11 | Á¦¸ñ(Title) | Improved Piracy Site Detection Technique using Search Engine | |
---|---|---|---|
ÀúÀÚ(Author) | Annas W. Malik Adnan Abid Shoaib Farooq Irfan Abid Naeem A. Nawaz Kashif Ishaq Eui-Jin Kim Deuk-Hun Kim Jin Kwak | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 07 PP. 2459 ~ 2472 2022. 07 | ||
12 | Á¦¸ñ(Title) | Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting | |
ÀúÀÚ(Author) | Hui Li Yaping Chen Borong Zou | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 06 PP. 2094 ~ 2114 2022. 06 | ||
13 | Á¦¸ñ(Title) | An Improved Pseudorandom Sequence Generator and its Application to Image Encryption | |
ÀúÀÚ(Author) | Keshav Sinha Partha Paul Amritanjali | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 03 PP. 1307 ~ 1329 2022. 03 | ||
14 | Á¦¸ñ(Title) | Two Stage Deep Learning Based Stacked Ensemble Model for Web Application Security | |
ÀúÀÚ(Author) | Waheeb Ahmed Di Wu Daniel Mukathie Mehmet Sevri Hacer Karacan | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 02 PP. 0632 ~ 0657 2022. 02 | ||
15 | Á¦¸ñ(Title) | A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data | |
ÀúÀÚ(Author) | Weiwei Lin Chaofan Yang Zeqing Zhang Xingsi Xue Reiko Haga | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 12 PP. 4531 ~ 4544 2021. 12 | ||
16 | Á¦¸ñ(Title) | Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19 | |
ÀúÀÚ(Author) | Manyong Choi Jin Kwak | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 11 PP. 4163 ~ 4183 2021. 11 | ||
17 | Á¦¸ñ(Title) | Privacy Analysis and Comparison of Pandemic Contact Tracing Apps | |
ÀúÀÚ(Author) | Yanji Piao Dongyue Cui | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 11 PP. 4145 ~ 4162 2021. 11 | ||
18 | Á¦¸ñ(Title) | An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm | |
ÀúÀÚ(Author) | N. P. Ponnuviji M. Vigilson Prem | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 11 PP. 4011 ~ 4027 2021. 11 | ||
19 | Á¦¸ñ(Title) | Assessment of Dynamic Open-source Cross-site Scripting Filters for Web Application | |
ÀúÀÚ(Author) | Nurul Atiqah Abu Talib Kyung-Goo Doh | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 10 PP. 3750 ~ 3770 2021. 10 | ||
20 | Á¦¸ñ(Title) | A Decision Making Model Proposal for Firewall Selection | |
ÀúÀÚ(Author) | HeeJeong Jasmine Lee In Kim Cemal Aktürk Ceren Cubukcu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 10 PP. 3588 ~ 3607 2021. 10 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.