Digital Library


Search: " keyword: ECU" (258)
    Security Analysis on Password Authentication System of Web Sites
    Hee Kyeong Noh , Chang Kuk Choi , Min Su Park , Seung Joo Kim KIPS Transactions on Software and Data Engineering, Vol. 3, No. 12, pp. 463-478, Dec. 2014
    10.3745/KTCCS.2014.3.12.463


    A Study for Task Detection Acquiring Abnormal Permission in Linux
    Won Il Kim , Sang Hyun Yoo , Ju Hyun Kwak , Chang Hoon Lee KIPS Transactions on Software and Data Engineering, Vol. 3, No. 11, pp. 427-432, Nov. 2014
    10.3745/KTCCS.2014.3.11.427


    A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment
    Jeong Hyo Park , Kim Nak Hyun , Yong Hoon Jung , Moon Seog Jun KIPS Transactions on Software and Data Engineering, Vol. 3, No. 10, pp. 323-328, Oct. 2014
    10.3745/KTCCS.2014.3.10.323


    An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems
    Hyung Chan Kim , Il Hwan Park KIPS Transactions on Software and Data Engineering, Vol. 3, No. 2, pp. 31-42, Feb. 2014
    10.3745/KTCCS.2014.3.2.31


    Approximating the Convex Hull for a Set of Spheres
    Byung Joo Kim , Ku Jin Kim , Young J. Kim KIPS Transactions on Software and Data Engineering, Vol. 3, No. 1, pp. 1-6, Jan. 2014
    10.3745/KTCCS.2014.3.1.1


    A Study on the SmartPhone GPS based Graphical Password Approach
    Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun KIPS Transactions on Software and Data Engineering, Vol. 2, No. 12, pp. 525-532, Dec. 2013
    10.3745/KTCCS.2013.2.12.525


    Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack
    Kwang Il Jeong , Joon Ku Lee , Geun Ok Park KIPS Transactions on Software and Data Engineering, Vol. 2, No. 12, pp. 561-568, Dec. 2013
    10.3745/KTCCS.2013.2.12.561


    An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone
    Myong Hee Kim , Wildan Toyib KIPS Transactions on Software and Data Engineering, Vol. 2, No. 12, pp. 541-552, Dec. 2013
    10.3745/KTCCS.2013.2.12.541


    A Proposal for "Security Verification Method for Implementation of Secure Android Mobile Application"
    Hur Hwan Seok , Kang Sung Hoon , Kim Seung Joo KIPS Transactions on Software and Data Engineering, Vol. 2, No. 10, pp. 445-460, Oct. 2013
    10.3745/KTCCS.2013.2.10.445


    Security Check Scheduling for Detecting Malicious Web Sites
    Jae Yeong Choi , Sung Ki Kim , Byoung Joon Min KIPS Transactions on Software and Data Engineering, Vol. 2, No. 9, pp. 405-412, Sep. 2013
    10.3745/KTCCS.2013.2.9.405