¼¼ºÎÇÁ·Î±×·¥
83
.
8
9
---- ¼±Åà ----
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
---- ¼±Åà ----
---- ¼±Åà ----
Track>Session :
New Research Opportunities > Tactical Communications and Networks
¹ßÇ¥Á¦¸ñ :
MAC for Tactical Communication Networks
¹ßÇ¥ÀÚ :
±èº´¼ (±³¼ö/È«ÀÍ´ë)
°¿¬¿ä¾à :
¿À´Ã³¯ÀÇ µ¥ÀÌÅÍ Åë½Å±â¼úÀÇ ¹ß´ÞÀº ÀüÀåȯ°æ¿¡¼ÀÇ Åë½Å ¹æ½ÄÀÇ º¯È¸¦ °¡Á®¿ÈÀ¸·Î½á ¹Ì·¡ÀÇ Àü Àå ȯ°æÀº ´Ù¾çÇÑ Á¤º¸ ¼öÁýü°èµé·ÎºÎÅÍ Á¤º¸¸¦ ¼öÁýÇÏ¿© ½Å¼ÓÇÏ°í Á¤È®ÇÑ ...
Track>Session :
New Research Opportunities > Tactical Communications and Networks
¹ßÇ¥Á¦¸ñ :
Tactical Internet Overview
¹ßÇ¥ÀÚ :
°°æ¶õ (ºÎ±³¼ö/¾ÆÁÖ´ë)
°¿¬¿ä¾à :
Network Centric WarfareÀÇ ÇÙ½É ±¸¼º ¿ä¼Ò ÁßÀÇ ÇϳªÀÎ Tactical InternetÀÇ ±¸¼º ¿ä¼Ò¿Í ±â´É ¿ä±¸ »ç Ç× µîÀ» ¹Ì±º¿¡¼ ÀÛ¼ºÇÑ Ç¥ÁØ ¹®¼¸¦ ±â¹ÝÀ¸·Î ¼Ò°³ÇÑ´Ù. Tactica...
Track>Session :
New Research Opportunities > Tutorial: Performing Arts over Networks
¹ßÇ¥Á¦¸ñ :
An Overview of Networked Performance
¹ßÇ¥ÀÚ :
¿©¿î½Â (Á¶±³¼ö/KAIST)
°¿¬¿ä¾à :
³×Æ®¿öÅ© °ø¿¬Àº ´Ù¾çÇÑ Çü½ÄÀÇ µðÁöÅÐ ¾ÆÆ® Áß 21¼¼±â µé¾î °¡Àå ÁÖ¸ñ¹Þ°í ÀÖ´Â °ø¿¬¿¹¼úÀÇ Çϳª ·Î, ¹°¸®ÀûÀ¸·Î ¼·Î ¶³¾îÁø Àå¼Ò¿¡ ÀÖ´Â »ç¶÷µéÀÌ ÃÊ°í¼Ó ³×Æ®¿öÅ©·Î À̾îÁø...
Track>Session :
New Research Opportunities > Tutorial: Performing Arts over Networks
¹ßÇ¥Á¦¸ñ :
Surround Sound for Networked Performance
¹ßÇ¥ÀÚ :
±¸º»Ã¶ (Ãʺù±³¼ö/KAIST)
°¿¬¿ä¾à :
¹«´ë°ø¿¬À» ±¸¼ºÇÏ´Â ¹«´ë, ¹è¿ì, °ü°´ÀÇ ¿ä¼Ò¿¡ ´Ù¾çÇÑ Ã·´Ü±â¼úÀÌ µµÀÔµÇ¸é¼ µðÁöÅаø¿¬ÀÇ °ü ½É ÀÌ ³ô¾ÆÁö°í ÀÖ´Ù. ƯÈ÷ ¹«´ë°ø¿¬¿¡ ³×Æ®¿öÅ©±â¼úÀ» È°¿ëÇÏ¸é ¹°¸®Àû °ø...
Track>Session :
Forensics and Security / e-Goverment > Digital Forensics
¹ßÇ¥Á¦¸ñ :
Introduction to Digital Forensics
¹ßÇ¥ÀÚ :
Àº¼º°æ (Ã¥ÀÓ¿¬±¸¿ø/ETRI)
°¿¬¿ä¾à :
Á¤º¸È°¡ ÁøÀüµÊ¿¡ µû¶ó ÄÄÇ»ÅÍ °ü·Ã ¹üÁ˻Ӹ¸ ¾Æ´Ï¶ó ÀÏ¹Ý ¹üÁË¿¡¼µµ Áß¿ä Áõ°Å ¶Ç´Â ´Ü¼°¡ ÄÄÇ» Å͸¦ Æ÷ÇÔÇÑ ´Ù¾çÇÑ ÀüÀÚ ¸Åü ³»¿¡ º¸°üµÇ¾î ÀÖ´Â °æ¿ì°¡ Áõ°¡ÇÏ°í ÀÖ´Ù. ...
Track>Session :
Forensics and Security / e-Goverment > Digital Forensics
¹ßÇ¥Á¦¸ñ :
Mobile Forensics : Current Status and its Vision
¹ßÇ¥ÀÚ :
ÀÌ±Ô¾È (°èÀå/´ë°ËÂûû)
°¿¬¿ä¾à :
- ¸ñÀû : ¸ð¹ÙÀÏ Æ÷·»½Ä ¼Ò°³ - Çʿ伺 : ¸ð¹ÙÀÏ Æ÷·»½Ä°ú ÇöÀå ¼ö»ç»ç·Ê¸¦ ¼Ò°³ÇÔÀ¸·Î½á ¼ö»ç±â°ü, Çаè, ¾÷°èÀÇ ºñÁ¯ ¼³Á¤¿¡ µµ ¿ò ÀÌ µÇ´Âµ¥ ÀÖÀ½. - ¹üÀ§ : ¸ð¹ÙÀÏ Æ÷...
Track>Session :
Forensics and Security / e-Goverment > Digital Forensics
¹ßÇ¥Á¦¸ñ :
Forensics-related Laws and Legal Issues
¹ßÇ¥ÀÚ :
¼º¼±Á¦ (±³¼ö/Çѳ²´ë)
°¿¬¿ä¾à :
¹Ì±¹Àº ÀÌ¹Ì 2006³â12¿ùºÎÅÍ µðÁöÅÐ Áõ°Å¿¡ ´ëÇÑ Á¦ÃâÀ» Á¤´çÈÇÏ´Â e-discovery Á¦µµ¸¦ µµÀÔÇÑ ¹Ù ÀÖÀ¸¸ç, ÀÌ°ÍÀº ÀÌ¹Ì ±Û·Î¹ú ±â¾÷¿¡ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ´Ù. ¹Ì±¹ÀÇ e-discov...
Track>Session :
Forensics and Security / e-Goverment > Privacy Issues
¹ßÇ¥Á¦¸ñ :
Stealing User Account : A Serious Problem in Online Game Security Area
¹ßÇ¥ÀÚ :
ÀÌÈ£¿õ (¼±ÀÓ/AnhLab)
°¿¬¿ä¾à :
ÃÖ±Ù »çȸÀûÀ¸·Î ¿Â¶óÀÎ »ó¿¡¼ÀÇ »ç¿ëÀÚ °èÁ¤ ÇØÅ·ÀÌ Å« À̽´°¡ µÇ°í ÀÖÀ¸¸ç, ÀÌ·¯ÇÑ »ç¿ëÀÚ °èÁ¤ ÇØÅ·Àº ÇØÅ·À» ÅëÇØ ±ÝÀüÀû À̵æÀ» ¹Ù·Î ÃëÇÒ ¼ö ÀÖ´Â ¿Â¶óÀÎ °Å·¡³ª ¿Â¶ó...
Track>Session :
Forensics and Security / e-Goverment > Privacy Issues
¹ßÇ¥Á¦¸ñ :
Digital Identity Management for Privacy Protection
¹ßÇ¥ÀÚ :
Áø½ÂÇå (ÆÀÀå/ETRI)
°¿¬¿ä¾à :
¸î ³âÀü ¸®´ÏÁö ¸íÀǵµ¿ë »ç°Ç°ú ´ëÅë·É°ú ±¹¹«ÃѸ®ÀÇ ÁֹιøÈ£°¡ µµ¿ëµÇ¾î °¢Á¾ °ÔÀÓ»çÀÌÆ®¿Í ¼º ÀλçÀÌÆ®¿¡ °¡ÀÔµÈ »ç½ÇÀÌ º¸µµµÇ¸é¼, »çȸÀûÀ¸·Î °³ÀÎÁ¤º¸º¸È£¿¡ ´ëÇÑ ÀÌ...
Track>Session :
Forensics and Security / e-Goverment > Privacy Issues
¹ßÇ¥Á¦¸ñ :
Emerging Healthcare Information Technologies and the Future of Privacy
¹ßÇ¥ÀÚ :
±èÀÏ°ï (±³¼ö/°æºÏ´ë)
°¿¬¿ä¾à :
À¯ºñÄõÅͽº ±â¼úÀÇ ÁÖ¿ä È°¿ë ¿µ¿ªÀÇ Çϳª·Î º¸°ÇÀǷḦ ¶°¿Ã¸° °ÍÀº ¹ú½á 3³âÀüÀÇ ÀÏÀÌÁö¸¸, ¿©Å ²¯ º°·Î ÀÌ·ç¾î ¿Â °Íµµ ¾ø´Ù. ¿Ö ÀÌ·± ÀÏÀÌ ÀϾ°í ÀÖ´ÂÁö¸¦ ¿µ¿ªÀÇ º¹Àâ...
01
02
03
04
05
06
07
08
09