A study on stable web server system using virtualization technology against attacks | 2 | 0.38 | 2015 |
A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention | 4 | 0.41 | 2015 |
PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions | 3 | 0.41 | 2014 |
A study on malicious codes pattern advanced analysis using visualization | 1 | 0.37 | 2014 |
A study on abnormal event correlation analysis for convergence security monitor | 1 | 0.38 | 2013 |
Continuity in Wireless Video Security System-Based Physical Security Services | 0 | 0.34 | 2013 |
A Study on Convergence Security System for Preventing Leakage of Internal Information. | 2 | 0.45 | 2013 |
A Novel Secure Scheme For Wireless Ad Hoc Network | 2 | 0.43 | 2013 |
Design of hierarchical coordination model for ubiquitous application | 1 | 0.35 | 2012 |
Introduction to special issue: ICISA 2010 | 0 | 0.34 | 2012 |
A Study About Security Awareness Program Based on RFID Access Control System. | 1 | 0.36 | 2012 |
Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment. | 0 | 0.34 | 2012 |
A Study on the Occurrence of Crimes Due to Climate Changes Using Decision Tree. | 0 | 0.34 | 2012 |
A Study on the Real-Time Location Tracking Systems Using Passive RFID. | 1 | 0.56 | 2012 |
Inconsistent Fail due to Limited Tester Timing Accuracy | 2 | 0.42 | 2008 |
Empirical Validation of Yield Recovery Using Idle-Cycle Insertion | 2 | 0.38 | 2007 |