- 요약
- ABSTRACT
- Ⅰ. 서론
- Ⅱ. 관련 연구
- Ⅲ. 상황 인지 및 MDM 기술을 이용한 제안 기법
http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
https://www.riss.kr/link?id=A99886234
2014
Korean
567
KCI등재
학술저널
1-8(8쪽)
1
0
상세조회0
다운로드목차 (Table of Contents)
참고문헌 (Reference)
1 J. Burke, "Wireless security attacks and defense"
2 D. Monica, "WiFiHop -mitigating the evil twin attack through multi-hop detection" 21-39, 2011
3 Y. Song, "Who is peeping at your passwords at starbucks? - To catch an evil twin access point" 323-332, 2010
4 P. Bhatia, "Solution to the wireless evil-twin transmitter attack" 1-7, 2010
5 F. Guo, "Sequence number-based MAC address spoof detection" 309-329, 2005
6 K. Rhee, "Security test methodology for an agent of a mobile device management system" 6 (6): 2012
7 S. Shetty, "Rogue access point detection by analyzing network traffic characteristics" 1-7, 2007
8 S. K. Park, "Propulsion systems and practices for smart work(스마트워크 추진체계 및 사례)" 29 (29): 3-9, 2012
9 S. Jana, "On fast and accurate detection of unauthorized wireless access points using clock skews" 9 (9): 449-462, 2010
10 A. Scarfo, "New security perspectives around BYOD" 446-451, 2012
1 J. Burke, "Wireless security attacks and defense"
2 D. Monica, "WiFiHop -mitigating the evil twin attack through multi-hop detection" 21-39, 2011
3 Y. Song, "Who is peeping at your passwords at starbucks? - To catch an evil twin access point" 323-332, 2010
4 P. Bhatia, "Solution to the wireless evil-twin transmitter attack" 1-7, 2010
5 F. Guo, "Sequence number-based MAC address spoof detection" 309-329, 2005
6 K. Rhee, "Security test methodology for an agent of a mobile device management system" 6 (6): 2012
7 S. Shetty, "Rogue access point detection by analyzing network traffic characteristics" 1-7, 2007
8 S. K. Park, "Propulsion systems and practices for smart work(스마트워크 추진체계 및 사례)" 29 (29): 3-9, 2012
9 S. Jana, "On fast and accurate detection of unauthorized wireless access points using clock skews" 9 (9): 449-462, 2010
10 A. Scarfo, "New security perspectives around BYOD" 446-451, 2012
11 W. Wei, "Identifying 802.11 traffic from passive measurements using iterative bayesian inference" 1-12, 2006
12 H. Kim, "CAMUS - a middleware supporting context-aware services for network-based robots" 237-242, 2005
13 AirTight Networks, "AirTight white paper" 2012
14 AirDefense, "AirDefense white paper" 2011
15 J. Byun, "A smart energy distribution and management system for renewable energy distribution and context-aware services based on user patterns and load forecasting" 57 (57): 2011
Link Dimensioning for Multiplexed M2M Traffic
최소자승법을 적용한 이동객체 위치인식 보정 알고리즘 성능분석
협동교전능력을 위한 자료융합 구조와 비선형 통계적 트랙 융합 기법
국방용 감시카메라를 위한 적응적 영상화질 개선 알고리즘
학술지 이력
연월일 | 이력구분 | 이력상세 | 등재구분 |
---|---|---|---|
2015-01-01 | 평가 | 학술지 통합(등재유지) | |
2014-11-07 | 학술지명변경 | 한글명 : 한국통신학회논문지C</br>외국어명 : The Journal of Korean Institute of Communications and Information Sciences C | |
2014-08-08 | 학술지명변경 | 한글명 : 한국통신학회논문지C</br>외국어명 : The Journal of the Korean Institute of Communication Science C | |
2014-08-08 | 학술지명변경 | 한글명 : 한국통신학회논문지C</br>외국어명 : The Journal of the Korean Institute of Communication Science C | |
2003-01-01 | 평가 | 등재학술지 선정(등재후보2차) | |
2001-01-01 | 평가 | 등재후보학술지 선정(신규평가) |