


default search action
ICITCS 2011: Suwon, Korea
- Kuinam J. Kim, Seong-Jin Ahn:

Proceedings of the International Conference on IT Convergence and Security, ICITCS 2011, Suwon, Korea, December 14-16, 2011. Lecture Notes in Electrical Engineering 120, Springer 2012, ISBN 978-94-007-2910-0
Security Fundamentals
- Gi-Hwan Cho, Seung-Ah Lee:

A Secure Service Framework for Handling Security Critical Data on the Public Cloud. 3-12 - Hun Choi, Yoo-Jung Choi, Ki-Mun Kim:

The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' Motivation. 13-20 - Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynard

, Atif Ahmad:
Towards Understanding Deterrence: Information Security Managers' Perspective. 21-37
Industrial & Business Information Security
- ByungRae Cha, JaeHyun Seo, JongWon Kim:

Design of Attribute-Based Access Control in Cloud Computing Environment. 41-50 - André van Cleeff, Trajce Dimkov, Wolter Pieters, Roel J. Wieringa:

Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. 51-67 - Yi-Chang Hsu, Jing-Jang Hwang:

Controlling Decryption of Personal Health Records in the Cloud. 69-79 - Sun-Moon Jo, Kyung-Yong Chung:

Access Control Mechanism for XML Document. 81-90 - Man Doan Nguyen, Eui-Nam Huh:

A Collaborative Intrusion Detection System Framework for Cloud Computing. 91-109 - Hyung-Jun Seo, Yoon-Cheol Choy:

Criteria for Comparing Cyberwarfare Capability. 111-120
Security Protocols and Applications
- Hyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rhee, June-Hwan Lee:

A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor. 123-127 - Muhammad Arshad Awan

, Abdul Sattar
, Cheong Ghil Kim, Chung-Pyo Hong, Shin-Dug Kim:
Semantic Search and Retrieval System for Learning Objects. 129-143 - Inhwan Choi, Dongkun Shin:

Wear Leveling for PCM Using Hot Data Identification. 145-149 - Byung Ki Kim, Jae Hyeok Jang, Kyung Woo Hur, Jeong-Gun Lee, Young Woong Ko:

Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine. 151-161 - Young-Joon Jang, Dongkun Shin:

HARD: Host-Level Address Remapping Driver for Solid-State Disk. 163-168 - Jong-Hun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Lee, Kyung-Yong Chung:

Ubiquitous Based Personalized Hypertension Monitoring System. 169-177 - Si-Jung Kim, Do-Eun Cho, Bong-Han Kim:

Customized IPTV Content Recommendation Service Model Based on Personal Preference. 179-189 - Yeong-Gyu Lim, Cheong Ghil Kim, Shin-Dug Kim:

A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread. 191-204 - Nam-Kyung Lee, Hyun-Woo Lee, Won Ryu:

Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform Environment. 205-216 - Seung-Hyung Lee, Young-Jae Song:

Aspect Oriented Software Development Using Requirement Engineering. 217-221 - Yao Meng, Hee-Cheol Kim:

A Review of Accelerometer-Based Physical Activity Measurement. 223-237 - Ju-Geon Pak, Kee-Hyun Park:

A Group Data Synchronization Protocol in Mobile Environments. 239-251 - Kee-Hyun Park, Ju-Geon Pak:

Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics. 253-263
Convergence Security
- In-Pyo Cho, So-Hyang Ko, Hoon-Mo Yang, Cheong-Ghil Kim, Shin-Dug Kim:

A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications. 267-279 - Chung-Pyo Hong, Muhammad Arshad Awan

, Cheong-Ghil Kim, Shin-Dug Kim:
An Efficient Live Stream Community Management Scheme for the Mobile. 281-293 - Sung-Kwan Kang, Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee:

Development of Real-Time Gesture Recognition System Using Visual Interaction. 295-306 - Abdul Raouf Khan

:
Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata. 307-315 - Gui-Jung Kim, Jung-Soo Han:

Simulation of 3D Information Visualization. 317-323 - Kyu Chul Kim, Chan Jung Park, Ronny Yongho Kim:

Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks. 325-329 - Sung-Ho Kim:

Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System. 331-335 - Sukhyun Lim, Hyung-Keun Jee, Jinyoung Youn, Junsuk Lee:

Augmented Reality-Based Role-Playing Contents for Education. 337-344 - Eun-Seok Lee, Jin-Hee Lee, Inwoo Jo, Byeong-Seok Shin:

Vertex Propagation for Fast Ray-Casting of Digital Elevation Model. 345-356 - Kyuho Lee, Seongjin Ahn:

A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization. 357-365 - Jae-Young Lee, Kee-Baek Kim, Seok-Han Lee, Tae-eun Kim, Jong-Soo Choi:

Image Registration for Sub-Pixel Using Pyramid Edge Images. 367-371 - Ahr-Hyun Lee, Seok-Han Lee, Jae-Young Lee, Tae-eun Kim, Jong-Soo Choi:

Real-Time Camera Tracking Using Planar Object Detection. 373-378 - Reza Malekian

, Abdul Hanan Abdullah:
Bidirectional Propagation Method for Analysis of Reflection on Radio Networks. 379-388 - Sang-Wook Park, Tae-eun Kim, Jong-Soo Choi:

Robust Estimation of Heights of Moving People Using a Single Camera. 389-405
IT Convergence Applications
- Su-Jin Baek, Jong-Won Ko, Gui-Jung Kim, Jung-Soo Han, Young-Jae Song:

Goal-Heuristic Analysis Method for an Adaptive Process Mining. 409-418 - Su-Jin Baek, Jung-Soo Han, Young-Jae Song:

Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario. 419-423 - Sang-Jin Cha, Gahee Kim, Chol-Hee Jang, GeunSik Jo:

An Effective Learning Method in Art Using Virtual Reality and Ontology. 425-434 - Hyun Yoo, Hoill Jung, Kyung-Yong Chung:

Development of Pain Prescription Decision Systems for Nursing Intervention. 435-444 - Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee:

Performance Sensibility Influence of Recommended Makeup Styles. 445-454 - Hyun-Jun Kim:

Affective Social Network. 455-461 - Sung-Ho Sim, Young-Jae Song:

A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker. 463-467 - Hyun-Jun Kim:

Discovering Knowledge Flow in Social Network. 469-477 - Jong-Won Ko, Su-Jin Baek, Young-Jae Song:

Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification. 479-487 - Jong-Won Ko, Jung-Soo Han, Young-Jae Song:

Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification. 489-493 - Eunsoon You

, Seung-Bo Park:
Improved Performance of Emotion Extraction Through Banned Words. 495-505 - Seung-Bo Park, Eunsoon You

, Jason J. Jung
:
Potential Emotion Word in Movie Dialog. 507-516 - Seung-Bo Park, Eunsoon You

:
Story Modeling for Green Light Decision Making. 517-521 - Hamid Mcheick

, Mohamad Dbouk, Fady Dagher:
Reducing the Gap of Provided Services and Requires Services Based on Service Approach. 523-537 - Tanakorn Wichaiwong, Chuleerat Jaruskulchai:

An Extended XML Compression Technique for XML Element Retrieval. 539-554
Mobile Computing and Future Networks
- Sunhoe Kim:

Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System. 557-560 - Sunhoe Kim:

Types of Fuel Cells and Applications for Electricity and Heat Co-Generation. 561-565 - Yoon-Sik Yoo

, Wan-Ki Park, Il-Woo Lee:
Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment. 567-572
Multimedia and Information Visualization
- Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof:

Malware Detection Techniques Using Artificial Immune System. 575-587 - Kyoung-Soo Han, Eul Gyu Im

:
A Survey on P2P Botnet Detection. 589-593 - Kyoung-Soo Han, Kyoung-Yong Chung, Eul Gyu Im

:
A Study on Instruction Substitution Analysis of Metamorphic Malware. 595-599 - Eul Gyu Im

, Kyoung-Soo Han:
An Analysis of Malware Attached in Spam. 601-605 - Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im

:
Detection Methods for Malware Variant Using API Call Related Graphs. 607-611 - Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im

:
Malware Classification Methods Using API Sequence Characteristics. 613-626
Web Technology and Software Engineering
- Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim:

Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization. 629-639

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














