Pub Date : 1900-01-01DOI: 10.1007/978-94-007-2911-7_43
Sungho Sim, Young-Jae Song
{"title":"A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker","authors":"Sungho Sim, Young-Jae Song","doi":"10.1007/978-94-007-2911-7_43","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_43","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129153561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_115
Unil Yun, Gwangbum Pyun, Sung-Jin Kim
{"title":"Performance Evaluation of Approximate Pattern Mining Based on Probabilistic and Statistical Techniques","authors":"Unil Yun, Gwangbum Pyun, Sung-Jin Kim","doi":"10.1007/978-94-007-5860-5_115","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_115","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_78
Moonsik Kang
{"title":"An Efficient High-Speed Traffic Control Scheme for Real-Time Multimedia Applications in Wireless Networks","authors":"Moonsik Kang","doi":"10.1007/978-94-007-5860-5_78","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_78","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115404263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_89
Hee-Dong Park, K. Park
{"title":"A Multihoming-Based Vertical Handover Scheme","authors":"Hee-Dong Park, K. Park","doi":"10.1007/978-94-007-5860-5_89","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_89","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114513069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_80
Surgwon Sohn
{"title":"Design of Transducer Interface Agent and its Protocol for WSN Middleware","authors":"Surgwon Sohn","doi":"10.1007/978-94-007-5860-5_80","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_80","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICITCS.2013.6717803
Doyoung Chung, Sokjoon Lee, Sin-Hyo Kim
As a wireless mobile communication technology has been improved, the WLAN technology is widely spread. On the other hand, the threat on WLAN has been gradually increased. Thus, finding vulnerabilities in the WLAN network is important for an administrator. In this paper, we propose WLAN attack emulator and its results. Our new attack emulator supports more various attack type than a previous attack emulator and also runs in windows OS while the previous one only runs in Linux OS. With these two improvements, this emulator would allow administrator to find out the vulnerabilities in his own network easily.
{"title":"An Implementation and Experiment of Wireless Attack Emulator on Windows Environment","authors":"Doyoung Chung, Sokjoon Lee, Sin-Hyo Kim","doi":"10.1109/ICITCS.2013.6717803","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717803","url":null,"abstract":"As a wireless mobile communication technology has been improved, the WLAN technology is widely spread. On the other hand, the threat on WLAN has been gradually increased. Thus, finding vulnerabilities in the WLAN network is important for an administrator. In this paper, we propose WLAN attack emulator and its results. Our new attack emulator supports more various attack type than a previous attack emulator and also runs in windows OS while the previous one only runs in Linux OS. With these two improvements, this emulator would allow administrator to find out the vulnerabilities in his own network easily.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114906235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_72
A. Hosen, Gihwan Cho
{"title":"A Design of WSN Model to Minimize Data-Centric Routing Cost for Many-to-Many Communication","authors":"A. Hosen, Gihwan Cho","doi":"10.1007/978-94-007-5860-5_72","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_72","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"21 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126945048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_35
Sang-Young Lee, Yoon-Seok Lee
{"title":"Ubiquitous Logistics Management in the Steel Industry","authors":"Sang-Young Lee, Yoon-Seok Lee","doi":"10.1007/978-94-007-5860-5_35","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_35","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127513988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_29
Sung-Hoon Son
{"title":"An MMU Virtualization for Embedded Systems","authors":"Sung-Hoon Son","doi":"10.1007/978-94-007-5860-5_29","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_29","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_129
Heungmo Ryang, Unil Yun
{"title":"Collective Intelligence Based Algorithm for Ranking Book Reviews","authors":"Heungmo Ryang, Unil Yun","doi":"10.1007/978-94-007-5860-5_129","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_129","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}