International Conference on IT Convergence and Security最新文献

筛选
英文 中文
A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker 基于Web服务元代理的元数据提取与存储研究
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-2911-7_43
Sungho Sim, Young-Jae Song
{"title":"A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker","authors":"Sungho Sim, Young-Jae Song","doi":"10.1007/978-94-007-2911-7_43","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_43","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129153561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Approximate Pattern Mining Based on Probabilistic and Statistical Techniques 基于概率和统计技术的近似模式挖掘性能评价
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-5860-5_115
Unil Yun, Gwangbum Pyun, Sung-Jin Kim
{"title":"Performance Evaluation of Approximate Pattern Mining Based on Probabilistic and Statistical Techniques","authors":"Unil Yun, Gwangbum Pyun, Sung-Jin Kim","doi":"10.1007/978-94-007-5860-5_115","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_115","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient High-Speed Traffic Control Scheme for Real-Time Multimedia Applications in Wireless Networks 无线网络中实时多媒体应用的一种高效高速流量控制方案
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-5860-5_78
Moonsik Kang
{"title":"An Efficient High-Speed Traffic Control Scheme for Real-Time Multimedia Applications in Wireless Networks","authors":"Moonsik Kang","doi":"10.1007/978-94-007-5860-5_78","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_78","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115404263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multihoming-Based Vertical Handover Scheme 一种基于多导的垂直切换方案
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-5860-5_89
Hee-Dong Park, K. Park
{"title":"A Multihoming-Based Vertical Handover Scheme","authors":"Hee-Dong Park, K. Park","doi":"10.1007/978-94-007-5860-5_89","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_89","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114513069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of Transducer Interface Agent and its Protocol for WSN Middleware WSN中间件传感器接口代理及其协议设计
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-5860-5_80
Surgwon Sohn
{"title":"Design of Transducer Interface Agent and its Protocol for WSN Middleware","authors":"Surgwon Sohn","doi":"10.1007/978-94-007-5860-5_80","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_80","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Implementation and Experiment of Wireless Attack Emulator on Windows Environment Windows环境下无线攻击仿真器的实现与实验
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1109/ICITCS.2013.6717803
Doyoung Chung, Sokjoon Lee, Sin-Hyo Kim
{"title":"An Implementation and Experiment of Wireless Attack Emulator on Windows Environment","authors":"Doyoung Chung, Sokjoon Lee, Sin-Hyo Kim","doi":"10.1109/ICITCS.2013.6717803","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717803","url":null,"abstract":"As a wireless mobile communication technology has been improved, the WLAN technology is widely spread. On the other hand, the threat on WLAN has been gradually increased. Thus, finding vulnerabilities in the WLAN network is important for an administrator. In this paper, we propose WLAN attack emulator and its results. Our new attack emulator supports more various attack type than a previous attack emulator and also runs in windows OS while the previous one only runs in Linux OS. With these two improvements, this emulator would allow administrator to find out the vulnerabilities in his own network easily.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114906235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design of WSN Model to Minimize Data-Centric Routing Cost for Many-to-Many Communication 多对多通信中以数据为中心路由开销最小的WSN模型设计
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-5860-5_72
A. Hosen, Gihwan Cho
{"title":"A Design of WSN Model to Minimize Data-Centric Routing Cost for Many-to-Many Communication","authors":"A. Hosen, Gihwan Cho","doi":"10.1007/978-94-007-5860-5_72","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_72","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"21 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126945048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ubiquitous Logistics Management in the Steel Industry 钢铁行业的泛在物流管理
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-5860-5_35
Sang-Young Lee, Yoon-Seok Lee
{"title":"Ubiquitous Logistics Management in the Steel Industry","authors":"Sang-Young Lee, Yoon-Seok Lee","doi":"10.1007/978-94-007-5860-5_35","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_35","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127513988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An MMU Virtualization for Embedded Systems 嵌入式系统的MMU虚拟化
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-5860-5_29
Sung-Hoon Son
{"title":"An MMU Virtualization for Embedded Systems","authors":"Sung-Hoon Son","doi":"10.1007/978-94-007-5860-5_29","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_29","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collective Intelligence Based Algorithm for Ranking Book Reviews 基于集体智能的书评排序算法
International Conference on IT Convergence and Security Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-5860-5_129
Heungmo Ryang, Unil Yun
{"title":"Collective Intelligence Based Algorithm for Ranking Book Reviews","authors":"Heungmo Ryang, Unil Yun","doi":"10.1007/978-94-007-5860-5_129","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_129","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信