Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 김태훈 | * |
dc.date.accessioned | 2018-07-18T16:30:58Z | - |
dc.date.available | 2018-07-18T16:30:58Z | - |
dc.date.issued | 2006 | * |
dc.identifier.isbn | 3540465375 | * |
dc.identifier.isbn | 9783540465379 | * |
dc.identifier.issn | 0302-9743 | * |
dc.identifier.other | OAK-17735 | * |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/245061 | - |
dc.description.abstract | It is critical to note that a weakness (or security hole) in any component of the IT systems may comprise whole systems. Applying of Security engineering and intelligent methods are needed to reduce security holes may be included in the software or systems. Therefore, more security-related intelligent researches are needed to reduce security weakness may be included in the systems. This paper proposes some intelligent methods for reducing the threat to the system by applying security engineering, and for building security countermeasure. © Springer-Verlag Berlin Heidelberg 2006. | * |
dc.language | English | * |
dc.title | Intelligent method for building security countermeasures | * |
dc.type | Conference Paper | * |
dc.relation.volume | 4252 LNAI - II | * |
dc.relation.index | SCOPUS | * |
dc.relation.startpage | 745 | * |
dc.relation.lastpage | 750 | * |
dc.relation.journaltitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | * |
dc.identifier.scopusid | 2-s2.0-33750699043 | * |
dc.author.google | Kim T.-H. | * |
dc.author.google | Hwang S.-M. | * |
dc.date.modifydate | 20240322133514 | * |