12 results on '"Kim, Hyung‐Jong"'
Search Results
2. Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis
3. A Study on Privacy Preserving Data Leakage Prevention System
4. A Study on Mobile Cloud Anomaly Detection Model
5. The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation
6. Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks
7. NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack
8. Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction
9. DMKB : A Defense Mechanism Knowledge Base
10. Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies
11. Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis.
12. A Study on Mobile Cloud Anomaly Detection Model.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.