Digital Library


Search: "[ keyword: Analysis ]" (294)
    Methodology of Analyze the Risk Using Method of Determinated Quantity
    Joong Gil Park The KIPS Transactions:PartC, Vol. 13, No. 7, pp. 851-858, Dec. 2006
    10.3745/KIPSTC.2006.13.7.851


    Delay and Channel Utilization Analysis of IEEE 802.12 VG-AnyLAN Medium Access Control under the Homogeneous Traffic Condition
    Gi Ho Joo The KIPS Transactions:PartC, Vol. 13, No. 5, pp. 567-574, Oct. 2006
    10.3745/KIPSTC.2006.13.5.567


    Experimentation and Analysis of SCTP Throughput by Multi-homing
    Seok Joo Koh , Jong Shik Ha The KIPS Transactions:PartC, Vol. 13, No. 2, pp. 235-240, Apr. 2006
    10.3745/KIPSTC.2006.13.2.235


    A Study on the Modeling Mechanism for Security Risk Analysis in Information Systems
    In Jung Kim , Young Gyo Lee , Yoon Jung Chung , Dong Ho Won The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 989-998, Dec. 2005
    10.3745/KIPSTC.2005.12.7.989


    A Performance Comparison of On-Demand Routing Protocols for Application Services in MANET
    Jun Young Jang , Kil Sup Lee , Sung Jong Lee The KIPS Transactions:PartC, Vol. 11, No. 7, pp. 871-878, Dec. 2004
    10.3745/KIPSTC.2004.11.7.871


    Performance Analysis of Packet Sampling Mechanisms for DDoS Attack Detection
    Kil Soo Kang , Joon Hee Lee , Kyung Hee Choi , Gi Hyun Jung , Jae Hong Shim The KIPS Transactions:PartC, Vol. 11, No. 6, pp. 711-718, Dec. 2004
    10.3745/KIPSTC.2004.11.6.711


    An Extension of Data Flow Analysis for Detecting Polymorphic Script Virus
    Kim Cheol Min , Lee Hyeong Jun , Lee Seong Ug , Hong Man Pyo The KIPS Transactions:PartC, Vol. 10, No. 7, pp. 843-850, Dec. 2003
    10.3745/KIPSTC.2003.10.7.843


    Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems
    Yu Il Seon , Lee Dong Lyeon , O Eun Sug The KIPS Transactions:PartC, Vol. 10, No. 5, pp. 565-574, Oct. 2003
    10.3745/KIPSTC.2003.10.5.565


    A New Dynamic Bandwidth Assignment Algorithm for Ethernet-PON
    Jang Seong Ho , Jang Jong Ug The KIPS Transactions:PartC, Vol. 10, No. 4, pp. 441-446, Aug. 2003
    10.3745/KIPSTC.2003.10.4.441


    A Study on Business Process Based Asset Evaluation Model and Methodology for Efficient Security Management over Telecommunication Networks
    U Byeong Gu , Lee Gang Su , Jeong Tae Myeong The KIPS Transactions:PartC, Vol. 10, No. 4, pp. 423-432, Aug. 2003
    10.3745/KIPSTC.2003.10.4.423