Zobrazeno 1 - 10
of 68
pro vyhledávání: '"Geuk Lee"'
Publikováno v:
Journal of Coaching Development. 24:190-196
Publikováno v:
Advanced Science Letters. 23:1528-1532
Publikováno v:
International Conference of Computational Methods in Sciences and Engineering 2004 (ICCMSE 2004)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::701577d609e8a286b17f61a39ebe7521
https://doi.org/10.1201/9780429081385-298
https://doi.org/10.1201/9780429081385-298
Publikováno v:
Seventh International Conference on Advances in Computing, Control and Networking - ACCN 2017.
Publikováno v:
DEStech Transactions on Engineering and Technology Research.
The current backdoor program is executed in user mode, which is called application mode, it is possible to find backdoors by the integrity check of system file. However, for the backdoor program is executed in kernel module, it is impossible to find
Publikováno v:
Sixth International Conference on Advances in Computing, Control and Networking - ACCN 2017.
Publikováno v:
DEStech Transactions on Environment, Energy and Earth Science.
This paper, which is based on the research in the personal color diagnoses system, uses the fuzzy logic and fuzzy inference rule to improve the personal color selection method of the existing personal color system and to get more objective and reliab
Publikováno v:
Future Generation Computer Systems. 25:352-357
In this paper, we have discussed the issues concerning the basic concept and classification of OT (Oblivious Transfer). We have proposed secure verifiable non-interactive oblivious transfer protocols for the exchange of secrets on distributed environ
Publikováno v:
Future Generation Computer Systems. 25:358-363
A security system for a company network is progressing as a ESM (Enterprise Security Management) in an existing security solution foundation. The establishment of the security policy is occupying a very important area in ESM of the security system. W
Publikováno v:
Proceedings of the International Conference on Chemical, Material and Food Engineering.
This paper proposes multi-filtering method to prevent DDoS attack. Several filtering methods are applied in two firewall architecture for effective DDoS prevention. In the first firewall, R-PA filtering algorithm and strict hop counter filtering meth