¼¼ºÎÇÁ·Î±×·¥

 

78.   38
Track > Session : Advanced Internet Technology > Beyond NGN/BCN toward True Convergence
¹ßÇ¥Á¦¸ñ : Converged Internet Service Architecture and Deployment Scenarios
¹ßÇ¥ÀÚ : À̼þÈñ (±³¼ö/ÀÎÁ¦´ë)
°­¿¬¿ä¾à : ITU-T µîÀ» Áß½ÉÀ¸·Î Â÷¼¼´ë Åë½Å ³×Æ®¿öÅ©¿¡¼­ Á¦°øµÉ Â÷¼¼´ë Åë½Å ¼­ºñ½º¿¡ ´ëÇÑ Ç¥ÁØÈ­ ¿¬±¸°¡ È° ¹ßÈ÷ ÁøÇàµÇ°í ÀÖ´Ù. ƯÈ÷ À¯¼± ³×Æ®¿öÅ©¿Í ¹«¼± ³×Æ®¿öÅ©, ¹æ¼Û ¼­ºñ½º¿Í Åë½Å ¼­ºñ½º °£ÀÇ À¶ÇÕÀº ¹°·Ð ¼­ºñ½º ±â´É °£ÀÇ À¶ÇÕ±îÁöµµ °í·ÁÇÑ Â÷¼¼´ë À¶ÇÕ ¼­ºñ½º¿¡ ´ëÇÑ Ç¥ÁØÈ­°¡ È°¹ßÈ÷ ÁøÇàµÇ¾î ¸î °ÇÀÇ ±Ç°í¾È...more
Track > Session : Advanced Internet Technology > Overlay Networking Technology
¹ßÇ¥Á¦¸ñ : Next Generation Content Delivery Technology with P2P
¹ßÇ¥ÀÚ : ¼­¿µÀÏ (¼ö¼®/KT)
°­¿¬¿ä¾à : - ¸ÖƼij½ºÆ®¸¦ Æ÷ÇÔÇÑ ÄÜÅÙÆ® Àü´Þ ±â¼ú¿¡ ´ëÇÑ °£·«ÇÑ ¼Ò°³ ¹× °ü·Ã ³×Æ®¿öÅ© ±â¼ú, ¼³°è/±¸Ãà °í·Á »çÇ×À» »ìÆ캸°í, - P2P ±â¼úÀÇ °£·«ÇÑ ¼Ò°³ ¹× IPTV¸¦ Æ÷ÇÔÇÑ P2P±â¹ÝÀÇ ÄÜÅÙÆ® Àü´Þ ±â¼ú, P4P µîÀ» Æ÷ÇÔÇÏ´Â Â÷¼¼´ë P 2P ±â¼úÀÇ µ¿ÇâÀ» »ìÆ캸°í, - P2P ÇÙ½É ±â¼úÀ» ÀÌ¿ëÇÏ´Â Â÷¼¼´ë ÄÜÅÙÆ® Àü´Þ ±â¼ú ¹× ISP¿Í...more
Track > Session : Advanced Internet Technology > Overlay Networking Technology
¹ßÇ¥Á¦¸ñ : Sharing Sensory Information with P2P
¹ßÇ¥ÀÚ : ¼®½ÂÁØ (±³¼ö/°æ³²´ë)
°­¿¬¿ä¾à : ¿ä»çÀÌ ¼¾¼­ ³×Æ®¿öÅ© ½Ã½ºÅÛÀº À¯ºñÄõÅͽº »çȸ¸¦ ¸¸µé±â À§ÇÑ ÇÙ½ÉÀÎÇÁ¶ó·Î¼­ °í·ÁµÇ°í ÀÖ´Ù. ÇÏ Áö¸¸ Áö±Ý±îÁöÀÇ Àü ¼¼°èÀûÀ¸·Î ±¸ÃàµÇ¾î¿Â ¼¾¼­ ³×Æ®¿öÅ© ½Ã½ºÅÛÀº ´ëºÎºÐ Æó¼âÇüÀÇ ±¸Á¶·Î µÇ¾î ÀÖ¾î ƯÁ¤ ÀÀ¿ë ¼­ºñ½º¸¦ ¸ñÀûÀ¸·Î ¿î¿µµÇ°í ÀÖ´Ù. ÇÏÁö¸¸ ¼¼°èÀûÀ¸·Î Èð¾îÁ® Àְųª ȤÀº ´Ù¾çÇÏ°í ¸¹Àº ¼¾¼­Á¤º¸¸¦ ...more
Track > Session : Advanced Internet Technology > Overlay Networking Technology
¹ßÇ¥Á¦¸ñ : Distributed Service Overlay Networking
¹ßÇ¥ÀÚ : ÀÌÁ¾È­ (Ã¥ÀÓ¿¬±¸¿ø/ETRI)
°­¿¬¿ä¾à : - ÃÖ±Ù ¿À¹ö·¹ÀÌ ³×Æ®¿öÅ· ±â¼úÀº IPTV, P2P ¼­ºñ½º¿¡ Á¢¸ñµÇ¾î ¼­ºñ½º/ÄÁÅÙÆ®³ª µ¥ÀÌÅÍ Å½»ö, ¿À¹ö·¹ ÀÌ ¶ó¿ìÆà Á¤º¸ ±³È¯, ¸ÖƼij½ºÆ® ÅäÆú·ÎÁö ±â¹Ý ÃÖÀûÀÇ °æ·Î ±¸¼ºÀ̳ª ŽÁö µî ¼¼ºÎ ±â¼ú¿¡ ´ëÇØ ¿¬ ±¸°¡ ÁøÇàµÇ°í ÀÖÀ½ - ´õ¿íÀÌ ÀÀ¿ë ¼­ºñ½ºÀÇ Æ¯¼ºÀÌ ´Ù¾çÈ­µÇ°í, ºÐ»êÈ­µÇ¸ç, ´Éµ¿Àû ±â´ÉÀÌ Ãß°¡µÇ¸é¼­ À̸¦ Áö...more
Track > Session : Advanced Internet Technology > Mobile Network Technology
¹ßÇ¥Á¦¸ñ : Fast Handover Issues of Mobile Networks
¹ßÇ¥ÀÚ : ÇÑ¿¬Èñ (±³¼ö/Çѱ¹±â¼ú±³À°´ë)
°­¿¬¿ä¾à : All-IP¸¦ ÁöÇâÇÏ´Â Â÷¼¼´ë À̵¿Åë½Å ³×Æ®¿öÅ©¿¡¼­ À̵¿ ´Ü¸»ÀÌ ±âÁö±¹À» ¿Å°Ü°¥ ¶§³ª IP ³×Æ®¿öÅ©¸¦ ¿Å°Ü°¥ ¶§ ÀÚ½ÅÀÌ ÇöÀç ¿¬°áÇÏ°í ÀÖ´Â ¼¼¼Ç¿¡ ´ëÇÏ¿© °í¼Ó ÇÚµå¿À¹ö¸¦ Áö¿øÇÏ´Â °ÍÀº »ç¿ëÀڵ鿡°Ô ³ôÀº QoS/QoE¸¦ Á¦°øÇÏ´Â Ãø¸é¿¡¼­ ¸Å¿ì Áß¿äÇÑ ±â¼ú·Î ÀνĵȴÙ. º» °­¿¬Àº À̵¿Åë½Å ³×Æ®¿öÅ©¿¡ Àû¿ë °¡´ÉÇÑ ºü...more
Track > Session : Advanced Internet Technology > Mobile Network Technology
¹ßÇ¥Á¦¸ñ : Multiple Interface Issues of Mobile Node in IETF
¹ßÇ¥ÀÚ : È«¿ë±Ù (¼±ÀÓ/ETRI)
°­¿¬¿ä¾à : ÃÖ±Ù IETF¿¡¼­´Â ´Ü¸»ÀÌ ´ÙÁß ³×Æ®¿öÅ© ÀÎÅÍÆäÀ̽º¸¦ »ç¿ëÇÔÀ¸·Î½á »ý±â´Â ¹®Á¦Á¡À» ÇØ°áÇϱâ À§ÇÏ ¿© ¿©·¯ ¿¬±¸°¡ ÁøÇà Áß¿¡ ÀÖ´Ù. IETF MEXT WG¿¡¼­´Â Mobile IPv6¿Í °ü·ÃµÈ ´ÙÁß ÀÎÅÍÆäÀ̽º ¿¬±¸°¡ ÁøÇà µÇ°í ÀÖÀ¸¸ç, WG·Î ½ÂÀ뵃 ¿¹Á¤ÀÎ NETEXT, MIF¿¡¼­´Â ¶Ç ´Ù¸¥ ¹æÇâÀ¸·Î ´ÙÁß ÀÎÅÍÆäÀ̽º ¿¬±¸ °¡ ÁøÇàµÇ°í ÀÖ´Ù...more
Track > Session : Advanced Internet Technology > Mobile Network Technology
¹ßÇ¥Á¦¸ñ : Quality Assurance of Convergence Service in the WiBro Network
¹ßÇ¥ÀÚ : ±èÇü¼ö (¼ö¼®/KT)
°­¿¬¿ä¾à : Åë½Å°ú ¹æ¼ÛÀÇ À¶ÇÕ ±×¸®°í À¯¹«¼±ÅëÇÕ ¼­ºñ½º Ãß¼¼ ¹ßÀü¿¡ µû¶ó ¹«¼±ÀÎÅÍ³Ý ¿ëµµ·Î È°¿ëµÇ´ø WiBro ¸ÁÀ» ÀÌ¿ëÇÏ¿© Åë¹æÀ¶ÇÕ¼­ºñ½º¸¦ Á¦°øÇÏ´Â µ¥¿¡ ´ëÇÑ °ü½ÉÀÌ ³ô¾ÆÁö°í ÀÖ´Ù. À½¼ºÀ̳ª ¿µ»óÅëÈ­, TV µîÀ¸·Î ´ëÇ¥µÇ´Â Åë¹æÀ¶ÇÕ¼­ºñ½º´Â µ¥ÀÌÅÍ ¼­ºñ½º¿¡ ºñÇØ ¾ö°ÝÇÑ Àü´Þ Ç°Áú º¸ÀåÀÌ ¿ä±¸µÇ¸ç À̸¦ À§Çؼ­ WiBroÀÇ...more
Track > Session : Security and its Beyond > Bots & Malware : Large-scale Exploits and Emergent Threats
¹ßÇ¥Á¦¸ñ : BotNet and Mass DDoS Attack
¹ßÇ¥ÀÚ : ÀÌÈñÁ¶ (±³¼ö/°í·Á´ë)
°­¿¬¿ä¾à : º¿³ÝÀº ºÒƯÁ¤ ´Ù¼öÀÇ ÄÄÇ»Å͸¦ ¾Ç¼ºÄڵ忡 °¨¿°½ÃÄÑ ¿ø°Ý¿¡¼­ Á¶Á¤ÇÒ ¼ö ÀÖ°Ô ÇÏ´Â Á»ºñ ÄÄÇ»Å͵é ÀÇ ³×Æ®¿öÅ©ÀÌ´Ù. º¿³ÝÀº 2004³âºÎÅÍ ¹ß°ßµÇ¾î 5³âÀ̶ó´Â ªÀº ¿ª»ç¸¦ Áö´Ï°í ÀÖÀ¸³ª ¾Ç¼ºÄÚµåÀÇ È° ¿ëµµ¸¦ ±Ø´ëÈ­ ÇÏ¿©, ÇöÀç ´ëºÎºÐÀÇ DDoS °ø°Ý¿¡ ÀÌ¿ëµÇ°í ÀÖÀ¸¸ç, 80%ÀÌ»óÀÇ ½ºÆÔ¸ÞÀÏ Àü¼Û, °³ÀÎ Á¤º¸ À¯ÃâµîÀÇ »ç...more
Track > Session : Security and its Beyond > Bots & Malware : Large-scale Exploits and Emergent Threats
¹ßÇ¥Á¦¸ñ : Exploiting On-line Internet Banking
¹ßÇ¥ÀÚ : ¼ºÀç¸ð (ÆÀÀå/±ÝÀ¶º¸¾È¿¬±¸¿ø)
°­¿¬¿ä¾à : 1998³â ±¹³»¿¡ ÀÎÅͳݹðÅ·ÀÌ µµÀÔµÈ ÀÌÈÄ ÀüÀÚ±ÝÀ¶°Å·¡´Â ±× ÆíÀǼºÀ¸·Î ÀÎÇÏ¿© 2008³â 9¿ùÀ» ±âÁØ À¸·Î ÀºÇà°ú Áõ±Ç ¾÷¹«¿¡¼­ °¢°¢ 81.8%¿Í 78.5%¸¦ Â÷ÁöÇÏ°í ÀÖ´Ù. ÀüÀÚ±ÝÀ¶°Å·¡°¡ È°¼ºÈ­ µÇ´Ù º¸ ´Ï ÀÌÁ¦´Â ÀÌ¿Í °ü·Ã ±ÝÀüÀû À̵æÀ» ¸ñÀûÀ¸·Î ÇÏ´Â ÇØÅ·½Ãµµ°¡ ¹ß»ýÇÏ°í ÀÖ´Ù. ÃÖ±Ù ¾ð·Ð º¸µµ¸¦ Åë ÇØ ÀÛ³â°ú ¿ÃÇØ ÃÊ...more
Track > Session : Security and its Beyond > Bots & Malware : Large-scale Exploits and Emergent Threats
¹ßÇ¥Á¦¸ñ : Unwanted Traffic Monitoring and Malware Defenses
¹ßÇ¥ÀÚ : ¿ÀÁøÅ (Ã¥ÀÓ/ETRI)
°­¿¬¿ä¾à : ³×Æ®¿öÅ© °ø°ÝÀ» ŽÁöÇϱâ À§ÇØ Æ®·¡ÇÈ¿¡ ¸ð´ÏÅ͸µ ±â¼úÀ» È°¿ëÇÏ°í ÀÖÁö¸¸, ÀÌ·¯ÇÑ ±â¹ýÀº °ø°ÝÀÇ ÁøÇà ´Ü°è¿¡ °ø°Ý¿¡ ´ëÇÑ ÀϺÎÀÇ Á¤º¸¸¦ Á¦°øÇÏ°í ÀÖ´Ù. ¿¹¸¦ µé¾î DDoS °ø°ÝÀÌ ¹ß»ýÇÏ´Â °æ¿ì, À̸¦ Æ®·¡ÇÈ ¸ð´ÏÅ͸µ ±â¼úÀ» Àû¿ëÇÏ¿© °ø°Ý ¿©ºÎ¸¦ È®ÀÎÇÒ ¼ö ÀÖ´Ù. ÇÏÁö¸¸ ÀÌ·¯ÇÑ °ø°ÝÀÇ ¿øÀÎÀ» ±Ô¸íÇÏ ±â À§Çؼ­´Â ...more
 01 02 03 04 05 06 07 08