Digital Library
Search: "[ keyword: SI ]" (616)
-
Bong-Goo Park, Vol. 6, No. 5, pp. 45-56, Oct. 2005
Keywords: Anomaly Intrusion Detection, Soundex Algorithm, System Calls, Neural Networks -
Jeong Hwa-Young, Vol. 6, No. 4, pp. 1-8, Aug. 2005
Keywords: WBI, Web courseware, CBD, Component composition -
Nam Sea-Hyeon, Vol. 6, No. 3, pp. 85-96, Jun. 2005
Keywords: explicit multicast, session initiation protocol, mobile IP -
75. A MDIT(Mobile Digital Investment Trust) Agent design and security enhancement using 3BC and E2mECCJeong Eun-Hee, Lee Byung-Kwan, Vol. 6, No. 3, pp. 1-16, Jun. 2005
Keywords: SSL, DES, ECC, MDIT, EC-Sign, 3BC -
Jung Gang-Yong, Vol. 5, No. 2, pp. 85-96, Apr. 2004
Keywords: web design, business logic, web form system, template, web UI -
Na Guen-Sik, Vol. 5, No. 2, pp. 57-68, Apr. 2004
Keywords: Intrusion Detection, intrusion Signature, IDS : Intrusion Detection System -
Lee Seok-Jae, Park Sae-Mi, Kang Tae-ho, Yoo Jae-Soo, Vol. 5, No. 1, pp. 67-84, Feb. 2004
Keywords: Real-time database, Real-time Concurrency control, Feasibility Test -
Kim Tai-Dal, Vol. 5, No. 1, pp. 33-40, Feb. 2004
Keywords: CMM, Quantitative Process Management, Software Quality Management, SI -
Kim Cuk-Boh, Vol. 5, No. 1, pp. 1-14, Feb. 2004
Keywords: Component Base Design (CBD) Component abstraction, Reengineering, Design patterns, Rebuilding of design patterns




