Mostrando 8 resultados de: 8
Filtros aplicados
Publisher
ACM International Conference Proceeding Series(1)
Communications in Computer and Information Science(1)
Information Technology Journal(1)
International Journal of Applied Engineering Research(1)
Journal of Electronic Testing: Theory and Applications (JETTA)(1)
Área temáticas
Ciencias de la computación(5)
Física aplicada(3)
Programación informática, programas, datos, seguridad(2)
Derecho privado(1)
Fuerzas aéreas y otras fuerzas especializadas(1)
Área de conocimiento
Ciencias de la computación(3)
Software(3)
Ingeniería de software(2)
Red informática(2)
Marketing(1)
Confidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusEnhanced misuse cases for prioritization of security requirements
Conference ObjectAbstract: Nowadays, it is impossible to ignore the implementation of security features in information systemsPalabras claves:Misuse case, prioritization, requirement engineering, Software Engineering, Use caseAutores:Kim J., Sang Guun Yoo, Vaca H.P.Fuentes:googlescopusIt-dependent strategic initiative to increase the marketing performance of mobile security solutions
ArticleAbstract: Purpose - Since mobile devices can hold vast amounts of confidential and sensitive information, theyPalabras claves:ATTACHMENT, Fear appeal, Interactivity, Mobile security, Protection motivation theoryAutores:Kim J., Sang Guun YooFuentes:googlescopusJTAG security system based on credentials
ArticleAbstract: JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments.Palabras claves:authentication, Credential, JTAG, securityAutores:Kim J., Kim T., Park K.Y., Sang Guun YooFuentes:googlescopusSoftware architecture of JTAG security system
ArticleAbstract: The issue of JTAG security has recently become of interest not only to academic researchers but alsoPalabras claves:JTAG, RUP, security, Software architectureAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusSpecification-based intrusion detection system for WiBro
Conference ObjectAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is a wirePalabras claves:information security, intrusion detection, Specification, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun YooFuentes:googlescopusSecurity requirements prioritization based on threat modeling and valuation graph
Conference ObjectAbstract: Information systems manage assets that are critical for the business processes of organizations. ThePalabras claves:Security Requirement Prioritization, Threat modelingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus