Search

Your search keyword '"Ieck-Chae Euom"' showing total 10 results

Search Constraints

Start Over You searched for: Author "Ieck-Chae Euom" Remove constraint Author: "Ieck-Chae Euom"
10 results on '"Ieck-Chae Euom"'

Search Results

1. V2TSA: Analysis of Vulnerability to Attack Techniques Using a Semantic Approach

2. Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations

3. Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach

4. Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in Industrial Internet of Things Operation

5. Vulnerabilities of Live-Streaming Services in Korea

6. Delegation-Based Personal Data Processing Request Notarization Framework for GDPR Based on Private Blockchain

7. ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files

9. Delegation-Based Personal Data Processing Request Notarization Framework for GDPR Based on Private Blockchain

10. ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files

Catalog

Books, media, physical & digital resources