¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
DDoS °ø°Ý ŽÁö¸¦ À§ÇÑ ÆÐŶ »ùÇøµ ±â¹ýµéÀÇ ¼º´É ºÐ¼®
Performance Analysis of Packet Sampling Mechanisms for DDoS Attack Detection
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C(2004³â12¿ù)
À¯ºñÄõÅͽº ȯ°æ¿¡¼ÀÇ ¹°·ù°ü¸®¸¦ À§ÇÑ Á¤º¸ ¼ºñ½º
Information Service for Logistics in Ubiquitous Environment
Çѱ¹Á¤º¸°úÇÐȸ 2004 Ãß°èÇмú´ëȸ (2004³â10¿ù)
³×Æ®¿öÅ© ½Ã¹Ä·¹ÀÌÅÍ µµ±¸¸¦ ÀÌ¿ëÇÑ Ä§ÀÔÀÚ ¿ªÃßÀû ¾Ë°í¸®Áò °ËÁõ
A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2)
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö I - Á¤º¸Åë½Å (2005³â02¿ù)
Applying the XML Technology for Comments Management of Source Code
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö(2005³â03¿ù)
À¯ºñÄõÅͽº ½Ã½ºÅÛÀ» À§ÇÑ ½Ã¸Çƽ ´ÙÁß ¿¡ÀÌÀüÆ®
Semantic Multi-agents Framework for Ubiquitous Systems
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö B - ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë (2005³â03¿ù)
Â÷¼¼´ë ¹«¼±ÀÎÅÍ³Ý ±â¼ú µ¿Çâ ¹× ¹ßÀü ¹æÇâ
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö (2005³â01¿ù)
¿ÂÅç·ÎÁö±â¹Ý Ãß·ÐÀ» ÀÌ¿ëÇÑ ½Ã¸Çƽ °Ë»ö ½Ã½ºÅÛ
Semantic Search System using Ontology-based Inference
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö B - ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë (2005³â03¿ù)
¼Ò±Ô¸ð À̵¿ ¾ÖµåȤ ³×Æ®¿öÅ©¿¡¼ÀÇ ÀÚµ¿ ³ëµå ¼³Á¤ ÇÁ·ÎÅäÄÝ
Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö I - Á¤º¸Åë½Å (2005³â02¿ù)
¼¾¼ ³×Æ®¿öÅ©ÀÇ °³¿ä ¹× ±â¼úµ¿Çâ
Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2004³â12¿ù)
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2005³â2¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.