default search action
ICITCS 2011: Suwon, Korea
- Kuinam J. Kim, Seong-Jin Ahn:
Proceedings of the International Conference on IT Convergence and Security, ICITCS 2011, Suwon, Korea, December 14-16, 2011. Lecture Notes in Electrical Engineering 120, Springer 2012, ISBN 978-94-007-2910-0
Security Fundamentals
- Gi-Hwan Cho, Seung-Ah Lee:
A Secure Service Framework for Handling Security Critical Data on the Public Cloud. 3-12 - Hun Choi, Yoo-Jung Choi, Ki-Mun Kim:
The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' Motivation. 13-20 - Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad:
Towards Understanding Deterrence: Information Security Managers' Perspective. 21-37
Industrial & Business Information Security
- ByungRae Cha, JaeHyun Seo, JongWon Kim:
Design of Attribute-Based Access Control in Cloud Computing Environment. 41-50 - André van Cleeff, Trajce Dimkov, Wolter Pieters, Roel J. Wieringa:
Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. 51-67 - Yi-Chang Hsu, Jing-Jang Hwang:
Controlling Decryption of Personal Health Records in the Cloud. 69-79 - Sun-Moon Jo, Kyung-Yong Chung:
Access Control Mechanism for XML Document. 81-90 - Man Doan Nguyen, Eui-Nam Huh:
A Collaborative Intrusion Detection System Framework for Cloud Computing. 91-109 - Hyung-Jun Seo, Yoon-Cheol Choy:
Criteria for Comparing Cyberwarfare Capability. 111-120
Security Protocols and Applications
- Hyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rhee, June-Hwan Lee:
A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor. 123-127 - Muhammad Arshad Awan, Abdul Sattar, Cheong Ghil Kim, Chung-Pyo Hong, Shin-Dug Kim:
Semantic Search and Retrieval System for Learning Objects. 129-143 - Inhwan Choi, Dongkun Shin:
Wear Leveling for PCM Using Hot Data Identification. 145-149 - Byung Ki Kim, Jae Hyeok Jang, Kyung Woo Hur, Jeong-Gun Lee, Young Woong Ko:
Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine. 151-161 - Young-Joon Jang, Dongkun Shin:
HARD: Host-Level Address Remapping Driver for Solid-State Disk. 163-168 - Jong-Hun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Lee, Kyung-Yong Chung:
Ubiquitous Based Personalized Hypertension Monitoring System. 169-177 - Si-Jung Kim, Do-Eun Cho, Bong-Han Kim:
Customized IPTV Content Recommendation Service Model Based on Personal Preference. 179-189 - Yeong-Gyu Lim, Cheong Ghil Kim, Shin-Dug Kim:
A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread. 191-204 - Nam-Kyung Lee, Hyun-Woo Lee, Won Ryu:
Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform Environment. 205-216 - Seung-Hyung Lee, Young-Jae Song:
Aspect Oriented Software Development Using Requirement Engineering. 217-221 - Yao Meng, Hee-Cheol Kim:
A Review of Accelerometer-Based Physical Activity Measurement. 223-237 - Ju-Geon Pak, Kee-Hyun Park:
A Group Data Synchronization Protocol in Mobile Environments. 239-251 - Kee-Hyun Park, Ju-Geon Pak:
Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics. 253-263
Convergence Security
- In-Pyo Cho, So-Hyang Ko, Hoon-Mo Yang, Cheong-Ghil Kim, Shin-Dug Kim:
A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications. 267-279 - Chung-Pyo Hong, Muhammad Arshad Awan, Cheong-Ghil Kim, Shin-Dug Kim:
An Efficient Live Stream Community Management Scheme for the Mobile. 281-293 - Sung-Kwan Kang, Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee:
Development of Real-Time Gesture Recognition System Using Visual Interaction. 295-306 - Abdul Raouf Khan:
Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata. 307-315 - Gui-Jung Kim, Jung-Soo Han:
Simulation of 3D Information Visualization. 317-323 - Kyu Chul Kim, Chan Jung Park, Ronny Yongho Kim:
Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks. 325-329 - Sung-Ho Kim:
Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System. 331-335 - Sukhyun Lim, Hyung-Keun Jee, Jinyoung Youn, Junsuk Lee:
Augmented Reality-Based Role-Playing Contents for Education. 337-344 - Eun-Seok Lee, Jin-Hee Lee, Inwoo Jo, Byeong-Seok Shin:
Vertex Propagation for Fast Ray-Casting of Digital Elevation Model. 345-356 - Kyuho Lee, Seongjin Ahn:
A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization. 357-365 - Jae-Young Lee, Kee-Baek Kim, Seok-Han Lee, Tae-eun Kim, Jong-Soo Choi:
Image Registration for Sub-Pixel Using Pyramid Edge Images. 367-371 - Ahr-Hyun Lee, Seok-Han Lee, Jae-Young Lee, Tae-eun Kim, Jong-Soo Choi:
Real-Time Camera Tracking Using Planar Object Detection. 373-378 - Reza Malekian, Abdul Hanan Abdullah:
Bidirectional Propagation Method for Analysis of Reflection on Radio Networks. 379-388 - Sang-Wook Park, Tae-eun Kim, Jong-Soo Choi:
Robust Estimation of Heights of Moving People Using a Single Camera. 389-405
IT Convergence Applications
- Su-Jin Baek, Jong-Won Ko, Gui-Jung Kim, Jung-Soo Han, Young-Jae Song:
Goal-Heuristic Analysis Method for an Adaptive Process Mining. 409-418 - Su-Jin Baek, Jung-Soo Han, Young-Jae Song:
Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario. 419-423 - Sang-Jin Cha, Gahee Kim, Chol-Hee Jang, GeunSik Jo:
An Effective Learning Method in Art Using Virtual Reality and Ontology. 425-434 - Hyun Yoo, Hoill Jung, Kyung-Yong Chung:
Development of Pain Prescription Decision Systems for Nursing Intervention. 435-444 - Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee:
Performance Sensibility Influence of Recommended Makeup Styles. 445-454 - Hyun-Jun Kim:
Affective Social Network. 455-461 - Sung-Ho Sim, Young-Jae Song:
A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker. 463-467 - Hyun-Jun Kim:
Discovering Knowledge Flow in Social Network. 469-477 - Jong-Won Ko, Su-Jin Baek, Young-Jae Song:
Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification. 479-487 - Jong-Won Ko, Jung-Soo Han, Young-Jae Song:
Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification. 489-493 - Eunsoon You, Seung-Bo Park:
Improved Performance of Emotion Extraction Through Banned Words. 495-505 - Seung-Bo Park, Eunsoon You, Jason J. Jung:
Potential Emotion Word in Movie Dialog. 507-516 - Seung-Bo Park, Eunsoon You:
Story Modeling for Green Light Decision Making. 517-521 - Hamid Mcheick, Mohamad Dbouk, Fady Dagher:
Reducing the Gap of Provided Services and Requires Services Based on Service Approach. 523-537 - Tanakorn Wichaiwong, Chuleerat Jaruskulchai:
An Extended XML Compression Technique for XML Element Retrieval. 539-554
Mobile Computing and Future Networks
- Sunhoe Kim:
Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System. 557-560 - Sunhoe Kim:
Types of Fuel Cells and Applications for Electricity and Heat Co-Generation. 561-565 - Yoon-Sik Yoo, Wan-Ki Park, Il-Woo Lee:
Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment. 567-572
Multimedia and Information Visualization
- Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof:
Malware Detection Techniques Using Artificial Immune System. 575-587 - Kyoung-Soo Han, Eul Gyu Im:
A Survey on P2P Botnet Detection. 589-593 - Kyoung-Soo Han, Kyoung-Yong Chung, Eul Gyu Im:
A Study on Instruction Substitution Analysis of Metamorphic Malware. 595-599 - Eul Gyu Im, Kyoung-Soo Han:
An Analysis of Malware Attached in Spam. 601-605 - Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im:
Detection Methods for Malware Variant Using API Call Related Graphs. 607-611 - Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im:
Malware Classification Methods Using API Sequence Characteristics. 613-626
Web Technology and Software Engineering
- Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim:
Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization. 629-639
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.