Digital Library
Search: "[ keyword: Analysis ]" (247)
Study on the Femtocell Vulnerability Analysis Using Threat Modeling
Jae-ki Kim, Jeong-Hoon Shin, Seung-joo Kim KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 8, pp. 197-210,
Aug.
2016
10.3745/KTCCS.2016.5.8.197
Keywords: Threat modeling, Femtocell, Vulnerability Analysis

Keywords: Threat modeling, Femtocell, Vulnerability Analysis
A Derivation of Sensitivity Equations of the Error Components to Analyze Performance in the Direct Fire Control System
Jaehun Kim , Euiwhan Kim , Jeongyeob Lee , Gunkook Kim KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 12, pp. 399-408,
Dec.
2015
10.3745/KTCCS.2015.4.12.399

Analysis of Inquisitive Tendency of 2009 Revised Middle School Informatics Textbooks
Oh Han Kang KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 7, pp. 219-226,
Jul.
2015
10.3745/KTCCS.2015.4.7.219

Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment
Jae Kook Lee , Sung Jun Kim , Joon Woo , Chan Yeol Park KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 6, pp. 205-212,
Jun.
2015
10.3745/KTCCS.2015.4.6.205

An Efficient Load Balancing Technique in a Multicore Mobile System
Jung Seok Cho , Doo San Cho KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 5, pp. 153-160,
May.
2015
10.3745/KTCCS.2015.4.5.153

Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box
Hyung Chul Kang , Chang Hoon Lee KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 3, pp. 105-108,
Mar.
2015
10.3745/KTCCS.2015.4.3.105

An Android API Obfuscation Tool using Reflection and String Encryption
Joo Hyuk Lee , Hee Wan Park KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 1, pp. 23-30,
Jan.
2015
10.3745/KTCCS.2015.4.1.23

The Method for Extracting Meaningful Patterns Over the Time of Multi Blocks Stream Data
Kyeong Rae Cho , Ki Young Kim KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 10, pp. 377-382,
Oct.
2014
10.3745/KTCCS.2014.3.10.377

An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification
Jun Ho Lee , Kyung Sang Sung , Hea Seok Oh KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 8, pp. 271-276,
Aug.
2014
10.3745/KTCCS.2014.3.8.271

A Plagiarism Detection Technique for Source Codes Considering Data Structures
Ki Hwa Lee , Yeo Neo Kim , Gyun Woo KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 6, pp. 189-196,
Jun.
2014
10.3745/KTCCS.2014.3.6.189
