Digital Library


Search: "[ keyword: Trace ]" (18)
    Design an Algorithm Matching TCP Connection Pairs for Intruder Traceback
    Hyung Woo Kang , Soon Jwa Hong , Dong Hoon Lee The KIPS Transactions:PartC, Vol. 13, No. 1, pp. 11-18, Feb. 2006
    10.3745/KIPSTC.2006.13.1.11

    Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments
    Kim Sun Seog , Lee Chang Hun The KIPS Transactions:PartC, Vol. 10, No. 7, pp. 867-878, Dec. 2003
    10.3745/KIPSTC.2003.10.7.867

    Study about Component Identification Method Based On RUP
    Mi Sook Choi, Yong Ik Yoon, Jai Nyun Park The KIPS Transactions:PartD, Vol. 9, No. 1, pp. 91-102, Feb. 2002
    10.3745/KIPSTD.2002.9.1.91

    Characterizing the Tail Distribution of Android IO Workload
    Changhyun Park, Youjip Won, Yongjun Park KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 10, pp. 245-250, Oct. 2019
    https://doi.org/10.3745/KTCCS.2019.8.10.245
    Keywords: Android, Trace, Workload, Mobile

    A Study on Image Acquisition and Usage Trace Analysis of Stick-PC
    Han Hyoung Lee, Seung Gyu Bang, Hyun Woo Ba다, Doo Won Jeong, Sang Jin Lee KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 7, pp. 307-314, Jul. 2017
    10.3745/KTCCS.2017.6.7.307
    Keywords: Peripheral Device, Digital Forensic, Stick-PC, Connection Trace, Image Acquisition

    Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria
    Jisoo Park, Seungjoo Kim KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 3, pp. 121-134, Mar. 2017
    10.3745/KTCCS.2017.6.3.121
    Keywords: SDLC, Threat Modeling, Security Requirements, Traceability

    A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection
    Munkhbaatar Doyoddorj KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 5, pp. 163-172, May. 2014
    10.3745/KTCCS.2014.3.5.163

    A Study on Countermeasures against Messenger Phishing using ARIT Technique
    Sung Kyu Cho , Jun Moon Seog KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 223-230, May. 2013
    10.3745/KTCCS.2013.2.5.223