View : 642 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author김태훈*
dc.date.accessioned2018-07-18T16:30:58Z-
dc.date.available2018-07-18T16:30:58Z-
dc.date.issued2006*
dc.identifier.isbn3540465375*
dc.identifier.isbn9783540465379*
dc.identifier.issn0302-9743*
dc.identifier.otherOAK-17735*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/245061-
dc.description.abstractIt is critical to note that a weakness (or security hole) in any component of the IT systems may comprise whole systems. Applying of Security engineering and intelligent methods are needed to reduce security holes may be included in the software or systems. Therefore, more security-related intelligent researches are needed to reduce security weakness may be included in the systems. This paper proposes some intelligent methods for reducing the threat to the system by applying security engineering, and for building security countermeasure. © Springer-Verlag Berlin Heidelberg 2006.*
dc.languageEnglish*
dc.titleIntelligent method for building security countermeasures*
dc.typeConference Paper*
dc.relation.volume4252 LNAI - II*
dc.relation.indexSCOPUS*
dc.relation.startpage745*
dc.relation.lastpage750*
dc.relation.journaltitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)*
dc.identifier.scopusid2-s2.0-33750699043*
dc.author.googleKim T.-H.*
dc.author.googleHwang S.-M.*
dc.date.modifydate20240322133514*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE