¼¼ºÎÇÁ·Î±×·¥
83
.
8
9
---- ¼±Åà ----
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
---- ¼±Åà ----
---- ¼±Åà ----
Track
>
Session :
New Research Opportunities
>
Tactical Communications and Networks
¹ßÇ¥Á¦¸ñ :
MAC for Tactical Communication Networks
¹ßÇ¥ÀÚ :
±èº´¼ (±³¼ö/È«ÀÍ´ë)
°¿¬¿ä¾à :
¿À´Ã³¯ÀÇ µ¥ÀÌÅÍ Åë½Å±â¼úÀÇ ¹ß´ÞÀº ÀüÀåȯ°æ¿¡¼ÀÇ Åë½Å ¹æ½ÄÀÇ º¯È¸¦ °¡Á®¿ÈÀ¸·Î½á ¹Ì·¡ÀÇ Àü Àå ȯ°æÀº ´Ù¾çÇÑ Á¤º¸ ¼öÁýü°èµé·ÎºÎÅÍ Á¤º¸¸¦ ¼öÁýÇÏ¿© ½Å¼ÓÇÏ°í Á¤È®ÇÑ Àü½ÃÀÇ ÀÇ»ç°áÁ¤À» ÀÌ·ê ¼ö ÀÖ´Â ³×Æ®¿öÅ© Áß½ÉÀüÀÏ µÉ °ÍÀ̸ç À̸¦ À§ÇÑ Àü¼úÅë½ÅÀÇ ÁøÈ°¡ ÀÌ·ç¾îÁö°í ÀÖ´Ù. ÀÌ·¯ÇÑ Àü¼ú Åë ½Å ÇÏ¿¡¼ Àü...more
Track
>
Session :
New Research Opportunities
>
Tactical Communications and Networks
¹ßÇ¥Á¦¸ñ :
Tactical Internet Overview
¹ßÇ¥ÀÚ :
°°æ¶õ (ºÎ±³¼ö/¾ÆÁÖ´ë)
°¿¬¿ä¾à :
Network Centric WarfareÀÇ ÇÙ½É ±¸¼º ¿ä¼Ò ÁßÀÇ ÇϳªÀÎ Tactical InternetÀÇ ±¸¼º ¿ä¼Ò¿Í ±â´É ¿ä±¸ »ç Ç× µîÀ» ¹Ì±º¿¡¼ ÀÛ¼ºÇÑ Ç¥ÁØ ¹®¼¸¦ ±â¹ÝÀ¸·Î ¼Ò°³ÇÑ´Ù. Tactical Internet »Ó¸¸ ¾Æ´Ï¶ó ±º ÅëÇÕ ³× Æ® ¿öÅ© »ó¿¡¼ÀÇ ¸Þ½ÃÁö Àü´ÞÀ» È¿À²ÀûÀ¸·Î ¼öÇàÇϱâ À§ÇÑ ±â¼úµéÀ» ¼Ò°³ÇÑ´Ù. »ó¿ë ÀÎÅͳݿ¡¼µµ S O ...more
Track
>
Session :
New Research Opportunities
>
Tutorial: Performing Arts over Networks
¹ßÇ¥Á¦¸ñ :
An Overview of Networked Performance
¹ßÇ¥ÀÚ :
¿©¿î½Â (Á¶±³¼ö/KAIST)
°¿¬¿ä¾à :
³×Æ®¿öÅ© °ø¿¬Àº ´Ù¾çÇÑ Çü½ÄÀÇ µðÁöÅÐ ¾ÆÆ® Áß 21¼¼±â µé¾î °¡Àå ÁÖ¸ñ¹Þ°í ÀÖ´Â °ø¿¬¿¹¼úÀÇ Çϳª ·Î, ¹°¸®ÀûÀ¸·Î ¼·Î ¶³¾îÁø Àå¼Ò¿¡ ÀÖ´Â »ç¶÷µéÀÌ ÃÊ°í¼Ó ³×Æ®¿öÅ©·Î À̾îÁø °¡»ó ¼¼°è¿¡¼ ÇÔ²² °ø ¿¬ÇÏ°í Áñ±â¸ç, À̸¦ ÅëÇÏ¿© °ø°£ÀÇ Á¦¾àÀ» ÃÊ¿ùÇÏ´Â ¿¹¼ú ÇàÀ§ÀÇ °¡´É¼ºÀ» Á¦½ÃÇÏ°í ÀÖ´Ù. ¶ÇÇÑ, ´Ü ¼øÈ÷ ´Ü¹ßÀû...more
Track
>
Session :
New Research Opportunities
>
Tutorial: Performing Arts over Networks
¹ßÇ¥Á¦¸ñ :
Surround Sound for Networked Performance
¹ßÇ¥ÀÚ :
±¸º»Ã¶ (Ãʺù±³¼ö/KAIST)
°¿¬¿ä¾à :
¹«´ë°ø¿¬À» ±¸¼ºÇÏ´Â ¹«´ë, ¹è¿ì, °ü°´ÀÇ ¿ä¼Ò¿¡ ´Ù¾çÇÑ Ã·´Ü±â¼úÀÌ µµÀÔµÇ¸é¼ µðÁöÅаø¿¬ÀÇ °ü ½É ÀÌ ³ô¾ÆÁö°í ÀÖ´Ù. ƯÈ÷ ¹«´ë°ø¿¬¿¡ ³×Æ®¿öÅ©±â¼úÀ» È°¿ëÇÏ¸é ¹°¸®Àû °ø°£ÀÇ ÇѰ踦 ±Øº¹ÇÒ ¼ö ÀÖ °í, °ø¿¬ÀÚ¿Í °ü¶÷ÀÚÀÇ Interactivity°¡ °¡´ÉÇØÁö±â ¶§¹®¿¡ Àü ¼¼°èÀÎÀÌ µ¿½Ã¿¡ Âü¿©ÇÒ ¼ö ÀÖ´Â ¹Ì·¡ °ø ¿¬±â¼ú·Î...more
Track
>
Session :
Forensics and Security / e-Goverment
>
Digital Forensics
¹ßÇ¥Á¦¸ñ :
Introduction to Digital Forensics
¹ßÇ¥ÀÚ :
Àº¼º°æ (Ã¥ÀÓ¿¬±¸¿ø/ETRI)
°¿¬¿ä¾à :
Á¤º¸È°¡ ÁøÀüµÊ¿¡ µû¶ó ÄÄÇ»ÅÍ °ü·Ã ¹üÁ˻Ӹ¸ ¾Æ´Ï¶ó ÀÏ¹Ý ¹üÁË¿¡¼µµ Áß¿ä Áõ°Å ¶Ç´Â ´Ü¼°¡ ÄÄÇ» Å͸¦ Æ÷ÇÔÇÑ ´Ù¾çÇÑ ÀüÀÚ ¸Åü ³»¿¡ º¸°üµÇ¾î ÀÖ´Â °æ¿ì°¡ Áõ°¡ÇÏ°í ÀÖ´Ù. ÀÌ·¯ÇÑ Çö½ÇÀº ÀüÀÚ ¸Åü ¸¦ ÀÌ¿ëÇÑ ¹üÁË ¼ö»çÀÇ °úÇÐÀûÀÌ°í ü°èÀûÀÎ °³¼±À» ¿ä±¸Çϸç, À̸¦ µÞ¹ÞħÇÒ ¼ö ÀÖ´Â ¼ö»ç±â¼úÀ» ÇÊ ¿ä·Î ÇÑ´Ù. ...more
Track
>
Session :
Forensics and Security / e-Goverment
>
Digital Forensics
¹ßÇ¥Á¦¸ñ :
Mobile Forensics : Current Status and its Vision
¹ßÇ¥ÀÚ :
ÀÌ±Ô¾È (°èÀå/´ë°ËÂûû)
°¿¬¿ä¾à :
- ¸ñÀû : ¸ð¹ÙÀÏ Æ÷·»½Ä ¼Ò°³ - Çʿ伺 : ¸ð¹ÙÀÏ Æ÷·»½Ä°ú ÇöÀå ¼ö»ç»ç·Ê¸¦ ¼Ò°³ÇÔÀ¸·Î½á ¼ö»ç±â°ü, Çаè, ¾÷°èÀÇ ºñÁ¯ ¼³Á¤¿¡ µµ ¿ò ÀÌ µÇ´Âµ¥ ÀÖÀ½. - ¹üÀ§ : ¸ð¹ÙÀÏ Æ÷·»½ÄÀÇ ÇöȲ ¹× ÈÞ´ëÆù¿¡¼ µðÁöÅÐÁõ°Å¸¦ ÃßÃâÇÏ°í ¹ýÁ¤¿¡ Á¦ÃâÇÏ´Â °úÁ¤ - ¼ö»çÇöÀå¿¡¼ °æÇèÇÑ . µðÁöÅÐÆ÷·»½ÄÀÇ °³¿ä¿Í ¸ð¹ÙÀÏ Æ÷·»½ÄÀ» ...more
Track
>
Session :
Forensics and Security / e-Goverment
>
Digital Forensics
¹ßÇ¥Á¦¸ñ :
Forensics-related Laws and Legal Issues
¹ßÇ¥ÀÚ :
¼º¼±Á¦ (±³¼ö/Çѳ²´ë)
°¿¬¿ä¾à :
¹Ì±¹Àº ÀÌ¹Ì 2006³â12¿ùºÎÅÍ µðÁöÅÐ Áõ°Å¿¡ ´ëÇÑ Á¦ÃâÀ» Á¤´çÈÇÏ´Â e-discovery Á¦µµ¸¦ µµÀÔÇÑ ¹Ù ÀÖÀ¸¸ç, ÀÌ°ÍÀº ÀÌ¹Ì ±Û·Î¹ú ±â¾÷¿¡ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ´Ù. ¹Ì±¹ÀÇ e-discovery Á¦µµ´Â WTO, ISO µîÀ» Åë ÇÏ¿© ±¹Á¦È ºÐÀ§±â°¡ °íÁ¶µÇ°í ÀÖ´Ù. ÇÏÁö¸¸ ±¹³»ÀÇ µðÁöÅÐ Æ÷·»½Ä¿¡ °üÇÑ Ç¥ÁØ ¹× ¹ýÁ¦µµ´Â ¸Å¿ì ¹ÌºñÇÑ Æí...more
Track
>
Session :
Forensics and Security / e-Goverment
>
Privacy Issues
¹ßÇ¥Á¦¸ñ :
Stealing User Account : A Serious Problem in Online Game Security Area
¹ßÇ¥ÀÚ :
ÀÌÈ£¿õ (¼±ÀÓ/AnhLab)
°¿¬¿ä¾à :
ÃÖ±Ù »çȸÀûÀ¸·Î ¿Â¶óÀÎ »ó¿¡¼ÀÇ »ç¿ëÀÚ °èÁ¤ ÇØÅ·ÀÌ Å« À̽´°¡ µÇ°í ÀÖÀ¸¸ç, ÀÌ·¯ÇÑ »ç¿ëÀÚ °èÁ¤ ÇØÅ·Àº ÇØÅ·À» ÅëÇØ ±ÝÀüÀû À̵æÀ» ¹Ù·Î ÃëÇÒ ¼ö ÀÖ´Â ¿Â¶óÀÎ °Å·¡³ª ¿Â¶óÀÎ °ÔÀÓ¿¡¼ ¸¹ÀÌ ¹ß»ýÇÏ °í ÀÖ´Ù. ƯÈ÷, Å»ÃëµÈ °èÁ¤ Á¤º¸´Â ÇØÅ·À̳ª ¸íÀÇ µµ¿ë µî ºÒ¹ýÀûÀÎ ÇàÀ§¿¡ ¾Ç¿ëµÉ °¡´É¼ºÀÌ ³ô±â ¶§¹® ¿¡, 2Â÷ ...more
Track
>
Session :
Forensics and Security / e-Goverment
>
Privacy Issues
¹ßÇ¥Á¦¸ñ :
Digital Identity Management for Privacy Protection
¹ßÇ¥ÀÚ :
Áø½ÂÇå (ÆÀÀå/ETRI)
°¿¬¿ä¾à :
¸î ³âÀü ¸®´ÏÁö ¸íÀǵµ¿ë »ç°Ç°ú ´ëÅë·É°ú ±¹¹«ÃѸ®ÀÇ ÁֹιøÈ£°¡ µµ¿ëµÇ¾î °¢Á¾ °ÔÀÓ»çÀÌÆ®¿Í ¼º ÀλçÀÌÆ®¿¡ °¡ÀÔµÈ »ç½ÇÀÌ º¸µµµÇ¸é¼, »çȸÀûÀ¸·Î °³ÀÎÁ¤º¸º¸È£¿¡ ´ëÇÑ À̽´°¡ Å©°Ô ºÎ°¢µÈ ÀûÀÌ ÀÖ¾ú´Ù. ±×·±µ¥ ±×·± ±â¾ïÀÌ Èñ¹ÌÇØÁú ¹«·ÆÀÎ ±Ý³â ÃÊ¿¡ ¿ì¸®³ª¶ó ÀÎÅÍ³Ý ÀÌ¿ëÀÚÀÇ 3ºÐÀÇ 1¿¡ ÇØ´ç ÇÏ ´Â õ ¸¸¸íÀÌ ...more
Track
>
Session :
Forensics and Security / e-Goverment
>
Privacy Issues
¹ßÇ¥Á¦¸ñ :
Emerging Healthcare Information Technologies and the Future of Privacy
¹ßÇ¥ÀÚ :
±èÀÏ°ï (±³¼ö/°æºÏ´ë)
°¿¬¿ä¾à :
À¯ºñÄõÅͽº ±â¼úÀÇ ÁÖ¿ä È°¿ë ¿µ¿ªÀÇ Çϳª·Î º¸°ÇÀǷḦ ¶°¿Ã¸° °ÍÀº ¹ú½á 3³âÀüÀÇ ÀÏÀÌÁö¸¸, ¿©Å ²¯ º°·Î ÀÌ·ç¾î ¿Â °Íµµ ¾ø´Ù. ¿Ö ÀÌ·± ÀÏÀÌ ÀϾ°í ÀÖ´ÂÁö¸¦ ¿µ¿ªÀÇ º¹Àâµµ¿Í ±â¼úÀÇ ÇѰ踦 °í·Á ÇØ º¸°íÀÚ ÇÑ´Ù. Àαǰú ¸ñ¼û µÑ Áß Çϳª¸¦ ¼±ÅÃÇ϶ó°í Çϸé ÀÌ°ßÀÌ ¾ø´Ù. Çѹߦ¸¸ ¹°·¯¼ À־ »ç »ýÈ° ħÇØ¿¡ ...more
01
02
03
04
05
06
07
08
09