최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기융합보안논문지 = Convergence security journal, v.23 no.1, 2023년, pp.19 - 25
백용진 (경상국립대학교 컴퓨터과학과) , 김현주 (경상국립대학교 컴퓨터과학부)
The current network environment provides a real-time interactive service from an initial one-way information prov ision service. Depending on the form of web-based information sharing, it is possible to provide various knowledge a nd services between users. However, in this web-based real-time infor...
The Design of Authentication Model based on Symmetric Key Encryption for Improving Network Availability in Cloud Environment 2019, pp.47 - 53.?
Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments 2019, vol.14, no.6 pp. 683-691.?
A Reliable Service Provided Model for Session Hijacking Attacks in Big Data Service Environments 2016 vol.11, no.6 pp. 597-606 (10 pages).?
D.-H. Seo, H.-J. Kang, Suggest of TCP sequence number Encryption, Journal of Korea Multimedia Society, Autumn Annual Conference, pp. 498~501, 2000.?
A Study on the responses of Spear Phishing mail attacks, 2021.?
A Phishing Site Detection Method with Utilizing Password, 2017.?
An Efficient Detection and Service Model in case of IP Spoofing in Cloud Environment, 2019.?
An Efficient Detection and Service Model in case of IP Spoofing in Cloud Environment, 2019.?
Messenger Phishing Modus Operandi in South Korea 2021, vol.18, no.3, 통권 58호 pp. 241-258 (18 pages).?
A Study on Website Forgery/Falsification Detection Technique using ImagesVolume 16 Issue 1Pages.81-87 2016.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.