주제분류(KDC/DDC) |
전자공학
|
2,302
|
22
|
|
주제어 |
abnormalactivities
|
1
|
1
|
|
accessibilityevent
|
1
|
1
|
|
amcache.hve
|
1
|
1
|
|
approximate matching
|
1
|
1
|
|
astroturfing
|
1
|
1
|
|
compounddocumentfileformat
|
1
|
1
|
|
consigningagency
|
1
|
1
|
|
consigningofpersonalinformati ...
|
1
|
1
|
|
datarecover
|
1
|
1
|
|
documentfileforensics
|
1
|
1
|
|
evidenceacquisitionprocedure
|
1
|
1
|
|
evidencemap
|
1
|
1
|
|
filerecover
|
1
|
1
|
|
fulldiskencryption
|
1
|
1
|
|
high-risksubjectsselectionsys ...
|
1
|
1
|
|
iconcache.db
|
1
|
1
|
|
incidentresponseforensic
|
1
|
1
|
|
logchain
|
1
|
1
|
|
msexcel
|
1
|
1
|
|
nas(network-attached storage)
|
1
|
1
|
|
nosqldatabaseforensics
|
1
|
1
|
|
ooxmlfileformat
|
1
|
1
|
|
pcsecuritysolution
|
1
|
1
|
|
personalinformationaudit
|
1
|
1
|
|
selectionofhigh-risksubjects
|
1
|
1
|
|
serversecurityarchitecture
|
1
|
1
|
|
signed-digit
|
1
|
1
|
|
uiautomator
|
1
|
1
|
|
unknownmalwaredetection
|
1
|
1
|
|
vulnerablilty
|
1
|
1
|
|
whole disk encryption
|
1
|
1
|
|
windowsartifacts
|
1
|
1
|
|
xfsfilesystem
|
1
|
1
|
|
zombiecomputer
|
1
|
1
|
|
멤리스터-cmos
|
2
|
2
|
|
재구성가능한구조
|
1
|
1
|
|
The 12-year-long Josun state ...
|
2
|
1
|
|
The Ancient Castle Ye-Guk( ...
|
2
|
1
|
|
androiddataacquisition
|
2
|
1
|
|
antiforensic
|
2
|
1
|
|
dbencryption
|
2
|
1
|
|
myisam storage engine
|
2
|
1
|
|
mysql database analysis
|
2
|
1
|
|
record recovery
|
2
|
1
|
|
xfs
|
2
|
1
|
|
databaseforensics
|
3
|
1
|
|
hcf
|
3
|
1
|
|
informationleakageprevention
|
3
|
1
|
|
photographicimages
|
3
|
1
|
|
멤리스터
|
3
|
1
|
|
ipspoofing
|
4
|
1
|
|
redundant
|
4
|
1
|
|
smart banking
|
4
|
1
|
|
smartphone forensics
|
5
|
1
|
|
곱셈기
|
5
|
1
|
|
digital forensics
|
46
|
9
|
|
adder
|
6
|
1
|
|
androidforensics
|
8
|
1
|
|
secure keypads
|
8
|
1
|
|
replay attack
|
9
|
1
|
|
computer graphics
|
11
|
1
|
|
semantic similarity
|
11
|
1
|
|
features
|
13
|
1
|
|
user behavior
|
31
|
2
|
|
android security
|
16
|
1
|
|
assurance
|
16
|
1
|
|
personal information security
|
16
|
1
|
|
security framework
|
16
|
1
|
|
android application
|
18
|
1
|
|
log analysis
|
18
|
1
|
|
jpeg
|
19
|
1
|
|
smishing
|
22
|
1
|
|
cosine similarity
|
23
|
1
|
|
mongodb
|
30
|
1
|
|
ddos
|
41
|
1
|
|
manipulation
|
42
|
1
|
|
icon
|
49
|
1
|
|
profiling
|
50
|
1
|
|
cyber-crime
|
60
|
1
|
|
digital forensic
|
90
|
1
|
|
public opinion
|
126
|
1
|
|
verification
|
129
|
1
|
|
framework
|
185
|
1
|
|
personal information protecti ...
|
187
|
1
|
|
personal information
|
263
|
1
|
|
storage
|
238
|
1
|
|
svm
|
319
|
1
|
|
계 |
|
4,510 |
119 |
|
* 주제로 분류 되지 않은 논문건수 |
|
0 |
|