Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 1, Jan. 2017


Energy-Efficient Division Protocol for Mobile Sink Groups in Wireless Sensor Network
Jaeyoung Jang, Euisin Lee
KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 1, pp. 1-8, Jan. 2017
10.3745/KTCCS.2017.6.1.1
Keywords: Wireless Sensor Networks, Mobile Sink Groups, Mobility, Group Division, Energy-efficiency

Screen Capture Authentication System for Web Postings to Used as Digital Evidence
Ju Young Kang, Sang Jin Lee
KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 1, pp. 9-16, Jan. 2017
10.3745/KTCCS.2017.6.1.9
Keywords: Digital Evidence, Authentication System, Screen Capture, Authentication for Web Postings

Process of Collection for a Removable Storage Device Image Using a Software
Baek Hyun Woo, Jeon Sang Jun, Sang Jin Lee
KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 1, pp. 17-24, Jan. 2017
10.3745/KTCCS.2017.6.1.17
Keywords: Removable Storage Device, Imaging, Secure USB, Write Blocker, Imaging Device

A Recovery Technique of PDF File in the Unit of Page
Jeewon Jang, Seung Gyu Bang, Jaehyeok Han, Sang Jin Lee
KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 1, pp. 25-30, Jan. 2017
10.3745/KTCCS.2017.6.1.25
Keywords: Damaged PDF File, Page Object, PDF, PDF Object Tag, PDF Page, recovery, Digital Forensic

Study for Android Smartphone’s Gallery Thumbnail Forensic Analysis
Daeho Yun, Sang Jin Lee
KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 1, pp. 31-42, Jan. 2017
10.3745/KTCCS.2017.6.1.31
Keywords: Thumbnail, Graphic File, Smartphone, Mobile Forensic

A Study on the Remove Use-After-Free Security Weakness
Yong Koo Park, Jin Young Choi
KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 1, pp. 43-50, Jan. 2017
10.3745/KTCCS.2017.6.1.43
Keywords: Security Weakness, Vulnerability, Dangling Pointer, Nullification