Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Kyung Sang Sung"'
Autor:
Kyung Sang Sung1 actofgod@naver.com, Jung Sun Han2 fk0824@hanmail.net, Hyun Jo Kim3 meatus630@gmail.com, Won Shik Na4 winner@nsu.ac.kr
Publikováno v:
Journal of Pharmaceutical Negative Results. 2022 Special Issue, Vol. 13, p573-582. 10p.
Autor:
Kyung-Sang Sung, Wonshik Na
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 18:1572-1576
The new world paradigm as brought on by the Fourth Industrial Revolution has initiated a change in a nation’s defense system, with cybersecurity now being recognized as a crucial to national security. As the scope of national security expands to in
Autor:
Kyung-Sang Sung, Wonshik Na
Publikováno v:
The International Journal of Electrical Engineering & Education. 58:517-530
Malware can be diagnosed through several ways or can even pass under the radar at times. This can cause confusion among the users, who do not welcome a flood of unorganized information in general. This paper proposes an extraction method that can pro
An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification
Publikováno v:
KIPS Transactions on Computer and Communication Systems. 3:271-276
This study analyzed that N/A check items affect the results of the security level degree, when performing vulnerability analysis⋅evaluation. For this, we were used vulnerability analysis⋅evaluation range, check items and quantitative calculation
Publikováno v:
The KIPS Transactions:PartC. :575-582
With all merits of electronic documents, there exist threats to the security such as illegal outflow, destroying, loss, distortion, etc. The techniques to protect the electronic documents against illegal forgery, alteration, removal are strongly requ
Publikováno v:
The KIPS Transactions:PartD. :1205-1212
As electronic commerce systems have been widely used, the necessity of adaptive e-commerce agent systems has been increased. These kinds of adaptive e-commerce agents can monitor customer`s behaviors and cluster thou in similar categories, and includ
Publikováno v:
2008 International Conference on Information Security and Assurance (isa 2008).
While a lot of important information is being sent and received on the Internet, the information could be exposed to many threats, and the more the multicast service is various and generalized, the more the service range is widened. When a new member
Publikováno v:
2008 International Conference on Convergence and Hybrid Information Technology.
This paper proposes an approach to transmit of multimedia contents effectively in a rapidly changing Internet environment. At present, guaranteeing QoS in network has become an important subject to consider. When transmitting AF packets in a multi-Di
Publikováno v:
2007 International Conference on Convergence Information Technology (ICCIT 2007).
As the use of the computer and networks generalized, the various tasks which are requested secrets can be processed such as the banking transaction. And because of increasing of data exchange, Internet, and mobile networks, the method which is not co
Publikováno v:
ITSC
To monitor road situation, the source from CCTV is more useful than any other data from GPS or loop detector because it can give the whole picture of the two-dimensional traffic situation. This paper suggests multiple vehicles detection by quad-tree