81 | Á¦¸ñ(Title) | DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network | |
---|---|---|---|
ÀúÀÚ(Author) | Tieming Chen Qingyu Mao Mingqi Lv Hongbing Cheng Yinglong Li | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 04 PP. 2180 ~ 2197 2019. 04 | ||
82 | Á¦¸ñ(Title) | The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN | |
ÀúÀÚ(Author) | Jianpo Li Dong Wang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 04 PP. 2223 ~ 2242 2019. 04 | ||
83 | Á¦¸ñ(Title) | The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle | |
ÀúÀÚ(Author) | Qian Zeng Zhongshan Zhang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 04 PP. 1941 ~ 1960 2019. 04 | ||
84 | Á¦¸ñ(Title) | A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels | |
ÀúÀÚ(Author) | Boyang Huang Zhengmin Kong Yanjun Fang Xin Jin | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 04 PP. 1904 ~ 1921 2019. 04 | ||
85 | Á¦¸ñ(Title) | Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices | |
ÀúÀÚ(Author) | Weiwei Liu Guangjie Liu Xiaopeng Ji Jiangtao Zhai Yuewei Dai | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 04 PP. 1866 ~ 1883 2019. 04 | ||
86 | Á¦¸ñ(Title) | Advanced insider threat detection model to apply periodic work atmosphere | |
ÀúÀÚ(Author) | Junhyoung Oh Tae Ho Kim Kyung Ho Lee | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 03 PP. 1722 ~ 1737 2019. 03 | ||
87 | Á¦¸ñ(Title) | A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service | |
ÀúÀÚ(Author) | Heeyoul Kim | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 03 PP. 1659 ~ 1673 2019. 03 | ||
88 | Á¦¸ñ(Title) | A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments | |
ÀúÀÚ(Author) | Seul-Ki Choi Taejin Lee Jin Kwak | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 03 PP. 1611 ~ 1625 2019. 03 | ||
89 | Á¦¸ñ(Title) | Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service | |
ÀúÀÚ(Author) | Liqing Chen Jiguo Li Yichen Zhang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 03 PP. 1523 ~ 1545 2019. 03 | ||
90 | Á¦¸ñ(Title) | Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing | |
ÀúÀÚ(Author) | Jining Zhao Chunxiang Xu Kefei Chen | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 02 PP. 1043 ~ 1063 2019. 02 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.