My Library

Limit search to available items
Book Cover
Title IT convergence and security 2012 [electronic resource] / Kuinam J. Kim, Kyung-Yong Chung, editors.
Publication Info. Dordrecht ; New York : Springer, c2013.

Location Call No. Status Notes
 Libraries Electronic Books  ELECTRONIC BOOKS-DDA    AVAIL. ONLINE
Description 1 online resource.
Series Lecture notes in electrical engineering ; v.215.
Contents Security Fundamentals -- Development of an Automatic Document Malware Analysis System / Hong-Koo Kang, Ji-Sang Kim, Byung-Ik Kim, Hyun-Cheol Jeong -- Study of Behavior-Based High Speed Visit/Inspection Technology to Detect Malicious Websites / Ji-Sang Kim, Hong-Koo Kang, Hyun-Cheol Jeong -- One-Way Hash Function Based on Cellular Automata / Jun-Cheol Jeon -- A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory / Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof -- Forensic Evidence Collection Procedures of Smartphone in Crime Scene / Jeong-Hyun Lim, Chang-Woo Song, Kyung-Yong Chung, Ki-Wook Rim, Jung-Hyun Lee -- NAC System Analysis and Design for Improvement Model / Seung-Jae Yoo, Jeong-Mo Yang, Hwan-Seok Yang -- Industrial & Business Information Security -- Analysis of Methods for Detecting Compromised Nodes and its Countermeasures / Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai -- Protecting Advertisers Against Click Frauds / Rattikorn Hewett, Abhishek Agarwal --
A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS) / Seondong Heo, Jungmin Lim, Minsoo Lee, Soojin Lee, Hyunsoo Yoon -- Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment / Dong-Hwi Lee, Kyong-Ho Choi -- A Study About Security Awareness Program Based on RFID Access Control System / Kyong-Ho Choi, DongHwi Lee -- A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method / Ae Chan Kim, Won Hyung Park, Dong Hoon Lee -- An Investigation on the Research Topics in Relation to Information Systems in Supply Chain Management / Younjung Kim, Young-Ho Lee, Kyung-Yong Chung, Kang-Dae Lee -- Designing a Model for Context Awareness Based Reliable Auction-Recommending System (CARARS) by Utilizing Advanced Information / Hwa-Jin Park, Sang-Beom Kim -- Security Protocols and Applications -- A Secure Self-Encryption Scheme for Resource Limited Mobile Devices / Yongjoo Shin, Seungjae Shin, Minsoo Kim, Hyunsoo Yoon --
A Study on the Network Stability Measurement Based on an Articulation Nodes with Weight Value / Myung-Ki Jung, Seongjin Ahn -- An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- An Identity-Based Ring Signcryption Scheme / Gaurav Sharma, Suman Bala, Anil K. Verma -- A Secure DS-CDMA Technique with Capacity Enhancement for Ad Hoc Wireless Networks / Muhammad Zeeshan, Shoab Ahmed Khan, Muhammad Yasir Malik -- A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent / Geon II Heo, Nam Hun Kim, Ah Ra Jo, Sae In Choi, Won Hyung Park -- Internet Anonymity in Syria, Challenges and Solution / T. Eissa, Gi-hwan Cho -- Convergence Security -- Comparison of Attacks and Security Analyses for Different RFID Protocols / Jung Tae Kim -- Honeypot Using Dynamic Allocation Technique with IP Scan / Hwan-Seok Yang -- Attribute-Based Encryption for Commercial Content Distribution / Hyoseung Kim, Seunghwan Park, Jong Hwan Park, Dong Hoon Lee --
IT Convergence Applications -- Sensibility Extraction for Bicycle Design Using RFID Tag-Attached Crayons / Ho-Ill Jung, Seung-Jin Lee, Jeong-Hoon Kang, Min-Hyun Kim, Jong-Wan Kim, Bo-Hyun Lee -- Efficient Handover Schemes for Railroad Communications in 4G Mobile Networks / Ronny Yongho Kim, Baik Kim -- Cyber Threat Prediction Model Using Security Monitoring System Event / Neo Park, Won Hyung Park -- A Study for Car Insurance Service Using Vehicle Real Time Information / Yong-Yoon Shin, Byung-Yun Lee -- An MMU Virtualization for Embedded Systems / Sung-Hoon Son -- The Design and Implementation of Start Stop System with Multi-Protocol in Automotive Smart Key System / Kyeong-Seob Kim, Yun-Sub Lee, In-Seong Song, Sang-Bang Choi -- The Design and Implementation of Improved Anti-Collision Algorithm for Vehicle User Authentication System / Kyeong-Seob Kim, Yun-Sub Lee, Sang-Bang Choi -- Multi-Port Register File Design and Implementation for the SIMD Programmable Shader / Kyeong-Seob Kim, Yun-Sub Lee, Sang-Bang Choi --
Design Exploration Technique for Software Component Mapping of AUTOSAR Development Methodology / Kabsu Han, Jeonghun Cho -- Interoperability and Control Systems for Medical Cyber Physical Systems / Min-Woo Jung, Jeonghun Cho -- Ubiquitous Logistics Management in the Steel Industry / Sang-Young Lee, Yoon-Seok Lee -- Performance Evaluation of Train Propulsion Control on Ethernet Network Using TrueTime / Hyeon-Chyeol Hwang, Yong-Kuk Oh, Ronny Yongho Kim -- Intelligent Control System for Railway Level Crossing Safety / Bong-Kwan Cho, Sang-Hwan Ryu, Hyeon-Chyeol Hwang, Seoung-Chon Koh, Do-Hyeon Lee -- Moving Average Estimator Least Mean Square Using Echo Cancellation Algorithm / Sang-Yeob Oh, Chan-Shik Ahn -- An Abrupt Signal Detection as Accident Detection by Hamiltonian Eigenvalue on Highway CCTV Traffic Signal / In Jeong Lee -- Implementation of Improved DPD Algorithm Using the Approximation Hessian Technique and an Adaptive Filter / Jeong-Seok Jang, Gyong-Hak Lee.
Reproduction Electronic reproduction. Perth, W.A. Available via World Wide Web.
Subject Information technology.
Multimedia systems.
Computer security.
Computer networks -- Security measures.
Telecommunication systems -- Security measures.
Computer Communication Networks.
Communications Engineering, Networks.
Information Systems Applications (incl. Internet).
Added Author Kim, Kuinam J.
Chung, Kyung-Yong.
Ebooks Corporation
ISBN 9789400758605 (electronic bk.)
940075860X (electronic bk.)
OCLC # EBC1083666
View Shelf for Similar Items