• Àλ縻
  • Á¶Á÷Á¶Á÷
  • ÇÁ·Î±×·¥ÇÁ·Î±×·¥
  • µî·Ï/Âü°¡¾È³»µî·Ï/µî·Ï/Âü°¡¾È³»
  • °Ô½ÃÆÇ °Ô½ÃÆÇ
  • Past KRnet
  • ¼¼ºÎÇÁ·Î±×·¥

    ¼¼ºÎÇÁ·Î±×·¥

     

    88.   69
    Track > Session : > Cloud Computing: Services
    ¹ßÇ¥Á¦¸ñ : Cloud Security Service
    ¹ßÇ¥ÀÚ : À̼öÇü (ºÎÀå/HP)
    °­¿¬¿ä¾à : Áö³­ IT °ú°Å º¯È­¸¦ º¸¸é ¾à 10³â¿¡ Çѹø¾¿ Å« º¯È­¸¦ °Þ¾î ¿Ô½À´Ï´Ù. Áö±Ý ¿ì¸®°¡ ÇÊ¿ä·Î ÇÏ´Â º¯È­¸¦ À§ÇØ µµÀÔ ¶Ç´Â ÁغñÇÏ°íÀÚ Çϴ Ŭ¶ó¿ìµå ȯ°æ¿¡¼­ÀÇ º¸¾È¿¡ ´ëÇÑ Á¢±Ù°ú ¹æ¾ÈÀ» Á¦½ÃÇÏ°íÀÚ ÇÑ´Ù. 1. Ŭ¶ó¿ìµå º¸¾È¿¡ ´ëÇÑ ÀÌÇØ 2. Ŭ¶ó¿ìµå º¸¾ÈÀÇ ÁÖüÀÇ ¿ªÇÒ 3. Ŭ¶ó¿ìµå »ç¿ëÀÚÀÇ º¸¾È¿¡ ´ëÇÑ Á¢±Ù &#...more
    Track > Session : > B4G Technology
    ¹ßÇ¥Á¦¸ñ : 5G Mobile Communication
    ¹ßÇ¥ÀÚ : Á¶Àç¿ø (¼ö¼®/»ï¼ºÀüÀÚ)
    °­¿¬¿ä¾à : º» °­¿¬¿¡¼­´Â Â÷¼¼´ë À̵¿Åë½Å Àü¸Á¿¡ ´ëÇØ ¼Ò°³ÇÑ´Ù. ÃÖ±Ù ¸ð¹ÙÀÏ ¼­ºñ½ºÀÇ Æ®·£µå¿Í ±âÁ¸°ú´Â ±¸ºÐµÇ´Â Â÷¼¼´ë À̵¿Åë½ÅÀÇ È¯°æ º¯È­, ±×¸®°í À̷κÎÅÍ ¿¹»óµÇ´Â 5¼¼´ë À̵¿Åë½Å Àü¸Á°ú ¿ä±¸»çÇ×À» ¼Ò°³ÇÑ´Ù.more
    Track > Session : > B4G Technology
    ¹ßÇ¥Á¦¸ñ : Mobile Communication Technologies after LTE-Advanced
    ¹ßÇ¥ÀÚ : ¾ÈÀ翵 (ÆÀÀå/ETRI)
    °­¿¬¿ä¾à : 3GPP LTE-Advanced(Rel-10) ÀÌÈÄÀÇ Ç¥ÁØÈ­ µ¿Çâ°ú ÇöÀç Ç¥ÁØÈ­°¡ ÁøÇàÁßÀÎ LTE Rel-11ÀÇ ÁÖ¿ä ±â¼úÀ» ¸ÕÀú ¼³¸íÇÏ°í, ÇâÈÄÀÇ À̵¿Åë½Å ±â¼ú¿¡ ´ëÇÑ ¿ä±¸»çÇ× ¹× ±× ¿ä±¸»çÇ×À» ¸¸Á·Çϱâ À§ÇØ ÇÊ¿äÇÒ °ÍÀ¸·Î ¿¹»óµÇ´Â Èĺ¸ ±â¼úµéÀ» ¼Ò°³ÇÑ´Ù.more
    Track > Session : > B4G Technology
    ¹ßÇ¥Á¦¸ñ : Network Technologies for 5G Wireless Communications
    ¹ßÇ¥ÀÚ : ÀÌÁÖ¿ë (±³¼ö/KAIST)
    °­¿¬¿ä¾à : 5¼¼´ë À̵¿Åë½ÅÀº ÇöÀç´ëºñ1000¹èÀÇ ¿ë·® Áõ´ë¿Í ȹ±âÀûÀÎ ¿¡³ÊÁö Àý°¨, 1000¹èÀÇ ´Ü¸» Áõ´ë¿¡ µû¸¥ »ç¹°Áö´ÉÅë½Å Áö¿øÀ» Ư¡À¸·Î Á¤ÀÇÇغ¼ ¼ö ÀÖ´Ù. ¿ë·®À» Áõ´ë½ÃÅ°°í ÀúÀü·ÂÈ­ ¸ÁÀ» ¼³°èÇϱâ À§Çؼ­´Â ¼ÒÇü¼¿ Áß½ÉÀÇ ³×Æ®¿öÅ©·Î ¹ßÀüÇØ¾ß ÇÑ´Ù. È¿°úÀûÀÎ ¼ÒÇü¼¿À» Áö¿øÇϱâ À§Çؼ­´Â ¾ÈÅ׳ª/RF/baseband ÀÏüÇüÀÇ ÃʼÒ...more
    Track > Session : > Recent Advances in Security
    ¹ßÇ¥Á¦¸ñ : Hypervisor-Based Security for Cloud Computing Environments
    ¹ßÇ¥ÀÚ : ½Å¿µ»ó (¼±ÀÓ/KISA)
    °­¿¬¿ä¾à : Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀº ÃÖ±Ù IT ȯ°æ¿¡¼­ÀÇ °¡Àå Çõ½ÅÀûÀÎ º¯È­¸¦ À̲ø°í ÀÖ´Ù. ±×·¯³ª, º¸¾È À̽´°¡ Ŭ¶ó¿ìµå ÄÄÇ»Æà ±â¼úÀÇ Àû¿ë ¹× È°¼ºÈ­¿¡ ÀÖ¾î °¡Àå Å« °É¸²µ¹ÀÌ µÇ°í ÀÖ´Ù. º» °­¿¬¿¡¼­´Â Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀÇ ÇÙ½É ±â¼úÀÎ °¡»óÈ­ ±â¼ú (ÇÏÀÌÆÛ¹ÙÀÌÀú, °¡»ó¸Ó½Å À̵¿ µî)¿¡ °ü·ÃµÈ º¸¾È Ãë¾àÁ¡ ¹× À§ÇùÀ» ¼Ò°³ÇÏ°í, ÀÌÀÇ ...more
    Track > Session : > Recent Advances in Security
    ¹ßÇ¥Á¦¸ñ : Auditing Android Applications
    ¹ßÇ¥ÀÚ : ¾çÁ¤±Ô (ÀÌ»ç/¶ó¿Â½ÃÅ¥¸®Æ¼)
    °­¿¬¿ä¾à : ¸î ³â µ¿¾È IT ºÐ¾ß¿Í º¸¾È ºÐ¾ß´Â Å« º¯È­¸¦ °Þ°í ÀÖ½À´Ï´Ù. ¼­¹ö Á߽ɿ¡¼­ Desktop Áß½ÉÀ¸·Î, Desktop Á߽ɿ¡¼­ Mobile (Smart Phone) Áß½ÉÀ¸·Î ±Þ¼ÓÈ÷ º¯È­µÇ°í ÀÖ½À´Ï´Ù. ±× Á߽ɿ¡´Â AppleÀÇ IOS¿Í GoogleÀÇ Android OS°¡ ÀÖ½À´Ï´Ù. º» °­¿¬¿¡¼­´Â ±× Áß Android OS¿¡¼­ ±¸µ¿µÇ´Â ApplicationÀÇ Ãë¾àÁ¡°ú ÇØ´ç Ãë¾à...more
    Track > Session : > Recent Advances in Security
    ¹ßÇ¥Á¦¸ñ : APT Malware using Document Exploits
    ¹ßÇ¥ÀÚ : ÃÖ»ó¸í (ÆÀÀå/ÇϿ츮)
    °­¿¬¿ä¾à : ÃÖ±Ù Àü¼¼°èÀûÀ¸·Î ±â¾÷ ¹× Á¶Á÷À» ´ë»óÀ¸·Î ÇÑ, À̸¥¹Ù APT(Áö´ÉÇü Áö¼Ó À§Çù) ÇØÅ· »ç°í°¡ ¸¹ÀÌ ¹ß»ýÇÏ°í ÀÖÀ¸¸ç, ´ëºÎºÐÀÇ APT °ø°ÝÀÇ ÃÖÃÊ °¨¿° °æ·Î·Î À̸ÞÀÏÀ» ÅëÇØ Ã·ºÎµÈ ¹®¼­ ÆÄÀÏÀÌ ¾Ç¿ëµÇ°í ÀÖ´Ù. ÀÌ·¯ÇÑ ¹®¼­ ÆÄÀÏÀº »ç¿ëÀÚ¿¡ ÀÇÇØ ¿­¶÷µÉ °æ¿ì, ¹®¼­ ÆíÁý ÇÁ·Î±×·¥ÀÇ Ãë¾àÁ¡À» ÀÌ¿ëÇÏ¿© ¾Ç¼ºÄڵ带 ¼³Ä¡ÇÏ°Ô ...more
    Track > Session : > Current Issues in Security
    ¹ßÇ¥Á¦¸ñ : Cyber Terror and Cyber Crime Investigation
    ¹ßÇ¥ÀÚ : ±è¼±¿µ (°æÁ¤/»çÀ̹ö¼ö»ç´ë)
    °­¿¬¿ä¾à : ¹üÁËÀÚµéÀº »õ·Î¿î ITȯ°æ¿¡ °¡Àå ºü¸£°Ô ÀûÀÀÇϸ鼭 »õ·Î¿î À¯ÇüÀÇ ¹üÁ˸¦ ¸¸µé¾î ³»°í ÀÖ´Ù. °­µµ, Àýµµ, »ç±â µî ±âÁ¸ ¹üÁ˺¸´Ù IT±â¼úÀ» È°¿ëÇÑ »çÀ̹ö ¹üÁË´Â ±Þ¼ÓÇÏ°Ô Áõ°¡ÇÏ°í ÀÖ´Ù. ƯÈ÷ ±âÁ¸ ¹üÁË¿Í IT ±â¼úÀÌ À¶ÇÕµÈ »õ·Î¿î À¯ÇüÀÇ ¹üÁË°¡ ³ªÅ¸³ª°í ÀÖ´Ù. D-dos°ø°ÝÀ» ÀÌ¿ëÇÑ Çù¹Ú, °³ÀÎÁ¤º¸¸¦ ÀÌ¿ëÇÑ º¸À̽º...more
    Track > Session : > Current Issues in Security
    ¹ßÇ¥Á¦¸ñ : The Action Requirements of Personal Information Protection Act and its Issues
    ¹ßÇ¥ÀÚ : ¿À¿ë¼® (ÆÀÀå/KISA)
    °­¿¬¿ä¾à : °³ÀÎÁ¤º¸º¸È£¹ýÀÌ ¡¯11.9.30 ½ÃÇàµÇ¾ú´Ù. ¹ý Àû¿ë´ë»ó »ç¾÷ÀÚ°¡ 350¸¸¿¡ ´ÞÇÔ¿¡µµ ªÀº À¯¿¹±â°£À¸·Î °³ÀÎÁ¤º¸º¸È£¸¦ À§ÇÑ °ü¸®Àû, ±â¼úÀû Á¶Ä¡ µîÀÇ Áغñ°¡ ¹ÌºñÇØ, ¡¯12.3¿ù±îÁö 6°³¿ùÀÇ °èµµ±â°£À» µÎ¾î ¹ý¿¡¼­ ¿ä±¸ÇÏ´Â »çÇ×À» ÁغñÇϵµ·Ï Á¶Ä¡ÇÏ¿´´Ù. ±×·³¿¡µµ ºÒ±¸ÇÏ°í ¹ý Àû¿ë »ç¾÷ÀÚ Áß ¸¹Àº ¼ö¸¦ Â÷ÁöÇÏ´Â °³Àλç...more
    Track > Session : > Current Issues in Security
    ¹ßÇ¥Á¦¸ñ : Copyrights and Security Issues in Smart Screen
    ¹ßÇ¥ÀÚ : ±ÇÇõÂù (Ã¥ÀÓ/ETRI)
    °­¿¬¿ä¾à : ´Ù¾çÇÑ ½º¸¶Æ® ´Ü¸»ÀÇ ±Þ¼ÓÇÑ º¸±Þ°ú ÇÔ²² »ç¿ëÀÚ°¡ ±¸¸ÅÇÑ ¾Û, ÄÜÅÙÃ÷ ¹× À¥ ¼­ºñ½º µîÀ» ¾ðÁ¦ ¾îµð¼­³ª ´Ù¾çÇÑ ¸Åü°£ÀÇ ¿¬µ¿À» ÅëÇØ seamlessÇÏ°Ô ¼ÒºñÇÒ ¼ö ÀÖ´Â ½º¸¶Æ® ½ºÅ©¸° ½Ã´ë°¡ µµ·¡ÇÏ¿´´Ù. ÇöÀç ½º¸¶Æ® ½ºÅ©¸°Àº ÄÜÅÙÃ÷ÀÇ N-½ºÅ©¸° °øÀ¯, Digital Signage, ASMD(Adaptive Source Multi-Device), Áõ°­Çö½Ç µî ´Ù...more
     01 02 03 04 05 06 07 08 09


    TOP