최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.23 no.4, 2022년, pp.95 - 107
윤준혁 (School of Computer Engineering & Applied Mathematics, Computer System Institute, Hankyong National University) , 김미희 (School of Computer Engineering & Applied Mathematics, Computer System Institute, Hankyong National University)
With the rapid development of Internet of Things sensor devices and big data processing techniques, Internet of Things sensor-based information systems have been applied in various industries. Depending on the industry in which the information systems are applied, the accuracy of the information der...
Abbasi, A., Sarker, S. and Chiang, R. H., "Big data research in information systems: Toward an inclusive research agenda", Journal of the association for information systems, Vol.17, No.2, pp.3, 2016. http://dx.doi.org/10.17705/1jais.00423
Moo-kyung Jung, Chang-yong Choi, Ho-cheol Lee and Dong-myung Lee, "A Design of Platform of Portable Cultural Asset Surveilance System", In Proceedings of Korea Institute of Information and Communication Engineering Conference, pp.599-600, 2013. https://koreascience.kr/article/CFKO201331751950292.page
Dziak, D., Jachimczyk, B. and Kulesza, W. J. "IoT-based information system for healthcare application: design methodology approach", Applied Sciences, Vol.7, No.6, pp.596, 2017. https://doi.org/10.3390/app7060596
Tharayil, K. S., Farshteindiker, B., Eyal, S., Hasidim, N., Hershkovitz, R., Houri, S. and Oren, Y. "Sensor defense in-software (SDI): Practical software based detection of spoofing attacks on position sensors", Engineering Applications of Artificial Intelligence, Vol.95, pp.103904, 2020. https://doi.org/10.1016/j.engappai.2020.103904
Xiao, Q., Chen, Y., Shen, C., Chen, Y. and Li, K. "Seeing is not believing: Camouflage attacks on image scaling algorithms", In 28th {USENIX} Security Symposium ({USENIX} Security 19), pp.443-460, 2019. https://www.usenix.org/conference/usenixsecurity19/presentation/xiao
Mo, Y. and Sinopoli, B. "False data injection attacks in control systems", In Preprints of the 1st workshop on Secure Control Systems, pp.1-6, 2010. https://ptolemy.berkeley.edu/projects/truststc/conferenc es/10/CPSWeek/papers/scs1_paper_7.pdf
Dean, J. and Ghemawat, S. "MapReduce: simplified data processing on large clusters", Communications of the ACM, Vol.51, No.1, pp.107-113, 2008. https://doi.org/10.1145/1327452.1327492
Apache, "Apache Hadoop", https://hadoop.apache.org
Apache, "Apache Spark", https://spark.apache.org
Tcheumadjeu, L. C. T., Luber, A., Brockfeld, E., Gurczik, G., Sohr, A. and Sauerlander, A. "Integration of mobile wireless RF sensors into a traffic information system", Transportation research procedia, Vol.25, pp.1865-1883, 2017. https://doi.org/10.1016/j.trpro.2017.05.168
Kapalova, N., Khompysh, A., Arici, M. and Algazy, K. "A block encryption algorithm based on exponentiation transform", Cogent Engineering, Vol.7 No.1, pp.1788292, 2020. https://doi.org/10.1080/23311916.2020.1788292
Ma, Y., Li, C. and Ou, B. "Cryptanalysis of an image block encryption algorithm based on chaotic maps", Journal of Information Security and Applications, Vol.54, pp.102566, 2020. https://doi.org/10.1016/j.jisa.2020.102566
Boukerche, A., Zheng, L. and Alfandi, O. "Outlier detection: Methods, models, and classification", ACM Computing Surveys (CSUR), Vol.53, No.3, pp.1-37, 2020. https://doi.org/10.1145/3381028
Chatterjee, S., Kar, A. K. and Mustafa, S. Z. "Securing IoT devices in smart cities of India: from ethical and enterprise information system management perspective", Enterprise Information Systems, Vol.15, No.4, pp.585-615, 2021. https://doi.org/10.1080/17517575.2019.1654617
Sharma, P. S., Roy, P. K., Ahmad, N., Ahuja, J. and Kumar, N., "Localisation of License Plate and Character Recognition Using Haar Cascade", In 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), pp.971-974, 2019. https://ieeexplore.ieee.org/abstract/document/8991267
Quiring, E., Klein, D., Arp, D., Johns, M. and Rieck, K. "Adversarial preprocessing: Understanding and preventing image-scaling attacks in machine learning", In 29th {USENIX} Security Symposium ({USENIX} Security 20), pp.1363-1380, 2020. https://www.usenix.org/conference/usenixsecurity20/pr esentation/quiring
Qureshi, A. U. H., Larijani, H., Yousefi, M., Adeel, A. and Mtetwa, N. "An adversarial approach for intrusion detection systems using Jacobian Saliency Map Attacks (JSMA)", Algorithm. Computers, Vol.9, No.3, p. 58, 2020. https://doi.org/10.3390/computers9030058
Liu, H. and Wang, X. "Image encryption using DNA complementary rule and chaotic maps", Applied Soft Computing, Vol.12, No.5, pp.1457-1466, 2012. https://doi.org/10.1016/j.asoc.2012.01.016
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.