Digital Library


Search: "[ keyword: Security ]" (204)
    Security Check Scheduling for Detecting Malicious Web Sites
    Jae Yeong Choi , Sung Ki Kim , Byoung Joon Min KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 9, pp. 405-412, Sep. 2013
    10.3745/KTCCS.2013.2.9.405

    Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats
    Tae Young Lee , Dong Gue Park KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 8, pp. 357-368, Aug. 2013
    10.3745/KTCCS.2013.2.8.357

    Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs
    Hyun Il Lim KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 7, pp. 303-310, Jul. 2013
    10.3745/KTCCS.2013.2.7.303

    Indirect Branch Target Address Verification for Defense against Return-Oriented Programming Attacks
    Soohyun Park , Sunil Kim KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 217-222, May. 2013
    10.3745/KTCCS.2013.2.5.217

    Reducing of Authentication Signaling Traffic in LTE Networks
    Seonho Kim , Jongpil Jeong KIPS Transactions on Computer and Communication Systems, Vol. 1, No. 2, pp. 109-118, Nov. 2012
    10.3745/KTCCS.2012.1.2.109

    Risk Management interaction model for Process of Information Security Governance
    You Jin Song KIPS Transactions on Computer and Communication Systems, Vol. 1, No. 2, pp. 103-108, Nov. 2012
    10.3745/KTCCS.2012.1.2.103

    Implementation of a Static Analyzer for Detecting the PHP File Inclusion Vulnerabilities
    Joon Seon Ahn , Seong Chae Lim The KIPS Transactions:PartA, Vol. 18, No. 5, pp. 193-204, Oct. 2011
    10.3745/KIPSTA.2011.18.5.193

    Text Watermarking Based on Syntactic Constituent Movement
    Mi Young Kim The KIPS Transactions:PartB , Vol. 16, No. 1, pp. 79-84, Feb. 2009
    10.3745/KIPSTB.2009.16.1.79

    Development of a String Injection Vulnerability Analyzer for Web Application Programs
    Joon Seon Ahn , Yeong Min Kim , Jang Wu Jo The KIPS Transactions:PartA, Vol. 15, No. 3, pp. 181-188, Jun. 2008
    10.3745/KIPSTA.2008.15.3.181

    An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit
    Seong Yong Joo , Joon Seon Ahn , Jang Wu Jo The KIPS Transactions:PartA, Vol. 15, No. 1, pp. 45-52, Feb. 2008
    10.3745/KIPSTA.2008.15.1.45