International Conference on IT Convergence and Security最新文献

筛选
英文 中文
Detecting SIM Box Fraud Using Neural Network 利用神经网络检测SIM卡欺诈
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_69
Abdikarim Hussein Elmi, S. Ibrahim, R. Sallehuddin
{"title":"Detecting SIM Box Fraud Using Neural Network","authors":"Abdikarim Hussein Elmi, S. Ibrahim, R. Sallehuddin","doi":"10.1007/978-94-007-5860-5_69","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_69","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130835185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Non-Volatile Buffered Main Memory Using Phase-Change RAM 一种使用相变RAM的非易失缓冲主存储器
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_53
Do-Heon Lee, Chung-Pyo Hong, Shin-Dug Kim
{"title":"A Non-Volatile Buffered Main Memory Using Phase-Change RAM","authors":"Do-Heon Lee, Chung-Pyo Hong, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_53","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_53","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Interfacing Adapter for PRAM Based Main Memory via Flexible Management DRAM Buffer 一种基于PRAM的灵活管理DRAM缓冲的有效接口适配器
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_148
Mei-Ying Bian, Su-Kyung Yoon, Shin-Dug Kim
{"title":"An Effective Interfacing Adapter for PRAM Based Main Memory via Flexible Management DRAM Buffer","authors":"Mei-Ying Bian, Su-Kyung Yoon, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_148","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_148","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127700014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient DRAM Converter for Non-Volatile Based Main Memory 用于非易失性主存储器的高效DRAM转换器
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_49
Sung-In Jang, Cheong-Ghil Kim, Shin-Dug Kim
{"title":"An Efficient DRAM Converter for Non-Volatile Based Main Memory","authors":"Sung-In Jang, Cheong-Ghil Kim, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_49","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_49","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method 基于移动平均法的电子金融交易异常模式识别框架
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_12
A. Kim, W. Park, Dong Hoon Lee
{"title":"A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method","authors":"A. Kim, W. Park, Dong Hoon Lee","doi":"10.1007/978-94-007-5860-5_12","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_12","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129067811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Local Deformed Diameter Analysis of a Pipe in Rigid Encasement for Water-crossings Application 跨水用刚性壳体管道局部变形直径分析
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_137
J. Won, Gun Kim, S. Jung, Jung Won Park, Do Hak Kim, Moonok Kim
{"title":"Local Deformed Diameter Analysis of a Pipe in Rigid Encasement for Water-crossings Application","authors":"J. Won, Gun Kim, S. Jung, Jung Won Park, Do Hak Kim, Moonok Kim","doi":"10.1007/978-94-007-5860-5_137","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_137","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Stack Allocation Technique on Android OS Android操作系统下的栈分配技术
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_86
Yeong-Kyu Lim, Cheong-Ghil Kim, Min-Suk Lee, Shin-Dug Kim
{"title":"The Stack Allocation Technique on Android OS","authors":"Yeong-Kyu Lim, Cheong-Ghil Kim, Min-Suk Lee, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_86","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_86","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131400354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Effective Personalized Service Provision Scheme for Ubiquitous Computing Environment 普适计算环境下一种有效的个性化服务提供方案
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_83
Chung-Pyo Hong, Cheong-Ghil Kim, Shin-Dug Kim
{"title":"An Effective Personalized Service Provision Scheme for Ubiquitous Computing Environment","authors":"Chung-Pyo Hong, Cheong-Ghil Kim, Shin-Dug Kim","doi":"10.1007/978-94-007-5860-5_83","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_83","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124673131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Design and Implementation of Improved Anti-Collision Algorithm for Vehicle User Authentication System 车辆用户认证系统中改进的防碰撞算法的设计与实现
International Conference on IT Convergence and Security Pub Date : 2013-01-31 DOI: 10.1007/978-94-007-5860-5_31
Kyeong-Seob Kim, Yun-Sub Lee, Sangbang Choi
{"title":"The Design and Implementation of Improved Anti-Collision Algorithm for Vehicle User Authentication System","authors":"Kyeong-Seob Kim, Yun-Sub Lee, Sangbang Choi","doi":"10.1007/978-94-007-5860-5_31","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_31","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125540052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet Anonymity in Syria, Challenges and Solution 叙利亚的网络匿名,挑战和解决方案
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-5860-5_21
T. Eissa, Gihwan Cho
{"title":"Internet Anonymity in Syria, Challenges and Solution","authors":"T. Eissa, Gihwan Cho","doi":"10.1007/978-94-007-5860-5_21","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_21","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信