Limit search to available items
158 results found. Sorted by relevance | date | title .
Book Cover

Title IT convergence and security 2012 / Kuinam J. Kim, Kyung-Yong Chung, editors
Published Dordrecht ; New York : Springer, [2013]
Online access available from:
Springer eBooks    View Resource Record  


Description 1 online resource
Series Lecture notes in electrical engineering, 1876-1100 ; v. 215
Lecture notes in electrical engineering ; v. 215
Contents Security Fundamentals -- Development of an Automatic Document Malware Analysis System / Hong-Koo Kang, Ji-Sang Kim, Byung-Ik Kim, Hyun-Cheol Jeong -- Study of Behavior-Based High Speed Visit/Inspection Technology to Detect Malicious Websites / Ji-Sang Kim, Hong-Koo Kang, Hyun-Cheol Jeong -- One-Way Hash Function Based on Cellular Automata / Jun-Cheol Jeon -- A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory / Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof -- Forensic Evidence Collection Procedures of Smartphone in Crime Scene / Jeong-Hyun Lim, Chang-Woo Song, Kyung-Yong Chung, Ki-Wook Rim, Jung-Hyun Lee -- NAC System Analysis and Design for Improvement Model / Seung-Jae Yoo, Jeong-Mo Yang, Hwan-Seok Yang -- Industrial & Business Information Security -- Analysis of Methods for Detecting Compromised Nodes and its Countermeasures / Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai -- Protecting Advertisers Against Click Frauds / Rattikorn Hewett, Abhishek Agarwal
A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS) / Seondong Heo, Jungmin Lim, Minsoo Lee, Soojin Lee, Hyunsoo Yoon -- Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment / Dong-Hwi Lee, Kyong-Ho Choi -- A Study About Security Awareness Program Based on RFID Access Control System / Kyong-Ho Choi, DongHwi Lee -- A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method / Ae Chan Kim, Won Hyung Park, Dong Hoon Lee -- An Investigation on the Research Topics in Relation to Information Systems in Supply Chain Management / Younjung Kim, Young-Ho Lee, Kyung-Yong Chung, Kang-Dae Lee -- Designing a Model for Context Awareness Based Reliable Auction-Recommending System (CARARS) by Utilizing Advanced Information / Hwa-Jin Park, Sang-Beom Kim -- Security Protocols and Applications -- A Secure Self-Encryption Scheme for Resource Limited Mobile Devices / Yongjoo Shin, Seungjae Shin, Minsoo Kim, Hyunsoo Yoon
A Study on the Network Stability Measurement Based on an Articulation Nodes with Weight Value / Myung-Ki Jung, Seongjin Ahn -- An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- An Identity-Based Ring Signcryption Scheme / Gaurav Sharma, Suman Bala, Anil K. Verma -- A Secure DS-CDMA Technique with Capacity Enhancement for Ad Hoc Wireless Networks / Muhammad Zeeshan, Shoab Ahmed Khan, Muhammad Yasir Malik -- A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent / Geon II Heo, Nam Hun Kim, Ah Ra Jo, Sae In Choi, Won Hyung Park -- Internet Anonymity in Syria, Challenges and Solution / T. Eissa, Gi-hwan Cho -- Convergence Security -- Comparison of Attacks and Security Analyses for Different RFID Protocols / Jung Tae Kim -- Honeypot Using Dynamic Allocation Technique with IP Scan / Hwan-Seok Yang -- Attribute-Based Encryption for Commercial Content Distribution / Hyoseung Kim, Seunghwan Park, Jong Hwan Park, Dong Hoon Lee
IT Convergence Applications -- Sensibility Extraction for Bicycle Design Using RFID Tag-Attached Crayons / Ho-Ill Jung, Seung-Jin Lee, Jeong-Hoon Kang, Min-Hyun Kim, Jong-Wan Kim, Bo-Hyun Lee -- Efficient Handover Schemes for Railroad Communications in 4G Mobile Networks / Ronny Yongho Kim, Baik Kim -- Cyber Threat Prediction Model Using Security Monitoring System Event / Neo Park, Won Hyung Park -- A Study for Car Insurance Service Using Vehicle Real Time Information / Yong-Yoon Shin, Byung-Yun Lee -- An MMU Virtualization for Embedded Systems / Sung-Hoon Son -- The Design and Implementation of Start Stop System with Multi-Protocol in Automotive Smart Key System / Kyeong-Seob Kim, Yun-Sub Lee, In-Seong Song, Sang-Bang Choi -- The Design and Implementation of Improved Anti-Collision Algorithm for Vehicle User Authentication System / Kyeong-Seob Kim, Yun-Sub Lee, Sang-Bang Choi -- Multi-Port Register File Design and Implementation for the SIMD Programmable Shader / Kyeong-Seob Kim, Yun-Sub Lee, Sang-Bang Choi
Design Exploration Technique for Software Component Mapping of AUTOSAR Development Methodology / Kabsu Han, Jeonghun Cho -- Interoperability and Control Systems for Medical Cyber Physical Systems / Min-Woo Jung, Jeonghun Cho -- Ubiquitous Logistics Management in the Steel Industry / Sang-Young Lee, Yoon-Seok Lee -- Performance Evaluation of Train Propulsion Control on Ethernet Network Using TrueTime / Hyeon-Chyeol Hwang, Yong-Kuk Oh, Ronny Yongho Kim -- Intelligent Control System for Railway Level Crossing Safety / Bong-Kwan Cho, Sang-Hwan Ryu, Hyeon-Chyeol Hwang, Seoung-Chon Koh, Do-Hyeon Lee -- Moving Average Estimator Least Mean Square Using Echo Cancellation Algorithm / Sang-Yeob Oh, Chan-Shik Ahn -- An Abrupt Signal Detection as Accident Detection by Hamiltonian Eigenvalue on Highway CCTV Traffic Signal / In Jeong Lee -- Implementation of Improved DPD Algorithm Using the Approximation Hessian Technique and an Adaptive Filter / Jeong-Seok Jang, Gyong-Hak Lee
Summary The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security
Analysis Engineering
Computer Communication Networks
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
Bibliography Includes bibliographical references
Subject Information technology.
Multimedia systems.
Computer security.
Computer networks -- Security measures.
Telecommunication systems -- Security measures.
Form Electronic book
Author Kim, Kuinam J.
Chung, Kyung-Yong.
LC no. 2012953016
ISBN 940075860X (electronic bk.)
9789400758605 (electronic bk.)