71 | Á¦¸ñ(Title) | Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms | |
---|---|---|---|
ÀúÀÚ(Author) | Asma Salem Ahmad Sharieh Azzam Sleit Riad Jabri | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 08 PP. 4076 ~ 4092 2019. 08 | ||
72 | Á¦¸ñ(Title) | GROUP SECRET KEY GENERATION FOR 5G Networks | |
ÀúÀÚ(Author) | Ali M. Allam | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 08 PP. 4041 ~ 4059 2019. 08 | ||
73 | Á¦¸ñ(Title) | DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique | |
ÀúÀÚ(Author) | Abhishek Majumdar Arpita Biswas Krishna Lal Baishnab Sandeep K. Sood | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 07 PP. 3794 ~ 3820 2019. 07 | ||
74 | Á¦¸ñ(Title) | A Cross-Platform Malware Variant Classification based on Image Representation | |
ÀúÀÚ(Author) | Hamad Naeem Bing Guo Farhan Ullah Muhammad Rashid Naeem | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 07 PP. 3756 ~ 3777 2019. 07 | ||
75 | Á¦¸ñ(Title) | A Group Key Management Scheme for WSN Based on Lagrange Interpolation Polynomial Characteristic | |
ÀúÀÚ(Author) | Xiaogang Wang Weiren Shi Dan Liu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 07 PP. 3690 ~ 3713 2019. 07 | ||
76 | Á¦¸ñ(Title) | Trust based Secure Reliable Route Discovery in Wireless Mesh Networks | |
ÀúÀÚ(Author) | Navmani T M Yogesh P | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 07 PP. 3386 ~ 3411 2019. 07 | ||
77 | Á¦¸ñ(Title) | An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks | |
ÀúÀÚ(Author) | Xiaojun Zhang Liming Mu Jie Zhao Chunxiang Xu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 06 PP. 3280 ~ 3298 2019. 06 | ||
78 | Á¦¸ñ(Title) | An Exhaustive Review on Security Issues in Cloud Computing | |
ÀúÀÚ(Author) | Shahin Fatima Shish Ahmad | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 06 PP. 3219 ~ 3237 2019. 06 | ||
79 | Á¦¸ñ(Title) | A Secure Cloud Computing System by Using Encryption and Access Control Model | |
ÀúÀÚ(Author) | Ghassan Sabeeh Mahmood Dong Jun Huang Baidaa Abdulrahman Jaleel | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 03 PP. 0538 ~ 0549 2019. 06 | ||
80 | Á¦¸ñ(Title) | A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks | |
ÀúÀÚ(Author) | Xin Xiao Ruirui Zhang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 05 PP. 2732 ~ 2753 2019. 05 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.