¼¼ºÎÇÁ·Î±×·¥

 

88.   69
Track>Session : > Cloud Computing: Services
¹ßÇ¥Á¦¸ñ : Cloud Security Service
¹ßÇ¥ÀÚ : À̼öÇü (ºÎÀå/HP)
°­¿¬¿ä¾à : Áö³­ IT °ú°Å º¯È­¸¦ º¸¸é ¾à 10³â¿¡ Çѹø¾¿ Å« º¯È­¸¦ °Þ¾î ¿Ô½À´Ï´Ù. Áö±Ý ¿ì¸®°¡ ÇÊ¿ä·Î ÇÏ´Â º¯È­¸¦ À§ÇØ µµÀÔ ¶Ç´Â ÁغñÇÏ°íÀÚ Çϴ Ŭ¶ó¿ìµå ȯ°æ¿¡¼­ÀÇ º¸¾È¿¡ ´ëÇÑ Á¢...
Track>Session : > B4G Technology
¹ßÇ¥Á¦¸ñ : 5G Mobile Communication
¹ßÇ¥ÀÚ : Á¶Àç¿ø (¼ö¼®/»ï¼ºÀüÀÚ)
°­¿¬¿ä¾à : º» °­¿¬¿¡¼­´Â Â÷¼¼´ë À̵¿Åë½Å Àü¸Á¿¡ ´ëÇØ ¼Ò°³ÇÑ´Ù. ÃÖ±Ù ¸ð¹ÙÀÏ ¼­ºñ½ºÀÇ Æ®·£µå¿Í ±âÁ¸°ú´Â ±¸ºÐµÇ´Â Â÷¼¼´ë À̵¿Åë½ÅÀÇ È¯°æ º¯È­, ±×¸®°í À̷κÎÅÍ ¿¹»óµÇ´Â 5¼¼´ë À̵¿...
Track>Session : > B4G Technology
¹ßÇ¥Á¦¸ñ : Mobile Communication Technologies after LTE-Advanced
¹ßÇ¥ÀÚ : ¾ÈÀ翵 (ÆÀÀå/ETRI)
°­¿¬¿ä¾à : 3GPP LTE-Advanced(Rel-10) ÀÌÈÄÀÇ Ç¥ÁØÈ­ µ¿Çâ°ú ÇöÀç Ç¥ÁØÈ­°¡ ÁøÇàÁßÀÎ LTE Rel-11ÀÇ ÁÖ¿ä ±â¼úÀ» ¸ÕÀú ¼³¸íÇÏ°í, ÇâÈÄÀÇ À̵¿Åë½Å ±â¼ú¿¡ ´ëÇÑ ¿ä±¸»çÇ× ¹× ±× ¿ä±¸»çÇ×À» ...
Track>Session : > B4G Technology
¹ßÇ¥Á¦¸ñ : Network Technologies for 5G Wireless Communications
¹ßÇ¥ÀÚ : ÀÌÁÖ¿ë (±³¼ö/KAIST)
°­¿¬¿ä¾à : 5¼¼´ë À̵¿Åë½ÅÀº ÇöÀç´ëºñ1000¹èÀÇ ¿ë·® Áõ´ë¿Í ȹ±âÀûÀÎ ¿¡³ÊÁö Àý°¨, 1000¹èÀÇ ´Ü¸» Áõ´ë¿¡ µû¸¥ »ç¹°Áö´ÉÅë½Å Áö¿øÀ» Ư¡À¸·Î Á¤ÀÇÇغ¼ ¼ö ÀÖ´Ù. ¿ë·®À» Áõ´ë½ÃÅ°°í ÀúÀü·Â...
Track>Session : > Recent Advances in Security
¹ßÇ¥Á¦¸ñ : Hypervisor-Based Security for Cloud Computing Environments
¹ßÇ¥ÀÚ : ½Å¿µ»ó (¼±ÀÓ/KISA)
°­¿¬¿ä¾à : Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀº ÃÖ±Ù IT ȯ°æ¿¡¼­ÀÇ °¡Àå Çõ½ÅÀûÀÎ º¯È­¸¦ À̲ø°í ÀÖ´Ù. ±×·¯³ª, º¸¾È À̽´°¡ Ŭ¶ó¿ìµå ÄÄÇ»Æà ±â¼úÀÇ Àû¿ë ¹× È°¼ºÈ­¿¡ ÀÖ¾î °¡Àå Å« °É¸²µ¹ÀÌ µÇ°í ÀÖ´Ù. ...
Track>Session : > Recent Advances in Security
¹ßÇ¥Á¦¸ñ : Auditing Android Applications
¹ßÇ¥ÀÚ : ¾çÁ¤±Ô (ÀÌ»ç/¶ó¿Â½ÃÅ¥¸®Æ¼)
°­¿¬¿ä¾à : ¸î ³â µ¿¾È IT ºÐ¾ß¿Í º¸¾È ºÐ¾ß´Â Å« º¯È­¸¦ °Þ°í ÀÖ½À´Ï´Ù. ¼­¹ö Á߽ɿ¡¼­ Desktop Áß½ÉÀ¸·Î, Desktop Á߽ɿ¡¼­ Mobile (Smart Phone) Áß½ÉÀ¸·Î ±Þ¼ÓÈ÷ º¯È­µÇ°í ÀÖ½À´Ï´Ù. ...
Track>Session : > Recent Advances in Security
¹ßÇ¥Á¦¸ñ : APT Malware using Document Exploits
¹ßÇ¥ÀÚ : ÃÖ»ó¸í (ÆÀÀå/ÇϿ츮)
°­¿¬¿ä¾à : ÃÖ±Ù Àü¼¼°èÀûÀ¸·Î ±â¾÷ ¹× Á¶Á÷À» ´ë»óÀ¸·Î ÇÑ, À̸¥¹Ù APT(Áö´ÉÇü Áö¼Ó À§Çù) ÇØÅ· »ç°í°¡ ¸¹ÀÌ ¹ß»ýÇÏ°í ÀÖÀ¸¸ç, ´ëºÎºÐÀÇ APT °ø°ÝÀÇ ÃÖÃÊ °¨¿° °æ·Î·Î À̸ÞÀÏÀ» ÅëÇØ Ã·ºÎ...
Track>Session : > Current Issues in Security
¹ßÇ¥Á¦¸ñ : Cyber Terror and Cyber Crime Investigation
¹ßÇ¥ÀÚ : ±è¼±¿µ (°æÁ¤/»çÀ̹ö¼ö»ç´ë)
°­¿¬¿ä¾à : ¹üÁËÀÚµéÀº »õ·Î¿î ITȯ°æ¿¡ °¡Àå ºü¸£°Ô ÀûÀÀÇϸ鼭 »õ·Î¿î À¯ÇüÀÇ ¹üÁ˸¦ ¸¸µé¾î ³»°í ÀÖ´Ù. °­µµ, Àýµµ, »ç±â µî ±âÁ¸ ¹üÁ˺¸´Ù IT±â¼úÀ» È°¿ëÇÑ »çÀ̹ö ¹üÁË´Â ±Þ¼ÓÇÏ°Ô ...
Track>Session : > Current Issues in Security
¹ßÇ¥Á¦¸ñ : The Action Requirements of Personal Information Protection Act and its Issues
¹ßÇ¥ÀÚ : ¿À¿ë¼® (ÆÀÀå/KISA)
°­¿¬¿ä¾à : °³ÀÎÁ¤º¸º¸È£¹ýÀÌ ¡¯11.9.30 ½ÃÇàµÇ¾ú´Ù. ¹ý Àû¿ë´ë»ó »ç¾÷ÀÚ°¡ 350¸¸¿¡ ´ÞÇÔ¿¡µµ ªÀº À¯¿¹±â°£À¸·Î °³ÀÎÁ¤º¸º¸È£¸¦ À§ÇÑ °ü¸®Àû, ±â¼úÀû Á¶Ä¡ µîÀÇ Áغñ°¡ ¹ÌºñÇØ, ¡¯12.3¿ù±î...
Track>Session : > Current Issues in Security
¹ßÇ¥Á¦¸ñ : Copyrights and Security Issues in Smart Screen
¹ßÇ¥ÀÚ : ±ÇÇõÂù (Ã¥ÀÓ/ETRI)
°­¿¬¿ä¾à : ´Ù¾çÇÑ ½º¸¶Æ® ´Ü¸»ÀÇ ±Þ¼ÓÇÑ º¸±Þ°ú ÇÔ²² »ç¿ëÀÚ°¡ ±¸¸ÅÇÑ ¾Û, ÄÜÅÙÃ÷ ¹× À¥ ¼­ºñ½º µîÀ» ¾ðÁ¦ ¾îµð¼­³ª ´Ù¾çÇÑ ¸Åü°£ÀÇ ¿¬µ¿À» ÅëÇØ seamlessÇÏ°Ô ¼ÒºñÇÒ ¼ö ÀÖ´Â ½º¸¶Æ® ½º...
 01 02 03 04 05 06 07 08 09