Digital Library[ Search Result ]
Search : "[ keyword: Security ]" (158)
Development of a String Injection Vulnerability Analyzer for Web Application Programs
Joon Seon Ahn Yeong Min Kim Jang Wu Jo
Vol. 15, No. 3, pp. 181-188, Jun. 2008
10.3745/KIPSTA.2008.15.3.181
Vol. 15, No. 3, pp. 181-188, Jun. 2008
10.3745/KIPSTA.2008.15.3.181
An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit
Seong Yong Joo Joon Seon Ahn Jang Wu Jo
Vol. 15, No. 1, pp. 45-52, Feb. 2008
10.3745/KIPSTA.2008.15.1.45
Vol. 15, No. 1, pp. 45-52, Feb. 2008
10.3745/KIPSTA.2008.15.1.45
Back-Propagation Neural Network Based Face Detection and Pose Estimation
Jae Hoon Lee In Ja Jun Jung Hoon Lee Phill Kyu Rhee
Vol. 9, No. 6, pp. 853-862, Dec. 2002
10.3745/KIPSTB.2002.9.6.853
Vol. 9, No. 6, pp. 853-862, Dec. 2002
10.3745/KIPSTB.2002.9.6.853
A Study of Hierarchical Policy Model of Policy - based Integrated Security Management for managing Heterogeneous Security Systems
Dong Young Lee Dong Soo Kim Tai Myoung Chung
Vol. 8, No. 5, pp. 607-614, Oct. 2001
10.3745/KIPSTC.2001.8.5.607
Vol. 8, No. 5, pp. 607-614, Oct. 2001
10.3745/KIPSTC.2001.8.5.607