Convergence security systems

被引:3
作者
Oh, Sang-Yeob [1 ]
Ghose, Supratip [2 ]
Jeong, Yu-Keum [3 ]
Ryu, Joong-Kyung [4 ]
Han, Jungsoo [5 ]
机构
[1] Gachon Univ, Dept Interact Media, Songnam, South Korea
[2] Univ Informat Technol & Sci, Dept Comp Sci & Engn, Dhaka, Bangladesh
[3] Soc Digital Policy & Management, Strategy Dept, Seoul, South Korea
[4] Daelim Univ, Dept Comp Software, Anyang, South Korea
[5] Baekseok Univ, Informat & Commun Div, Cheonan, South Korea
来源
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES | 2015年 / 11卷 / 03期
关键词
D O I
10.1007/s11416-015-0248-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:119 / 121
页数:3
相关论文
共 14 条
[1]   Recent trends in interactive multimedia computing for industry [J].
Boutaba, Raouf ;
Chung, Kyung-Yong ;
Gen, Mitsuo .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2014, 17 (03) :723-726
[2]   Study on model fostering for cloud service brokerage [J].
Choi, Sung .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (03) :181-192
[3]   Recent Trends in Digital Convergence Information System Preface [J].
Chung, Kyungyong ;
Boutaba, Raouf ;
Hariri, Salim .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) :2409-2413
[4]   Reconfigurable real number field elliptic curve cryptography to improve the security [J].
Goo E.-H. ;
Lee S.-D. .
Journal of Computer Virology and Hacking Techniques, 2015, 11 (03) :123-128
[5]   Distributed hybrid P2P networking systems [J].
Han, Jungsoo .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) :555-556
[6]   Efficient and secure DNS cyber shelter on DDoS attacks [J].
Hong S. .
Journal of Computer Virology and Hacking Techniques, 2015, 11 (03) :129-136
[7]   An efficient thread partition policy for secure functional language [J].
Jo, SunMoon ;
Chung, Kyungyong .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (03) :165-171
[8]   Recent trends on high-performance computing and security [J].
Kim, Jong-Hun ;
Ryu, Joong-Kyung .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (02) :207-208
[9]   Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures [J].
Kim J.-H. ;
Lee K.-H. .
Journal of Computer Virology and Hacking Techniques, 2015, 11 (03) :143-148
[10]  
Kim Y.T., 2015, J COMPUT VIROL HACKI, DOI [10.1007/s11416-014-0236-5, DOI 10.1007/S11416-014-0236-5]