Digital Library


Search: "[ keyword: Security ]" (198)
    A Study for Task Detection Acquiring Abnormal Permission in Linux
    Won Il Kim , Sang Hyun Yoo , Ju Hyun Kwak , Chang Hoon Lee KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 11, pp. 427-432, Nov. 2014
    10.3745/KTCCS.2014.3.11.427

    A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment
    Jeong Hyo Park , Kim Nak Hyun , Yong Hoon Jung , Moon Seog Jun KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 10, pp. 323-328, Oct. 2014
    10.3745/KTCCS.2014.3.10.323

    The Moderating Effects of Information Security Policy between Information Security Maturity and Organizational Performance
    Jeong Kuk Park , In Jai Kim KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 9, pp. 301-310, Sep. 2014
    10.3745/KTCCS.2014.3.9.301

    An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification
    Jun Ho Lee , Kyung Sang Sung , Hea Seok Oh KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 8, pp. 271-276, Aug. 2014
    10.3745/KTCCS.2014.3.8.271

    An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems
    Hyung Chan Kim , Il Hwan Park KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 2, pp. 31-42, Feb. 2014
    10.3745/KTCCS.2014.3.2.31

    A Study on the SmartPhone GPS based Graphical Password Approach
    Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 525-532, Dec. 2013
    10.3745/KTCCS.2013.2.12.525

    Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack
    Kwang Il Jeong , Joon Ku Lee , Geun Ok Park KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 561-568, Dec. 2013
    10.3745/KTCCS.2013.2.12.561

    An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone
    Myong Hee Kim , Wildan Toyib KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 541-552, Dec. 2013
    10.3745/KTCCS.2013.2.12.541

    A Proposal for "Security Verification Method for Implementation of Secure Android Mobile Application"
    Hur Hwan Seok , Kang Sung Hoon , Kim Seung Joo KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 10, pp. 445-460, Oct. 2013
    10.3745/KTCCS.2013.2.10.445

    Security Check Scheduling for Detecting Malicious Web Sites
    Jae Yeong Choi , Sung Ki Kim , Byoung Joon Min KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 9, pp. 405-412, Sep. 2013
    10.3745/KTCCS.2013.2.9.405