최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털융복합연구 = Journal of digital convergence, v.17 no.11, 2019년, pp.195 - 200
The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security pr...
G. Kortuem & F. Kawsar. (2010). Market-based user innovation in the Internet of Things. 2010 Internet of Things (IOT). DOI:10.1109/iot.2010.5678434
B. Haughian. (2018). IoT Industries. Design, Launch, and Scale IoT Services, 163-183. DOI:10.1007/978-1-4842-3712-0_8
Y. S. Jeong. (2019). An Efficient Personal Information Collection Model Design Using In-Hospital IoT System. Journal of Convergence for Information Technology, 9(3), 140-145.
B. Haughian. (2018). The Current and Future Status of the IoT. Design, Launch, and Scale IoT Services, 193-202. DOI:10.1007/978-1-4842-3712-0_10
Infinity Acute Care System Monitoring Solution. (2012). Biomedical Safety & Standards, 42(2), 9-10. DOI:10.1097/01.bmsas.0000411012.71323.29
Y. S. Jeong. (2019). Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System. Journal of Convergence for Information Technology, 9(4), 1-7.
North American Economic Integration: Trial by Fire. (n.d.). North American Economic Integration. DOI:10.4337/9781840647693.00020
M. Hirota, H. Mizuochi & S. Kakegawa. (2006). A Demonstrational Test of Pressurization Smoke Control System at A Large-scale Shopping Store. Fire Science and Technology, 25(3), 213-237. DOI:10.3210/fst.25.213
Unintentional and Involuntary Personal Information Leakage on Facebook from User Interactions. (2016). KSII Transactions on Internet and Information Systems, 10(8). DOI:10.3837/tiis.2016.07.024
Netherlands Antilles - Cybercrime, Data Protection, Information & Internet. (n.d.). Foreign Law Guide. DOI:10.1163/2213-2996_flg_com_141095
H. M. Jung, K. M. Jeong & H. J. Cho. (2017). A Design for Security Functional Requirements of IoT Middleware System. Journal of the Korea Convergence Society, 8(11), 63-69.
J. S. Lee. (2018). A Study of protective measures of the source program for the development of the Internet of Things (IoT) : Protection of the program as well as plagiarism research. Journal of the Korea Convergence Society, 9(4), 31-45.
M. J. Lee. (2015). A Study on IoT Service for Game Development. Journal of Digital Convergence,13(2), 291-297.
C. D. Lee. (2017). An Adaptive Traffic Interference Control System for Wireless Home IoT services. Journal of Digital Convergence, 15(4), 259-266
C. W. Park & J. W. Kim. (2016). An Empirical Research on Information Privacy Concern in the IoT Era. Journal of Digital Convergence, 14(2), 65-72.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.