121 | -- | 123 | Yu-Keum Jeong, Roy C. Park. Knowledge-based System and Security |
125 | -- | 130 | MyounJae Lee. Secure game development for IoT environment |
131 | -- | 136 | Olivier Ferrand, Eric Filiol. Combinatorial detection of malware by IAT discrimination |
137 | -- | 143 | Sunghyuck Hong. Two-channel user authentication by using USB on Cloud |
145 | -- | 150 | Yong Chan Kim, Jongkun Lee. A secure analysis of vehicular authentication security scheme of RSUs in VANET |
151 | -- | 161 | Do Yeon Kim, GuoZhong Li, Seong-Taek Park, Mi-Hyun Ko. A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis |
163 | -- | 167 | Bo-Seon Kang, Keun-Ho Lee. 2-Channel authentication technique using cardiac impulse based OTP |
169 | -- | 175 | Kiyoung Kim, Byung-Joon Park, Yuhwa Suh, Jaepyo Park. OTT user authentication system by age classification |
177 | -- | 184 | Joon Ho Kim, Myung-Chul Ma, Jae-Pyo Park. An analysis on secure coding using symbolic execution engine |
185 | -- | 190 | Hyung-Jin Mun, Kun Hee Han. Blackhole attack: user identity and password seize attack using honeypot |
191 | -- | 202 | Jonathan Dechaux, Eric Filiol. Proactive defense against malicious documents: formalization, implementation and case studies |