Digital Library
Search: "[ keyword: IR ]" (184)
-
Ko Hoon, Jang Uijin, Shin Yongtae, Vol. 5, No. 2, pp. 33-40, Apr. 2004
Keywords: Network Security, internet security, encrypt protocol, information security, wireless internet security -
Ko Jeong-Ho, Lee Gang-Soo, Vol. 5, No. 2, pp. 17-32, Apr. 2004
Keywords: Information security system evaluation, CC, Protection profile, Security environment, Assumptions statement -
Park Ji-Sook, Dong Ji-Youn, Vol. 4, No. 6, pp. 57-68, Dec. 2003
Keywords: facial feature, facial direction, facial trapezoid, automatic image arrangement -
Park Sook-Young, Kim Young-nam, Lee Sang-Kyu, Lee Ju-Young, Vol. 4, No. 4, pp. 15-26, Aug. 2003
Keywords: ad-hoc network, system lifetime, wireless network, coordinator -
LiuCun Zhu, JiaJin Chen, HaSung Hwang, Vol. 25, No. 3, pp. 93-100, Jun. 2024
10.7472/jksii.2024.25.3.93
Keywords: Virtual community Ifland, use and satisfaction, innovativeness, Satisfaction, intention to continue use -
Hong hwan Ahn, Han Sol Lim, Seung Kyun Ra, Bong Gyou Lee, Vol. 25, No. 3, pp. 71-81, Jun. 2024
10.7472/jksii.2024.25.3.71
Keywords: Airport Industry, First Mover, Testbed, Customer Service, Expert Interviews, AHP Analysis -
Jiyeon Baek, Jiwon Jang, Seongmin Kim, Vol. 25, No. 3, pp. 1-8, Jun. 2024
10.7472/jksii.2024.25.3.1
Keywords: Memory Forensics, Over-The-Air (OTA), ESP32, Attack Scenario -
Kyu-min Cho, Jae-il Lee, Dong-kyoo Shin, Vol. 25, No. 1, pp. 167-176, Feb. 2024
10.7472/jksii.2024.25.1.167
Keywords: Chatbot, AI Security, Artificial intelligence, Security Requirements, implementation model, security threat analysis, security evaluation criteria -
Soyon Kim, Ji Yeon Cho, Bong Gyou Lee, Vol. 25, No. 1, pp. 79-90, Feb. 2024
10.7472/jksii.2024.25.1.79
Keywords: Generative AI, ChatGPT, trust, Expectation-Confirmation Model, Continued Use Intention -
Changhyeon Park, Jaeyoung Park, Vol. 25, No. 1, pp. 9-15, Feb. 2024
0.7472/jksii.2024.25.1.9
Keywords: Virtual Object, remote manipulation, visuo-haptic, weight perception