최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering, v.25 no.9, 2021년, pp.1227 - 1233
김대운 (Department of Information Security, Dong-Shin University) , 조영태 (Department of Information Security, Dong-Shin University) , 김종민 (Department of Information Security, Dong-Shin University)
QR Code has been used in various forms such as simple business cards and URLs. Recently, the influence of Corona 19 Fundemik has led to the use of QR Codes to track travel routes through visits and entry / exit records, and QR Code usage has skyrocketed. In this way, most people have come to use it ...
QR Code standardization / standardization [Internet]. Available: https://www.qrcode.com/ko/about/standards.html.
QR Code information amount / version [Internet]. Available: https://www.qrcode.com/ko/about/version.html.
K. H. Bahn, J. W. Jung, and D. H. Won, "Counterplan of the XSS Attack to QR Code," Proceedings of the Korean Information Science Society Conference, vol. 38, no. 1, pp. 102-104, 2011.
H. S. Kim and S. J. Lee, "Method of Digital Forensic Investigation of Docker-Based Host," Korea Information Processing Society, vol. 6, no. 2, pp. 75-86, 2017.
M. S. Lee, M. S. Kang, I. H. Kim, and J. H. Kim, "Design and Performance Comparison of Docker Container Based Deep Learning Model Management System for Real-Time Analysis," Journal of Korean Institute of Communications and Information Sciences, vol. 46, no. 2, pp. 390-400, 2021.
Kubernetes Guide [Internet]. Available: https://subicura.com/2017/01/19/docker-guide-for-beginners-1.html.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.