Digital Library
Search Results: [ keyword: Threat ] (18)
Dong-Wook Kim,
Sung-Sam Hong,
Myung-Mook Han,
Vol. 12, No. 4, April 29, 2018
10.3837/tiis.2018.04.027
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Seul-Ki Choi,
Chung-Huang Yang,
Jin Kwak,
Vol. 12, No. 2, February 27, 2018
10.3837/tiis.2018.02.022
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Janghyuk Kauh,
Wongi Lim,
Koohyung Kwon,
Jong-Eon Lee,
Jung-Jae Kim,
Minwoo Ryu,
Si-Ho Cha,
Vol. 11, No. 10, October 30, 2017
10.3837/tiis.2017.10.020
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
15.
New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology
Ho-Jae Lee,
Min-Woo Park,
Jung-Ho Eom,
Tai-Myoung Chung,
Vol. 9, No. 11, November 29, 2015
10.3837/tiis.2015.11.023
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
K.P.Vijayakumar,
P.Ganeshkumar,
M.Anandaraj,
Vol. 9, No. 10, October 30, 2015
10.3837/tiis.2015.10.026
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
17.
Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages