103 results on '"Geuk Lee"'
Search Results
2. New Electronic Acupuncture System Using Intelligence.
3. A Conceptual Study on the Analytical Process of Information for Crisis Monitoring and Response.
4. A Design of Safety Multimedia Packet Transmission DB System Management Scheme.
5. PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences.
6. Smart Acupuncture System Using Intelligence.
7. Efficient Common Radio Resource Management Techniques for Cloud Systems.
8. Abnormal Traffic Detection System of VoIP Based on SIP.
9. Implementation of Smart Car Using Fuzzy Rules.
10. Malicious Software Detection System in a Virtual Machine Using Database.
11. Smart Pulse Wave Detection System Using Intelligence.
12. A study on intrusion protection techniques against Linux kernel backdoor.
13. Study of Optimal Traffic Information Using Agents Techniques.
14. Security and Test Environment for SIP.
15. Entity Based Message Authentication System.
16. Traffic Signal Planning Using a Smart Agent System.
17. The Design and Testing of Automated Signature Generation Engine for Worms Detection.
18. A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems.
19. A Vulnerability Assessment Tool Based on OVAL in System Block Model.
20. A Study on the Improvement of Military Logistics System Using RFID.
21. Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function.
22. Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment.
23. Design of DRM-LMS Model in M-Learning Environment.
24. A Design of Network Traffic Analysis and Monitoring System for Early Warning System.
25. Scheme for the Information Sharing Between IDSs Using JXTA.
26. A Development of Intrusion Detection and Protection System Using Netfilter Framework.
27. Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization.
28. Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL.
29. A Vulnerability Assessment Tool Based on OVAL in Linux System.
30. Network Intrusion Protection System Using Rule-Based DB and RBAC Policy.
31. Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment.
32. Structure design and test of enterprise security management system with advanced internal security.
33. Special issue on intelligent and autonomous systems.
34. Website Forgery/Falsification Detection System Using Images
35. An Extension of BGP Algorithm for End-to-End Traffic Engineering
36. Electroacupuncture System using Fuzzy Rules
37. Intrusion Prevention Method on LKM (Loadable Kernel Module) Backdoor Attack
38. Website Forgery Falsification Detection Technique using Hyperlink Information
39. Fuzzy Based Personal Color System
40. Schemes for Indoor Network Synchronization in UWB Positioning
41. DDoS Prevention System Using Multi-Filtering Method
42. Convergence and Hybrid Information Technology : 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings
43. Convergence and Hybrid Information Technology : 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011, Proceedings
44. Personal Color Decision System Using Fuzzy Logic
45. A Safe AODV (Ad Hoc On-Demand Distance Vector) Security Routing Protocol
46. Development of Fault Detection System in Air Handling Unit
47. Development of Internet Phone (VoIP) for Voice Security on VPN Environment
48. Advances in Hybrid Information Technology
49. Schemes for Indoor Network Synchronization in UWB Positioning
50. An operation efficiency analysis on breadth first quadtree
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.