Digital Library


Search: "[ keyword: Analysis ]" (247)
    Study on the Femtocell Vulnerability Analysis Using Threat Modeling
    Jae-ki Kim, Jeong-Hoon Shin, Seung-joo Kim KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 8, pp. 197-210, Aug. 2016
    10.3745/KTCCS.2016.5.8.197
    Keywords: Threat modeling, Femtocell, Vulnerability Analysis

    A Derivation of Sensitivity Equations of the Error Components to Analyze Performance in the Direct Fire Control System
    Jaehun Kim , Euiwhan Kim , Jeongyeob Lee , Gunkook Kim KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 12, pp. 399-408, Dec. 2015
    10.3745/KTCCS.2015.4.12.399

    Analysis of Inquisitive Tendency of 2009 Revised Middle School Informatics Textbooks
    Oh Han Kang KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 7, pp. 219-226, Jul. 2015
    10.3745/KTCCS.2015.4.7.219

    Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment
    Jae Kook Lee , Sung Jun Kim , Joon Woo , Chan Yeol Park KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 6, pp. 205-212, Jun. 2015
    10.3745/KTCCS.2015.4.6.205

    An Efficient Load Balancing Technique in a Multicore Mobile System
    Jung Seok Cho , Doo San Cho KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 5, pp. 153-160, May. 2015
    10.3745/KTCCS.2015.4.5.153

    Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box
    Hyung Chul Kang , Chang Hoon Lee KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 105-108, Mar. 2015
    10.3745/KTCCS.2015.4.3.105

    An Android API Obfuscation Tool using Reflection and String Encryption
    Joo Hyuk Lee , Hee Wan Park KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 1, pp. 23-30, Jan. 2015
    10.3745/KTCCS.2015.4.1.23

    The Method for Extracting Meaningful Patterns Over the Time of Multi Blocks Stream Data
    Kyeong Rae Cho , Ki Young Kim KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 10, pp. 377-382, Oct. 2014
    10.3745/KTCCS.2014.3.10.377

    An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification
    Jun Ho Lee , Kyung Sang Sung , Hea Seok Oh KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 8, pp. 271-276, Aug. 2014
    10.3745/KTCCS.2014.3.8.271

    A Plagiarism Detection Technique for Source Codes Considering Data Structures
    Ki Hwa Lee , Yeo Neo Kim , Gyun Woo KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 6, pp. 189-196, Jun. 2014
    10.3745/KTCCS.2014.3.6.189