All
Title
Author
Keyword
Date
All
Communities
Authors
Journal
All of DSpace
Administration
Affiliated Organization
Ajou University
ETC
Graduate School of Ajou University
Professional Graduate Schools
Research Organization
Special Graduate Schools
Supporting Institution
Add filters:
Title
Type
Author
Keyword
Date Issued
Advisor
Abstract
Journal
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort by
Relevance
Title
Issue Date
In order
Ascending
Descending
Authors/record
All
1
5
10
15
20
25
30
35
40
45
50
Showing results
1
to 10 of 1563 (Search time: 0.0 seconds).
Security, privacy, and reliability in digital healthcare systems using blockchain
oa mark
Ali, Aitizaz;
Rahim, Hasliza A.;
Pasha, Muhammad Fermi;
Dowsley, Rafael;
Masud, Mehedi;
Ali, Jehad
;
Baz, Mohammed
2021-08-02
Electronics (Switzerland), Vol.10
MDPI AG
Understanding and recommending security requirements from problem domain ontology: A cognitive three-layered approach
Kim, Bong Jae;
Lee, Seok Won
2020-11-01
Journal of Systems and Software, Vol.169
Elsevier Inc.
Toward security enhanced provisioning in industrial IoT systems
oa mark
Kwon, Sungmoon;
Jeong, Jaehan;
Shon, Taeshik
2018-12-01
Sensors (Switzerland), Vol.18
MDPI AG
Forecasting cyber threats through the text mining analysis of political news and security logs
Choi, Heeyoung;
Kang, Juyoung
;
Park, Sangun
2020-01-01
ICIC Express Letters, Part B: Applications, Vol.11, pp.577-586
ICIC International
Analysis of Fragmentation Security Threats and Secure Authentication Scheme in 6LoWPAN
Hassen Redwan Hussen
2010-02
The Graduate School, Ajou University
Towards IIoT Cyber Security
권성문
2020-08
The Graduate School, Ajou University
ISA100.11기반 산업제어시스템을 위한 향상된 보안 프레임워크
Kim Hyunjin
2016-08
The Graduate School, Ajou University
An Effective Blockchain Based Secure Searchable Encryption System
oa mark
Ali, Aitizaz;
Masud, Mehedi;
Rehman, Ateeq Ur;
Chen, Can;
Mehmood,;
Alzain, Mohammad A.;
Ali, Jehad
2022-01-01
Intelligent Automation and Soft Computing, Vol.33, pp.1183-1195
Tech Science Press
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
Chaudhry, Shehzad Ashraf;
Shon, Taeshik
;
Al-Turjman, Fadi;
Alsharif, Mohammed H.
2020-03-01
Computer Communications, Vol.153, pp.527-537
Elsevier B.V.
Enhancing Participatory Security Culture in Public Institutions: An Analysis of Organizational Employees' Security Threat Recognition Processes
oa mark
Choi, Heeyoung;
Park, Sangun;
Kang, Juyoung
2024-01-01
IEEE Access, Vol.12, pp.47543-47558
Institute of Electrical and Electronics Engineers Inc.
1
2
3
4
next
157
필터
Discover
닫기
Author
Lee, Kyo-Beum
57
ALI JEHAD
31
SHON, TAE SHIK
29
Choi, Kwon Young
20
KWAK, JIN
20
Park, Yong Bae
18
Chung, Tae-Sun
17
Bhatia, Shashi Kant
16
Jung, Soyi
16
Yang, Yung Hun
16
next >
Type
Thesis
818
Article
660
Review
28
Editorial
6
Erratum
2
Note
2
Conference Paper
1
Keyword
IoT
19
Security
15
deep learning
14
Machine learning
14
Blockchain
13
Deep learning
13
블록체인
11
machine learning
9
SDN
9
security
9
next >
Date issued
2020 - 2025
783
2010 - 2019
545
2000 - 2009
187
Journal
IEEE Access
125
Electronics (Basel)
24
IEEE Transactions on Power Electr...
22
Sensors
21
Applied Sciences-basel
16
Computers, Materials and Continua
8
Journal of Korean Institute of Co...
8
IEEE Journal of Emerging and Sele...
7
Journal of Supercomputing
7
Sustainability
7
next >