-
1دورية أكاديمية
المؤلفون: Yong Sung You, Chang Yeol Lee, Chengguo Li, Sung Ho Lee, Kibom Kim, Hyungil Jung
المصدر: PLoS ONE, Vol 9, Iss 8, p e104145 (2014)
وصف الملف: electronic resource
-
2مؤتمر
المؤلفون: Kibom Kim, Kwonwoo Yang, Joon-Min Gil, Chong-Sun Hwang
المصدر: Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing (CMC'99). Group Communications (IWGC). Internet '99 (IWI'99). Industrial Applications on Network Computing (INDAP). Multime Parallel processing workshops Parallel Processing, 1999. Proceedings. 1999 International Workshops on. :428-433 1999
Relation: Proceedings of the 1999 ICPP Workshops
-
3مؤتمر
المؤلفون: KwonWoo Yang, JoonMin Gil, Kibom Kim, Chong-Sun Hwang
المصدر: Gateway to 21st Century Communications Village. VTC 1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No.99CH36324) Vehicular technology - Amsterdam Vehicular Technology Conference, 1999. VTC 1999 - Fall. IEEE VTS 50th. 3:1638-1642 vol.3 1999
Relation: Gateway to 21st Century Communications Village. VTC 1999-Fall. IEEE VTS 50th Vehicular Technology Conference
-
4
المؤلفون: Tae-Woo Oh, Haneol Jang, Kibom Kim
المصدر: IH&MMSec
مصطلحات موضوعية: Steganalysis, 050101 languages & linguistics, Network architecture, Steganography, business.industry, Computer science, 05 social sciences, Activation function, ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, Pattern recognition, 02 engineering and technology, computer.file_format, Convolutional neural network, JPEG, Feature (computer vision), 0202 electrical engineering, electronic engineering, information engineering, Preprocessor, 020201 artificial intelligence & image processing, 0501 psychology and cognitive sciences, Artificial intelligence, business, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::ce47684d0d921c712608d8a42cc34ac1
https://doi.org/10.1145/3369412.3395072 -
5
المؤلفون: Daewon Lee, Tae-Woo Oh, Kibom Kim
المصدر: IH&MMSec
مصطلحات موضوعية: Lossless compression, Steganalysis, 050101 languages & linguistics, Steganography, business.industry, Computer science, Speech recognition, Deep learning, 05 social sciences, Payload (computing), ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, Data_CODINGANDINFORMATIONTHEORY, 02 engineering and technology, Convolutional neural network, Information hiding, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, 0501 psychology and cognitive sciences, Artificial intelligence, business, Digital audio
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::bdcbce1656a1936f2252d95338292296
https://doi.org/10.1145/3369412.3395064 -
6
المؤلفون: Bong-Nam Noh, Kibom Kim, Kyoungho Lee, Hyunuk Hwang
المصدر: Digital Investigation. 18:S23-S32
مصطلحات موضوعية: Windows, Bootstrapping, Computer science, OS fingerprinting, 020206 networking & telecommunications, 020207 software engineering, 02 engineering and technology, computer.software_genre, Data structure, Memory forensics, Computer Science Applications, Global variable, Medical Laboratory Technology, Identification (information), Digital evidence, Kernel (statistics), 0202 electrical engineering, electronic engineering, information engineering, Table (database), Data mining, Law, computer, Memory analysis, Robust analysis
-
7
المؤلفون: Hyunuk Hwang, Bong-Nam Noh, Kibom Kim, Youngbok Kang
المصدر: Journal of the Korea Institute of Information Security and Cryptology. 24:861-870
مصطلحات موضوعية: Indexed file, Database, Computer science, Computer file, Stub file, computer.file_format, Class implementation file, computer.software_genre, Unix file types, Memory-mapped file, Data_FILES, Operating system, ZAP File, Executable, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::0edbe07309133780acaa56e09a8c2659
https://doi.org/10.13089/jkiisc.2014.24.5.861 -
8
المؤلفون: Youngbok Kang, Minsu Kim, Bong-Nam Noh, Kyoungho Lee, Hyunuk Hwang, Kibom Kim
المصدر: Journal of the Korea Institute of Information Security and Cryptology. 23:931-938
مصطلحات موضوعية: Computer science, business.industry, computer.software_genre, Encryption, Disk encryption hardware, Disk encryption theory, Multiple encryption, Filesystem-level encryption, Disk encryption, 40-bit encryption, On-the-fly encryption, business, computer, Computer hardware
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::d81bf6d20b2824bc0e1962f51ea0cf5c
https://doi.org/10.13089/jkiisc.2013.23.5.931 -
9
المؤلفون: Kibom Kim, Taejoo Chang, Gyu-Won Lee, Hyunuk Hwang
المصدر: KIPS Transactions on Computer and Communication Systems. 2:349-356
مصطلحات موضوعية: Scheme (programming language), Engineering, Point (typography), Database, business.industry, Backup software, Computer security, computer.software_genre, Backup, Feature (computer vision), ComputerSystemsOrganization_MISCELLANEOUS, Data_FILES, business, computer, Personally identifiable information, computer.programming_language
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::49d90bd22c32803db972f6ae8c4f2c04
https://doi.org/10.3745/ktccs.2013.2.8.349 -
10
المؤلفون: Dae-il Jang, Gail-Joon Ahn, Hyunuk Hwang, Kibom Kim
المصدر: IRI
مصطلحات موضوعية: File system, Computer science, Digital forensics, ComputingMilieux_LEGALASPECTSOFCOMPUTING, 020206 networking & telecommunications, 02 engineering and technology, computer.software_genre, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Malware, 020201 artificial intelligence & image processing, Timestamp, Data mining, computer, Hacker
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::205244902f2544721408d60b65dd009f
https://doi.org/10.1109/iri.2016.94