103 results on '"Geuk Lee"'
Search Results
2. New Electronic Acupuncture System Using Intelligence.
3. A Conceptual Study on the Analytical Process of Information for Crisis Monitoring and Response.
4. A Design of Safety Multimedia Packet Transmission DB System Management Scheme.
5. PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences.
6. Smart Acupuncture System Using Intelligence.
7. Efficient Common Radio Resource Management Techniques for Cloud Systems.
8. Abnormal Traffic Detection System of VoIP Based on SIP.
9. Implementation of Smart Car Using Fuzzy Rules.
10. Malicious Software Detection System in a Virtual Machine Using Database.
11. Smart Pulse Wave Detection System Using Intelligence.
12. A study on intrusion protection techniques against Linux kernel backdoor.
13. Study of Optimal Traffic Information Using Agents Techniques.
14. Security and Test Environment for SIP.
15. Entity Based Message Authentication System.
16. Traffic Signal Planning Using a Smart Agent System.
17. The Design and Testing of Automated Signature Generation Engine for Worms Detection.
18. A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems.
19. A Vulnerability Assessment Tool Based on OVAL in System Block Model.
20. A Study on the Improvement of Military Logistics System Using RFID.
21. Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function.
22. Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment.
23. Design of DRM-LMS Model in M-Learning Environment.
24. A Design of Network Traffic Analysis and Monitoring System for Early Warning System.
25. Scheme for the Information Sharing Between IDSs Using JXTA.
26. A Development of Intrusion Detection and Protection System Using Netfilter Framework.
27. Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization.
28. Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL.
29. A Vulnerability Assessment Tool Based on OVAL in Linux System.
30. Network Intrusion Protection System Using Rule-Based DB and RBAC Policy.
31. Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment.
32. Structure design and test of enterprise security management system with advanced internal security.
33. Special issue on intelligent and autonomous systems.
34. Website Forgery/Falsification Detection System Using Images
35. An Extension of BGP Algorithm for End-to-End Traffic Engineering
36. Electroacupuncture System using Fuzzy Rules
37. Intrusion Prevention Method on LKM (Loadable Kernel Module) Backdoor Attack
38. Website Forgery Falsification Detection Technique using Hyperlink Information
39. Fuzzy Based Personal Color System
40. Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment
41. Structure design and test of enterprise security management system with advanced internal security
42. Schemes for Indoor Network Synchronization in UWB Positioning
43. DDoS Prevention System Using Multi-Filtering Method
44. Convergence and Hybrid Information Technology : 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings
45. Convergence and Hybrid Information Technology : 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings
46. PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences
47. A Design of Safety Multimedia Packet Transmission DB System Management Scheme
48. New Electronic Acupuncture System Using Intelligence
49. Smart Acupuncture System Using Intelligence
50. A Conceptual Study on the Analytical Process of Information for Crisis Monitoring and Response
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.