¼¼ºÎÇÁ·Î±×·¥
78
.
3
8
---- ¼±Åà ----
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
---- ¼±Åà ----
---- ¼±Åà ----
Track
>
Session :
Advanced Internet Technology
>
Beyond NGN/BCN toward True Convergence
¹ßÇ¥Á¦¸ñ :
Converged Internet Service Architecture and Deployment Scenarios
¹ßÇ¥ÀÚ :
À̼þÈñ (±³¼ö/ÀÎÁ¦´ë)
°¿¬¿ä¾à :
ITU-T µîÀ» Áß½ÉÀ¸·Î Â÷¼¼´ë Åë½Å ³×Æ®¿öÅ©¿¡¼ Á¦°øµÉ Â÷¼¼´ë Åë½Å ¼ºñ½º¿¡ ´ëÇÑ Ç¥ÁØÈ ¿¬±¸°¡ È° ¹ßÈ÷ ÁøÇàµÇ°í ÀÖ´Ù. ƯÈ÷ À¯¼± ³×Æ®¿öÅ©¿Í ¹«¼± ³×Æ®¿öÅ©, ¹æ¼Û ¼ºñ½º¿Í Åë½Å ¼ºñ½º °£ÀÇ À¶ÇÕÀº ¹°·Ð ¼ºñ½º ±â´É °£ÀÇ À¶ÇÕ±îÁöµµ °í·ÁÇÑ Â÷¼¼´ë À¶ÇÕ ¼ºñ½º¿¡ ´ëÇÑ Ç¥ÁØÈ°¡ È°¹ßÈ÷ ÁøÇàµÇ¾î ¸î °ÇÀÇ ±Ç°í¾È...more
Track
>
Session :
Advanced Internet Technology
>
Overlay Networking Technology
¹ßÇ¥Á¦¸ñ :
Next Generation Content Delivery Technology with P2P
¹ßÇ¥ÀÚ :
¼¿µÀÏ (¼ö¼®/KT)
°¿¬¿ä¾à :
- ¸ÖƼij½ºÆ®¸¦ Æ÷ÇÔÇÑ ÄÜÅÙÆ® Àü´Þ ±â¼ú¿¡ ´ëÇÑ °£·«ÇÑ ¼Ò°³ ¹× °ü·Ã ³×Æ®¿öÅ© ±â¼ú, ¼³°è/±¸Ãà °í·Á »çÇ×À» »ìÆ캸°í, - P2P ±â¼úÀÇ °£·«ÇÑ ¼Ò°³ ¹× IPTV¸¦ Æ÷ÇÔÇÑ P2P±â¹ÝÀÇ ÄÜÅÙÆ® Àü´Þ ±â¼ú, P4P µîÀ» Æ÷ÇÔÇÏ´Â Â÷¼¼´ë P 2P ±â¼úÀÇ µ¿ÇâÀ» »ìÆ캸°í, - P2P ÇÙ½É ±â¼úÀ» ÀÌ¿ëÇÏ´Â Â÷¼¼´ë ÄÜÅÙÆ® Àü´Þ ±â¼ú ¹× ISP¿Í...more
Track
>
Session :
Advanced Internet Technology
>
Overlay Networking Technology
¹ßÇ¥Á¦¸ñ :
Sharing Sensory Information with P2P
¹ßÇ¥ÀÚ :
¼®½ÂÁØ (±³¼ö/°æ³²´ë)
°¿¬¿ä¾à :
¿ä»çÀÌ ¼¾¼ ³×Æ®¿öÅ© ½Ã½ºÅÛÀº À¯ºñÄõÅͽº »çȸ¸¦ ¸¸µé±â À§ÇÑ ÇÙ½ÉÀÎÇÁ¶ó·Î¼ °í·ÁµÇ°í ÀÖ´Ù. ÇÏ Áö¸¸ Áö±Ý±îÁöÀÇ Àü ¼¼°èÀûÀ¸·Î ±¸ÃàµÇ¾î¿Â ¼¾¼ ³×Æ®¿öÅ© ½Ã½ºÅÛÀº ´ëºÎºÐ Æó¼âÇüÀÇ ±¸Á¶·Î µÇ¾î ÀÖ¾î ƯÁ¤ ÀÀ¿ë ¼ºñ½º¸¦ ¸ñÀûÀ¸·Î ¿î¿µµÇ°í ÀÖ´Ù. ÇÏÁö¸¸ ¼¼°èÀûÀ¸·Î Èð¾îÁ® Àְųª ȤÀº ´Ù¾çÇÏ°í ¸¹Àº ¼¾¼Á¤º¸¸¦ ...more
Track
>
Session :
Advanced Internet Technology
>
Overlay Networking Technology
¹ßÇ¥Á¦¸ñ :
Distributed Service Overlay Networking
¹ßÇ¥ÀÚ :
ÀÌÁ¾È (Ã¥ÀÓ¿¬±¸¿ø/ETRI)
°¿¬¿ä¾à :
- ÃÖ±Ù ¿À¹ö·¹ÀÌ ³×Æ®¿öÅ· ±â¼úÀº IPTV, P2P ¼ºñ½º¿¡ Á¢¸ñµÇ¾î ¼ºñ½º/ÄÁÅÙÆ®³ª µ¥ÀÌÅÍ Å½»ö, ¿À¹ö·¹ ÀÌ ¶ó¿ìÆà Á¤º¸ ±³È¯, ¸ÖƼij½ºÆ® ÅäÆú·ÎÁö ±â¹Ý ÃÖÀûÀÇ °æ·Î ±¸¼ºÀ̳ª ŽÁö µî ¼¼ºÎ ±â¼ú¿¡ ´ëÇØ ¿¬ ±¸°¡ ÁøÇàµÇ°í ÀÖÀ½ - ´õ¿íÀÌ ÀÀ¿ë ¼ºñ½ºÀÇ Æ¯¼ºÀÌ ´Ù¾çȵǰí, ºÐ»êȵǸç, ´Éµ¿Àû ±â´ÉÀÌ Ãß°¡µÇ¸é¼ À̸¦ Áö...more
Track
>
Session :
Advanced Internet Technology
>
Mobile Network Technology
¹ßÇ¥Á¦¸ñ :
Fast Handover Issues of Mobile Networks
¹ßÇ¥ÀÚ :
ÇÑ¿¬Èñ (±³¼ö/Çѱ¹±â¼ú±³À°´ë)
°¿¬¿ä¾à :
All-IP¸¦ ÁöÇâÇÏ´Â Â÷¼¼´ë À̵¿Åë½Å ³×Æ®¿öÅ©¿¡¼ À̵¿ ´Ü¸»ÀÌ ±âÁö±¹À» ¿Å°Ü°¥ ¶§³ª IP ³×Æ®¿öÅ©¸¦ ¿Å°Ü°¥ ¶§ ÀÚ½ÅÀÌ ÇöÀç ¿¬°áÇÏ°í ÀÖ´Â ¼¼¼Ç¿¡ ´ëÇÏ¿© °í¼Ó ÇÚµå¿À¹ö¸¦ Áö¿øÇÏ´Â °ÍÀº »ç¿ëÀڵ鿡°Ô ³ôÀº QoS/QoE¸¦ Á¦°øÇÏ´Â Ãø¸é¿¡¼ ¸Å¿ì Áß¿äÇÑ ±â¼ú·Î ÀνĵȴÙ. º» °¿¬Àº À̵¿Åë½Å ³×Æ®¿öÅ©¿¡ Àû¿ë °¡´ÉÇÑ ºü...more
Track
>
Session :
Advanced Internet Technology
>
Mobile Network Technology
¹ßÇ¥Á¦¸ñ :
Multiple Interface Issues of Mobile Node in IETF
¹ßÇ¥ÀÚ :
È«¿ë±Ù (¼±ÀÓ/ETRI)
°¿¬¿ä¾à :
ÃÖ±Ù IETF¿¡¼´Â ´Ü¸»ÀÌ ´ÙÁß ³×Æ®¿öÅ© ÀÎÅÍÆäÀ̽º¸¦ »ç¿ëÇÔÀ¸·Î½á »ý±â´Â ¹®Á¦Á¡À» ÇØ°áÇϱâ À§ÇÏ ¿© ¿©·¯ ¿¬±¸°¡ ÁøÇà Áß¿¡ ÀÖ´Ù. IETF MEXT WG¿¡¼´Â Mobile IPv6¿Í °ü·ÃµÈ ´ÙÁß ÀÎÅÍÆäÀ̽º ¿¬±¸°¡ ÁøÇà µÇ°í ÀÖÀ¸¸ç, WG·Î ½ÂÀ뵃 ¿¹Á¤ÀÎ NETEXT, MIF¿¡¼´Â ¶Ç ´Ù¸¥ ¹æÇâÀ¸·Î ´ÙÁß ÀÎÅÍÆäÀ̽º ¿¬±¸ °¡ ÁøÇàµÇ°í ÀÖ´Ù...more
Track
>
Session :
Advanced Internet Technology
>
Mobile Network Technology
¹ßÇ¥Á¦¸ñ :
Quality Assurance of Convergence Service in the WiBro Network
¹ßÇ¥ÀÚ :
±èÇü¼ö (¼ö¼®/KT)
°¿¬¿ä¾à :
Åë½Å°ú ¹æ¼ÛÀÇ À¶ÇÕ ±×¸®°í À¯¹«¼±ÅëÇÕ ¼ºñ½º Ãß¼¼ ¹ßÀü¿¡ µû¶ó ¹«¼±ÀÎÅÍ³Ý ¿ëµµ·Î È°¿ëµÇ´ø WiBro ¸ÁÀ» ÀÌ¿ëÇÏ¿© Åë¹æÀ¶ÇÕ¼ºñ½º¸¦ Á¦°øÇÏ´Â µ¥¿¡ ´ëÇÑ °ü½ÉÀÌ ³ô¾ÆÁö°í ÀÖ´Ù. À½¼ºÀ̳ª ¿µ»óÅëÈ, TV µîÀ¸·Î ´ëÇ¥µÇ´Â Åë¹æÀ¶ÇÕ¼ºñ½º´Â µ¥ÀÌÅÍ ¼ºñ½º¿¡ ºñÇØ ¾ö°ÝÇÑ Àü´Þ Ç°Áú º¸ÀåÀÌ ¿ä±¸µÇ¸ç À̸¦ À§Çؼ WiBroÀÇ...more
Track
>
Session :
Security and its Beyond
>
Bots & Malware : Large-scale Exploits and Emergent Threats
¹ßÇ¥Á¦¸ñ :
BotNet and Mass DDoS Attack
¹ßÇ¥ÀÚ :
ÀÌÈñÁ¶ (±³¼ö/°í·Á´ë)
°¿¬¿ä¾à :
º¿³ÝÀº ºÒƯÁ¤ ´Ù¼öÀÇ ÄÄÇ»Å͸¦ ¾Ç¼ºÄڵ忡 °¨¿°½ÃÄÑ ¿ø°Ý¿¡¼ Á¶Á¤ÇÒ ¼ö ÀÖ°Ô ÇÏ´Â Á»ºñ ÄÄÇ»Å͵é ÀÇ ³×Æ®¿öÅ©ÀÌ´Ù. º¿³ÝÀº 2004³âºÎÅÍ ¹ß°ßµÇ¾î 5³âÀ̶ó´Â ªÀº ¿ª»ç¸¦ Áö´Ï°í ÀÖÀ¸³ª ¾Ç¼ºÄÚµåÀÇ È° ¿ëµµ¸¦ ±Ø´ëÈ ÇÏ¿©, ÇöÀç ´ëºÎºÐÀÇ DDoS °ø°Ý¿¡ ÀÌ¿ëµÇ°í ÀÖÀ¸¸ç, 80%ÀÌ»óÀÇ ½ºÆÔ¸ÞÀÏ Àü¼Û, °³ÀÎ Á¤º¸ À¯ÃâµîÀÇ »ç...more
Track
>
Session :
Security and its Beyond
>
Bots & Malware : Large-scale Exploits and Emergent Threats
¹ßÇ¥Á¦¸ñ :
Exploiting On-line Internet Banking
¹ßÇ¥ÀÚ :
¼ºÀç¸ð (ÆÀÀå/±ÝÀ¶º¸¾È¿¬±¸¿ø)
°¿¬¿ä¾à :
1998³â ±¹³»¿¡ ÀÎÅͳݹðÅ·ÀÌ µµÀÔµÈ ÀÌÈÄ ÀüÀÚ±ÝÀ¶°Å·¡´Â ±× ÆíÀǼºÀ¸·Î ÀÎÇÏ¿© 2008³â 9¿ùÀ» ±âÁØ À¸·Î ÀºÇà°ú Áõ±Ç ¾÷¹«¿¡¼ °¢°¢ 81.8%¿Í 78.5%¸¦ Â÷ÁöÇÏ°í ÀÖ´Ù. ÀüÀÚ±ÝÀ¶°Å·¡°¡ È°¼ºÈ µÇ´Ù º¸ ´Ï ÀÌÁ¦´Â ÀÌ¿Í °ü·Ã ±ÝÀüÀû À̵æÀ» ¸ñÀûÀ¸·Î ÇÏ´Â ÇØÅ·½Ãµµ°¡ ¹ß»ýÇÏ°í ÀÖ´Ù. ÃÖ±Ù ¾ð·Ð º¸µµ¸¦ Åë ÇØ ÀÛ³â°ú ¿ÃÇØ ÃÊ...more
Track
>
Session :
Security and its Beyond
>
Bots & Malware : Large-scale Exploits and Emergent Threats
¹ßÇ¥Á¦¸ñ :
Unwanted Traffic Monitoring and Malware Defenses
¹ßÇ¥ÀÚ :
¿ÀÁøÅ (Ã¥ÀÓ/ETRI)
°¿¬¿ä¾à :
³×Æ®¿öÅ© °ø°ÝÀ» ŽÁöÇϱâ À§ÇØ Æ®·¡ÇÈ¿¡ ¸ð´ÏÅ͸µ ±â¼úÀ» È°¿ëÇÏ°í ÀÖÁö¸¸, ÀÌ·¯ÇÑ ±â¹ýÀº °ø°ÝÀÇ ÁøÇà ´Ü°è¿¡ °ø°Ý¿¡ ´ëÇÑ ÀϺÎÀÇ Á¤º¸¸¦ Á¦°øÇÏ°í ÀÖ´Ù. ¿¹¸¦ µé¾î DDoS °ø°ÝÀÌ ¹ß»ýÇÏ´Â °æ¿ì, À̸¦ Æ®·¡ÇÈ ¸ð´ÏÅ͸µ ±â¼úÀ» Àû¿ëÇÏ¿© °ø°Ý ¿©ºÎ¸¦ È®ÀÎÇÒ ¼ö ÀÖ´Ù. ÇÏÁö¸¸ ÀÌ·¯ÇÑ °ø°ÝÀÇ ¿øÀÎÀ» ±Ô¸íÇÏ ±â À§Çؼ´Â ...more
01
02
03
04
05
06
07
08