid Cloud Computing | |
ÀúÀÚ(Author) | Muhammad Imran Tariq | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 01 PP. 0406 ~ 0434 2019. 01 | ||
94 | Á¦¸ñ(Title) | CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI | |
ÀúÀÚ(Author) | XU Yunjia HUANG Kaizhi HU Xin ZOU Yi CHEN Yajun JIANG Wenyu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 01 PP. 0110 ~ 0132 2019. 01 | ||
95 | Á¦¸ñ(Title) | Analysis of Web Browser Security Configuration Options | |
ÀúÀÚ(Author) | Ananth A. Jillepalli Daniel Conte de Leon Stuart Steiner Jim Alves-Foss | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 12 PP. 6139 ~ 6160 2018. 12 | ||
96 | Á¦¸ñ(Title) | Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing | |
ÀúÀÚ(Author) | Te-Yuan Lin Chiou-Shann Fuh | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 12 PP. 5654 ~ 5668 2018. 12 | ||
97 | Á¦¸ñ(Title) | A Multi-level Perception Security Model Using Virtualization | |
ÀúÀÚ(Author) | Rui Lou Liehui Jiang Rui Chang Yisen Wang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 11 PP. 5588 ~ 5613 2018. 11 | ||
98 | Á¦¸ñ(Title) | Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks | |
ÀúÀÚ(Author) | |||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 10 PP. 5159 ~ 5178 2018. 10 | ||
99 | Á¦¸ñ(Title) | Advanced approach to information security management system utilizing maturity models in critical infrastructure | |
ÀúÀÚ(Author) | |||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 10 PP. 4995 ~ 5014 2018. 10 | ||
100 | Á¦¸ñ(Title) | Three-Dimensional Optical Encryption of Quick Response Code | |
ÀúÀÚ(Author) | Youngjun Kim Hui Yun Myungjin Cho | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 03 PP. 0153 ~ 0159 2018. 09 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.