1 | Á¦¸ñ(Title) | Five Forces Model of Computational Power: A Comprehensive Measure Method | |
---|---|---|---|
ÀúÀÚ(Author) | Meixi Wu Liang Guo Xiaotong Yang Lina Xie Shaopeng Wang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 07 PP. 2239 ~ 2256 2022. 07 | ||
2 | Á¦¸ñ(Title) | Traffic Flow Sensing Using Wireless Signals | |
ÀúÀÚ(Author) | Xuting Duan Hang Jiang Daxin Tian Jianshan Zhou Gang Zhou Wenjuan E Yafu Sun Shudong Xia Xuting Duan Hang Jiang Daxin Tian Jianshan Zhou Gang Zhou Wenjuan E Yafu Sun Shudong Xia | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 10 PP. 3858 ~ 3874 2021. 10 | ||
3 | Á¦¸ñ(Title) | A Review of Intelligent Self-Driving Vehicle Software Research | |
ÀúÀÚ(Author) | Jeonghwan Gwak Juho Jung RyumDuck Oh Manbok Park Mukhammad Abdu Kayumbek Rakhimov Junho Ahn | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 11 PP. 5299 ~ 5320 2019. 11 | ||
4 | Á¦¸ñ(Title) | Power Allocation for Half-duplex Relay-based D2D Communication with QoS guarantee | |
ÀúÀÚ(Author) | Hui Dun Fang Ye Shuhong Jiao | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 03 PP. 1311 ~ 1324 2019. 03 | ||
5 | Á¦¸ñ(Title) | Advanced approach to information security management system utilizing maturity models in critical infrastructure | |
ÀúÀÚ(Author) | |||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 10 PP. 4995 ~ 5014 2018. 10 | ||
6 | Á¦¸ñ(Title) | Information Technology Infrastructure for Agriculture Genotyping Studies | |
ÀúÀÚ(Author) | Bens Pardamean James W. Baurley Anzaludin S. Perbangsa Dwinita Utami Habib Rijzaani Dani Satyawan | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 03 PP. 0655 ~ 0665 2018. 06 | ||
7 | Á¦¸ñ(Title) | A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments | |
ÀúÀÚ(Author) | Gyeong-Jin Ra Im-Yeong Lee | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 02 PP. 0892 ~ 0905 2018. 02 | ||
8 | Á¦¸ñ(Title) | A Coordinated Heuristic Approach for Virtual Network Embedding in Cloud Infrastructure | |
ÀúÀÚ(Author) | Adnan Khalid Muhammad Shahbaz Nahid Hamzehee Nia Sepideh Adabi Majid Nikougoftar Nategh | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 11 NO. 05 PP. 2346 ~ 2361 2017. 05 | ||
9 | Á¦¸ñ(Title) | Design and Implementation of Information Management Tools for the EDISON Open Platform | |
ÀúÀÚ(Author) | Jin Ma Jongsuk Ruth Lee Kumwon Cho Minjae Park | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 11 NO. 02 PP. 1089 ~ 1104 2017. 02 | ||
10 | Á¦¸ñ(Title) | The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd. | |
ÀúÀÚ(Author) | Kyung-bok Lee Jong-in Lim | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 10 NO. 02 PP. 0857 ~ 0880 2016. 02 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.