Abdikarim Hussein Elmi, S. Ibrahim, R. Sallehuddin
{"title":"Detecting SIM Box Fraud Using Neural Network","authors":"Abdikarim Hussein Elmi, S. Ibrahim, R. Sallehuddin","doi":"10.1007/978-94-007-5860-5_69","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_69","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130835185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Non-Volatile Buffered Main Memory Using Phase-Change RAM","authors":"Do-Heon Lee, Chung-Pyo Hong, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_53","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_53","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Interfacing Adapter for PRAM Based Main Memory via Flexible Management DRAM Buffer","authors":"Mei-Ying Bian, Su-Kyung Yoon, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_148","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_148","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127700014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient DRAM Converter for Non-Volatile Based Main Memory","authors":"Sung-In Jang, Cheong-Ghil Kim, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_49","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_49","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method","authors":"A. Kim, W. Park, Dong Hoon Lee","doi":"10.1007/978-94-007-5860-5_12","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_12","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129067811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Won, Gun Kim, S. Jung, Jung Won Park, Do Hak Kim, Moonok Kim
{"title":"Local Deformed Diameter Analysis of a Pipe in Rigid Encasement for Water-crossings Application","authors":"J. Won, Gun Kim, S. Jung, Jung Won Park, Do Hak Kim, Moonok Kim","doi":"10.1007/978-94-007-5860-5_137","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_137","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yeong-Kyu Lim, Cheong-Ghil Kim, Min-Suk Lee, Shin-Dug Kim
{"title":"The Stack Allocation Technique on Android OS","authors":"Yeong-Kyu Lim, Cheong-Ghil Kim, Min-Suk Lee, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_86","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_86","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131400354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Personalized Service Provision Scheme for Ubiquitous Computing Environment","authors":"Chung-Pyo Hong, Cheong-Ghil Kim, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_83","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_83","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124673131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design and Implementation of Improved Anti-Collision Algorithm for Vehicle User Authentication System","authors":"Kyeong-Seob Kim, Yun-Sub Lee, Sangbang Choi","doi":"10.1007/978-94-007-5860-5_31","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_31","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125540052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Anonymity in Syria, Challenges and Solution","authors":"T. Eissa, Gihwan Cho","doi":"10.1007/978-94-007-5860-5_21","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_21","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}