2020-02 | Black money usage tracker built on Hyperledger Fabric | ABDUKODIROV FARKHOD |
2017-02 | BLE 기기 방향성과 사용자 위치이력 기반의 실내측위 성능개선 방법 | 이병욱 |
2020-02 | Blockchain-Based, Distributed Trust Establishment in Mobile Ad-Hoc Network | MAY THURA LWIN |
2022-02 | Blockchain-enabled access control with fog nodes for independent IoTs | KHAYDARALIEV MUKHAMMADDIYOR |
2013-02 | Broadcast Algorithm utilizing Co-operative communication for minimizing Energy consumption in Two Tiered Wireless Sensor Network | Mehmood, Usman |
2012-08 | Cache-based MIH for Enhancing Handoff Performance in Heterogeneous Networks | Ismail, Atif |
2022-02 | Chain code-based Image Compression and Transfer Schemes for Electronic Shelf Label Systems | 김영준 |
2020-08 | Chaincode-based Access Control System for Multi-Administrative domains | ABDURAHMANOV SHERZODBEK MUKUMOVICH |
2010-02 | Cluster-Based TDMA Broadcast MAC Protocol for Mobile Ad-Hoc | Pandey Ananta |
2019-02 | CNN-based Intrusion Detection System Using Packet Payload for Industrial Control Systems | 송주엽 |
2018-02 | CoAP 기반 NB-IoT 환경을 위한 향상된 보안 아키텍처 연구 | 우시재 |
2010-08 | Coding Artifact Reduction Using Bilateral Filtering | Zerubabel, Legesse |
2014-08 | Composition of Foreground and Background Images using Optical Flow | Dawit Gebreyohannes |
2016-02 | Content-Centric Smart Home Networking for Centralized Device Management | VARTIKA SRIVASTAVA |
2014-08 | Continuous Control Message Exchange in Distributed Cognitive Radio Networks | Arega Zerabruk Gebrehiwet |
2016-02 | Cost Analysis for Fault-Tolerant Distributed Shared Memory System | JAZIA ALHARBI FAHAD |
2017-02 | Cross-layer Approach for Bio-Inspired Routing and MAC Protocols in Mobile Adhoc Networks | 김광수 |
2020-02 | Cyber Security Threat Analysis Model for Countermeasure to New and Variant Threats | 최슬기 |
2017-02 | Cyber Threat Intelligence를 위한 악성코드 프로파일링 및 이메일 기반 Botnet Group 분석기술 연구 | 이태진 |
2020-02 | CycleGAN을 이용한 야간 상황 물체 검출 알고리즘 | 조상흠 |