Digital Library


Search: "[ keyword: Analysis ]" (260)
    A Derivation of Sensitivity Equations of the Error Components to Analyze Performance in the Direct Fire Control System
    Jaehun Kim , Euiwhan Kim , Jeongyeob Lee , Gunkook Kim KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 12, pp. 399-408, Dec. 2015
    10.3745/KTCCS.2015.4.12.399

    Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box
    Hyung Chul Kang , Chang Hoon Lee KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 105-108, Mar. 2015
    10.3745/KTCCS.2015.4.3.105

    An Android API Obfuscation Tool using Reflection and String Encryption
    Joo Hyuk Lee , Hee Wan Park KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 1, pp. 23-30, Jan. 2015
    10.3745/KTCCS.2015.4.1.23

    The Method for Extracting Meaningful Patterns Over the Time of Multi Blocks Stream Data
    Kyeong Rae Cho , Ki Young Kim KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 10, pp. 377-382, Oct. 2014
    10.3745/KTCCS.2014.3.10.377

    An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification
    Jun Ho Lee , Kyung Sang Sung , Hea Seok Oh KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 8, pp. 271-276, Aug. 2014
    10.3745/KTCCS.2014.3.8.271

    A Plagiarism Detection Technique for Source Codes Considering Data Structures
    Ki Hwa Lee , Yeo Neo Kim , Gyun Woo KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 6, pp. 189-196, Jun. 2014
    10.3745/KTCCS.2014.3.6.189

    Built-In Self Repair for Embedded NAND-Type Flash Memory
    Tae Hwan Kim , Hoon Chang KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 5, pp. 129-140, May. 2014
    10.3745/KTCCS.2014.3.5.129

    An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems
    Hyung Chan Kim , Il Hwan Park KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 2, pp. 31-42, Feb. 2014
    10.3745/KTCCS.2014.3.2.31

    An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone
    Myong Hee Kim , Wildan Toyib KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 541-552, Dec. 2013
    10.3745/KTCCS.2013.2.12.541

    A Study on MS Crash Analyzer
    Myoung Sun Noh , Jong Bae Na , Gwang Un Jung , Jae Cheol Ryou , Bong Nam Noh KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 9, pp. 399-404, Sep. 2013
    10.3745/KTCCS.2013.2.9.399