본문 바로가기
  • Home

2020, Vol.16, No.2

Similarity Detection in Object Codes and Design of Its Tool
Jang-Hee Yoo | 2020, 16(2) | pp.1~8 | number of Cited : 0
A Study on Injection Attacks and Defenses on Microsoft Windows
Ho Jun Seong , Jo Chang Yeon , Howoong Lee and 1 other persons | 2020, 16(2) | pp.9~23 | number of Cited : 1
A Study on the Adoption of Discovery in Copyright Litigation
Kim Si Yeol | 2020, 16(2) | pp.25~35 | number of Cited : 1
Analysis Method for Revision and Addition of the Specification to Appraisal
Byung-Tae Chun | 2020, 16(2) | pp.37~44 | number of Cited : 0
Detection of Source Code Security Vulnerabilities Using code2vec Model
Joon Hyuk Yang , Ji Hwan Mo , Sung-Moon Hong and 1 other persons | 2020, 16(2) | pp.45~52 | number of Cited : 1
Hybrid Trust Computational Model for M2M Application Services
Yukyong Kim | 2020, 16(2) | pp.53~62 | number of Cited : 0
Design and Implementation of a Face Authentication System
Lee, Seungik | 2020, 16(2) | pp.63~68 | number of Cited : 1
A Study on Determining the Optimal Time to Launch of Software Considering Error Correction Time
AHN, CHEOL-HOON | 2020, 16(2) | pp.69~76 | number of Cited : 0
Study on Distributed Ledger Technology using Thing-user Group Management of Network of Everything
SUYEON KIM , Kahng Hyun Kook | 2020, 16(2) | pp.77~85 | number of Cited : 0
The Study on the Software Safety Maturity Model using CMMI and TMMi
Seungmok Lee , Young-Gon Kim , Kyeong-Soo An | 2020, 16(2) | pp.87~98 | number of Cited : 1
A Study on Updated Object Detection and Extraction of Underground Information
KIM KWANG SOO , LEE,HYUNGSUB , Kim Juwan | 2020, 16(2) | pp.99~107 | number of Cited : 4
Analysis of Problems when Generating Negative Power for IT devices
Jun,Ho-Ik , Lee HyunChang | 2020, 16(2) | pp.109~115 | number of Cited : 2
Analysis of Gain and Frequency in a DFB laser with Cleaved Facets
Lee Changseok , Kwon Kee Young , Ki Jang Geun and 1 other persons | 2020, 16(2) | pp.117~125 | number of Cited : 2
Monitoring System for Optimized Power Management with Indoor Sensor
Do Hyeun Kim , LEE KYU TAE | 2020, 16(2) | pp.127~133 | number of Cited : 0
Iris Localization using the Pupil Center Point based on Deep Learning in RGB Images
YongSoo Choi , Jang-Hee Yoo | 2020, 16(2) | pp.135~142 | number of Cited : 0
Development of 3-State Blind Digital Watermark based on the Correlation Function
Chol Yong Soo | 2020, 16(2) | pp.143~151 | number of Cited : 0
Development of Digital Image Forgery Detection Method Utilizing LE(Local Effect) Operator based on L0 Norm
Chol Yong Soo | 2020, 16(2) | pp.153~162 | number of Cited : 0
Introduction and Analysis of Open Source Software Development Methodology
Kyung-A Son , Yun Young-Sun | 2020, 16(2) | pp.163~172 | number of Cited : 1