Digital Library
Search: "[ keyword: Security ]" (51)
-
Zhonghua Li, Xinghua Sun, Ting Yan, Dong Yang, Guiliang Feng
Vol. 19, No. 2, pp. 139-148, Apr. 2023
10.3745/JIPS.04.0267
Keywords: Combined code, Food, Security, Traceability -
Hyuk-Jun Kwon, Mikail Mohammed Salim, Jong Hyuk Park
Vol. 19, No. 1, pp. 118-129, Feb. 2023
10.3745/JIPS.03.0182
Keywords: Blockchain, Security, Post Quantum, Privacy, Smart City -
Hee-Hyun Kim and Jinho Yoo
Vol. 18, No. 4, pp. 489-499, Aug. 2022
10.3745/JIPS.03.0178
Keywords: CVE Vulnerability, CVSS, IoT device, Security Vulnerabilities -
Seung Hun Jee, Ji Su Park, Jin Gon Shon
Vol. 17, No. 4, pp. 801-817, Aug. 2021
10.3745/JIPS.04.0220
Keywords: Cloud, Network virtualization, NFV, NVO, SDN, Security -
Jisun Kim, Eulhan Jo, Sungwon Lee, Taenam Cho
Vol. 17, No. 4, pp. 772-786, Aug. 2021
10.3745/JIPS.03.0162
Keywords: Active Directory, Digital Forensics, Elastic Stack, Microsoft Windows Log, Security, Shared Folder -
Won-Bin Kim, Im-Yeong Lee
Vol. 17, No. 3, pp. 658-673, Jun. 2021
10.3745/JIPS.03.0160
Keywords: Date Deduplication, Cloud Storage, Encryption, Security -
Sushil Kumar Singh, Abir El Azzaoui, Mikail Mohammed Salim, Jong Hyuk Park
Vol. 16, No. 6, pp. 1459-1478, Dec. 2020
10.3745/JIPS.03.0154
Keywords: Computing Security and Privacy, Quantum, Communication, Sensor, Smart Applications -
Li Wang, Chunling Jin, Chongqi Xu
Vol. 16, No. 5, pp. 1064-1073, Oct. 2020
10.3745/JIPS.04.0188
Keywords: Comprehensive Evaluation, Fuzzy Mathematical Theory, High-Speed Railway Terminal, Interval Eigenvalue Method (IEM), Operational Security -
Gi-Chul Yang
Vol. 16, No. 5, pp. 1034-1047, Oct. 2020
10.3745/JIPS.03.0147
Keywords: Electroencephalography, information security, Machine Learning, Personal Authentication -
Jose Costa Sapalo Sicato, Sushil Kumar Singh, Shailendra Rathore, Jong Hyuk Park
Vol. 16, No. 4, pp. 975-990, Aug. 2020
10.3745/JIPS.03.0144
Keywords: IDS, IoT, M2M, Security, Privacy