International Journals

  Domestic Journals

  • ±èÅ¿¬, Á¶±âȯ, ¡°Å¬¶ó¿ìµå ÄÄÇ»ÆÃ¿¡¼­ µ¿Àû µ¥ÀÌÅÍ ¹«°á¼ºÀ» À§ÇÑ °³¼±µÈ °¨»ç ½Ã½ºÅÛ (A Novel Auditing System for Dynamic Data Integrity in Cloud Computing),¡± Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö, 19 (8), pp. 1818-1824, 2015. 8.
  • ¹ÚÁ¾¼±, ÀåÇöÈñ, Á¶±âȯ, ¡°UDT ÇÃ·Î¿ì °£ °øÆò¼º Çâ»óÀ» À§ÇÑ È¥Àâµµ ±â¹ÝÀÇ °¡¿ë´ë¿ªÆø ÃßÁ¤ ±â¹ý (Congestion Degree based Available Bandwidth Estimation Method for Enhancement of UDT Fairness)," ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 52 (7), pp. 1287-1297, 2015. 7.
  • ¿Õ±âö, Á¶Áø¿À, Á¶±âȯ, ¡°±¹³» ±Û·Î¹ú ¹«¼±·£ ·Î¹Ö ±¸Ãà ÇöȲ ¹× ¹ßÀü¹æ¾È(Global Wireless LAN Roaming Status in Korea and Its Development Methods)," ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 52 (7), pp. 1239-1245, 2015. 7.
  • ¹ÚÁ¤¿í, Á¶±âȯ, "³»ºÎ ³×Æ®¿öÅ©¿¡¼­ ¾Ë·ÁÁöÁö ¾ÊÀº Çǽ̻çÀÌÆ® ŽÁö¹æ¾È (A Unknown Phishing Site Detection Method in the Interior Network Environment)," Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, 25 (2), pp. 313-320, 2015. 4.
  • Gicheol Wang and Gihwan Cho, ¡°Securing Cluster Head Elections in Wireless Sensor Networks,¡± Journal of Advances in Computer Networks, 2 (4), pp. 243-247, ISSN: 1793-8244, Dec. 2014. (Jul. 2014 online)
  • ¾çÁ¤¿ì, ¾È°³ÀÏ, ±è½ÅÈ¿, Á¤º´È£, ±èÅ¿¬, Æí±âÇö, Á¶±âȯ, ¡°WLAN ÀüÆÄƯ¼º ±â¹Ý ½Ç³» À§Ä¡¼³Á¤À» À§ÇÑ À̵¿´Ü¸»ÀÇ °Å¸®ÃßÁ¤ ±â¹ý (A Distance Estimation Scheme Based on WLAN RF Properties for Localization of Mobile Terminals),¡± Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö,39B (7), pp. 449-458, 2014. 7.
  • °íºÀ±¸, ¹ÚÁ¾¼±, Á¤¼ºÁ¾, Á¶±âȯ, ¡°Ä·ÆÛ½º ȯ°æ¿¡¼­ ÀûÀÀÀûÀÎ Á¤º¸º¸¾ÈÀ» À§ÇÑ ÅëÇÕ º¸¾ÈÁ¤Ã¥ÀÇ ¼³°è (A Design of Integrated Security Polices for Enabling Adaptive Security in Campus Environment),¡± Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö,18 (3), pp. 617-624, 2014. 3.
  • ¹ÚÁ¾¼±, Á¶±âȯ, ¡°°í¼Ó³×Æ®¿öÅ©¿¡¼­ ³×Æ®¿öÅ© È¥Àâ»óÅ¿¡ ÀûÀÀÀûÀÎ UDT º´·ÄÀü¼Û ±â¹ý (UDT Parallel Transfer Technologies Adaptive to Network Status in High Speed Network),¡± ½º¸¶Æ®¹Ìµð¾îÀú³Î, Çѱ¹½º¸¶Æ®¹Ìµð¾îÇÐȸ, 2 (4), pp. 51-59, 2013. 12.
  • ¿Õ±âö, Á¶±âȯ, ¡°¹«¼± ¼¾¼­ ³×Æ®¿öÅ©¸¦ À§ÇÑ ½Å·Ú ±â¹ÝÀÇ ¾ÈÀüÇÑ Å¬·¯½ºÅÍ Çìµå ¼±Ãâ (Secure Cluster Head Election based on Trust for Wireless Sensor Networks),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 50 (10), pp. 2502-2516, 2013. 10.
  • ±èÅ¿¬, ¾Èµµ½Ä, Á¶±âȯ, ¡°Â÷·® ³×Æ®¿öÅ©¿¡¼­ °­ÇÑ ÀÍ¸í¼ºÀÌ Áö¿øµÇ´Â ÀÎÁõ ÇÁ·ÎÅäÄÝÀ» À§ÇÑ È®·ü·ÐÀû Á¢±Ù¹æ½Ä (A Probabilistic Approach for Robust Anonymous Authentication Protocol in VANETs),¡± Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö, 17 (10), pp. 2309-2315, 2013. 10.
  • ±èº¹¼ø, ¹ÚÃá°É, ÀÓÇü¹¬, Á¶±âȯ, ¡°¸ð¹ÙÀÏ ¾ÛÀ» ÅëÇÑ »ç¿ëÀÚ Âü¿© ±â¹ÝÀÇ ½º¸¶Æ® Æ®·¡ÇÈ °ü¸® ¹æ¾È ¹× ½Ã½ºÅÛ ¼³°è (A Smart Traffic Management Scheme and Its System Design based on User¡¯s Participating with the Mobile Application),¡± Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö, 38C (8), pp. 674-682, 2013. 8.
  • ±èº¹¼ø, ¹é±¤Çö, Á¶±âȯ, ¡°VoIP¿Í VoLTE À½¼º ǰÁú ÃøÁ¤À» À§ÇÑ ÅëÇÕ E-model ±¸Çö (An Integrated E-model Implementation for Speech Quality Measurement in VoIP and VoLTE),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 50 (7), pp. 1638-1646, 2013. 7.
  • °íºÀ±¸, Á¤¼ºÁ¾, Á¶±âȯ, "ARP spoofing ¹ÙÀÌ·¯½º¿¡ °¨¿°µÈ ´Ü¸»À» È¿À²ÀûÀ¸·Î ºÐ¸®Çϱâ À§ÇÑ ³×Æ®¿öÅ© °ü¸®½Ã½ºÅÛÀÇ ¼³°è (A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus)¡± Çѱ¹Á¤º¸Åë½ÅÇÐȸ³í¹®Áö, 17 (3), pp. 641-648, 2013. 3.
  • ¹ÚÁ¾¼±, ¿Õ±âö, ±è½ÂÇØ, Á¶±âȯ, "UDT º´·ÄÀü¼Û ÇÁ·ÎÅäÄÝÀ» À§ÇÑ Ã¤³Î¼ö ¿¹Ãø±â¹ý (On Predicting Method of the Number of Channels for UDT Parallel Transfer Protocol),¡± Á¤º¸°úÇÐȸ³í¹®Áö: Á¤º¸Åë½Å, 40 (1), pp. 12-18, 2013. 2.
  • ¿¡ÀÌ¿¡½º¿¥ »ê¿Í¸£ È£¼¾, ÀÌÇõ·Î, Á¶±âȯ, "¹«¼±¼¾¼­³×Æ®¿öÅ©¸¦ À§ÇÑ ¿¡³ÊÁö ÀÎÁöÇü ³×Æ®¿öÅ© ±¸¼º ¹× ¶ó¿ìÆÃ ±â¹ý (AN Envergy Aware Network Construction and Routing Method for Wireless Sensor Network),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 49 (9), pp. 225-233, 2012. 9.
  • ¿Õ±âö, Á¶±âȯ, "¹«¼± ¼¾¼­ ³×Æ®¿öÅ©¿¡¼­ ¾ÈÀüÇÑ Å¬·¯½ºÅÍ ±¸¼º ¹æ¾È (A Secure Cluster Formation Scheme in Wireless Sensor Networks),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 49 (8), pp. 84-97, 2012. 8.
  • ÀÌÇà°ï, ÃÖ»ó¼ö, ¼ÛÁß¼®, Á¶±âȯ, "º¸¾ÈÀ̺¥Æ® ¿¬°ü°ü°èºÐ¼® ±â¹ÝÀÇ È¿À²ÀûÀÎ º¸¾È°üÁ¦Ã¼°è ¿¬±¸ (An Efficient Security Monitoring Scheme Based on Correlation Analysis of Multiple Security Events),¡± Çѱ¹Áö½ÄÁ¤º¸±â¼úÇÐȸ ³í¹®Áö, 7 (2), pp. 49-58, 2012. 4.
  • ¹ÚÁ¾¼±, ±è½ÂÇØ, Ȳ°ÇÁØ, Á¶±âȯ, "UDT ±â¹ÝÀÇ ´ë¿ë·® µ¥ÀÌÅÍ Àü¼Ûµµ±¸ ¼³°è ¹× ±¸Çö (A Design and Implementation of Bulk Data Transmission Tool based on UDT),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 49 (2), pp. 23-31, 2012. 2.
  • ÀÌ´ëÈ£, Á¶±âȯ, "Ãʵî Á¤º¸Åë½Å À±¸®¼öÁØ °³¼±À» À§ÇÑ »ç·Ê±â¹Ý ±³¼öÇнÀ¸ðÇü (A Case based Multiplex Teaching and Learning Model to Improve the Educational Level of Information and Communication Ethics in Elementary School),¡± ÄÄÇ»Åͱ³À°ÇÐȸ ³í¹®Áö, 14 (6), pp. 31-40, 2011. 11.
  • ÀÌ´ëÈ£, Á¶±âȯ, "Ãʵî Á¤º¸Åë½ÅÀ±¸® ±³À°¼öÁØ Á¦°í¸¦ À§ÇÑ 3Áß ¿¬°è±³¼öÇнÀ¸ðÇü ¿¬±¸(A Triple Connected Teaching and Learning Model to Improve the Educational Level of Information and Communication Ethics in Elementary School),¡± Á¤º¸±³À°ÇÐȸ ³í¹®Áö, 15 (3), pp. 345-354, 2011. 9.
  • ¾Èµµ½Ä, ¿Õ±âö, ±è½ÂÇØ, Á¶±âȯ, "³×Æ®¿öÅ© Æ®·¡ÇÈ »óÅ¿¡ ÀûÀÀÀûÀÎ UDT Rate Control ±â¹ý (An Adaptive UDT Rate Control Method on Network Traffic Condition),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 48 (3), pp. 19-27, 2011. 3.
  • ¹ÚÀ纹, °í±¤½Å, Á¶±âȯ, "±³Â÷·Î ȯ°æ¿¡¼­ Range-based¿Í Range-free À§Ä¡ÃøÁ¤±â¹ýÀ» È¥ÇÕÇÑ °³¼±µÈ Â÷·®À§Ä¡ÃßÀû±â¹ý (An Improved Vehicle Tracking Scheme Combining Range-based and Range-free Localization in Intersection Environment),¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, CI 48 (2), pp. 246-256, 2011. 3.
  • ¹ÚÁ¾¼±, À̽¾Æ, ±è½ÂÇØ, Á¶±âȯ, "UDT ȯ°æ¿¡¼­ È¥Àâ»óȲ ¿¹Ãø ¹× ÆÐŶ¼Õ½ÇÀ» °í·ÁÇÑ ¼º´ÉÇâ»ó ±â¹ý (A Performance Improvement Method with Considering of Congestion Prediction and Packet Loss on UDT Environment),¡± Çѱ¹ÄÜÅÙÃ÷ÇÐȸ ³í¹®Áö, 11 (2), pp. 69-78, 2011. 2.
  • ¾Èµµ½Ä, Á¶±âȯ, "An Efficient Route Selection Scheme with Considering Traffic Density in VANET,¡± International Journal of Maritime Information and Communication Sciences(ÇØ¾çÁ¤º¸Åë½ÅÇÐ ¿µ¹®³í¹®Áö), 8 (6), pp. 623-629, 2010. 12.
  • ÀÌÁßÇö, ±èÅ¿¬, Á¶±âȯ, "¹«¼± ¼¾¼­ ³×Æ®¿öÅ©¸¦ À§ÇÑ °­ÇÑ ÀÍ¸í¼º Áö¿ø ±¸Á¶ (A Strong Anonymity Scheme for Wireless Sensor Networks),¡± ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 11 (3), pp. 139-148, 2010. 6.
  • ¹ÚÀ纹, Á¶±âȯ, "Àú¹Ðµµ USN ȯ°æÀ» À§ÇÑ Range-hybrid ±â¹ÝÀÇ Çâ»óµÈ À̵¿°´Ã¼ ÃßÀû±â¹ý,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, CI 46 (2), pp. 245-255, 2010. 3.
  • ¿Õ±âö, Á¶±âȯ, "¼¾¼­ ³×Æ®¿öÅ©¿¡¼­ º¹¿ø·ÂÀ» Áö´Ñ ۰»½Å ¹æ¾È,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, TC 47 (2), pp. 103-112, 2010. 2.
  • ÀåÇöÈñ, ¹ÚÀ纹, °í±¤½Å, ±è½ÂÇØ, Á¶±âȯ, "±Û·Î¹ú¿¬±¸¸ÁÀ» À§ÇÑ È¿À²ÀûÀÎ Ä¿¹Â´ÏƼ ¶ó¿ìÆÃ Á¤Ã¥ÀÇ ºÐ¼® ¹× ¼³°è,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 10 (5), pp. 1-12, 2009. 10.
  • ÀåÇöÈñ, À¯¼®´ë, ¹ÚÀ纹, Á¶±âȯ, "°í¼ÓÀ¸·Î À̵¿ÇÏ´Â Â÷·®°£ Åë½Å¿¡¼­ Çâ»óµÈ Ž¿å ¸Þ½ÃÁö Æ÷¿öµù ÇÁ·ÎÅäÄÝ,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 46 (3), pp. 341-351, 2009. 3.
  • °ø±æ, ±è±¤È£, °í±¤¼·, Á¶±âȯ, "¹«¼± ¼¾¼­ ³×Æ®¿öÅ©¿¡¼­ ½Ã°£Áö¿¬ ±â¹Ý Çâ»óµÈ Ä¿¹ö¸®Áö È¿À²ÀûÀΠŬ·¯½ºÅ͸µ ¹æ¾È,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 46 (2), pp. 133-142, 2009. 2.
  • ¿ÂÁøÈ£, ÃÖ¿Ï, Á¶±âȯ, À̹®±Ù, "À̵¿ »ç¹«È¯°æÀ» À§ÇÑ ¸Þ½ÅÀú ÇÁ·ÎÅäÄÝ ¼³°è ¹× ¼­¹öÀÇ ±¸Çö ¹× ºÐ¼®,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 9 (2), pp. 1-13, 2008. 4.
  • ¿Õ±âö, ±è±â¿µ, ¹Ú¿øÁÖ, Á¶±âȯ, "¿À¿°¿¡ Ãë¾àÇÑ ¼¾¼­ ³ëµåµéÀ» À§ÇÑ ÁÖ±âÀûÀΠŰ °»½Å ¹æ¾È,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 44 (11), pp. 67-77, 2007. 11.
  • À¯¼®´ë, Á¶±âȯ, "Â÷·®µ¿À§±×¸¨À» ÀÌ¿ëÇÑ Â÷·®°£ ±ä±Þ¸Þ½ÃÁö ÀüÆÄ¹æ¹ý,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö, 34 (5), pp. 340-347, 2007. 10.
  • À¯±â¼º, ±èÀçȯ, ½ÅÀç¿í, Á¶±âȯ, Á¤Áø¿í, "ÀÎÅÍ³Ý ¶ó¿ìÅÍ ÅëÇÕ ¼º´ÉÃøÁ¤ ½Ã½ºÅÛÀÇ ¼³°è ¹× ±¸Çö,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 8 (4), pp. 31-40, 2007. 8.
  • Â÷¿ì¼®, ±èÀº¹Ì, ¹èÈ£¿µ, À̹èÈ£, Á¶±âȯ, "Mobile IPv6 ȯ°æ¿¡¼­ µ¿Àû ºÐ±â ¶ó¿ìÅ͸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ ÀÚ¿ø ¿¹¾à ¹æ¹ý,¡± Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 14C (3), pp. 255-266, 2007. 6.
  • ±è¸¸¼®, ±è»ó¼ö, °í±¤½Å, Á¶±âȯ, À̹®È£, "¼¾¼­ ³×Æ®¿öÅ©¿¡¼­ µ¥ÀÌÅÍ Àü¼Û Áö¿¬À» ÃÖ¼ÒÈ­ÇÏ´Â MAC ÇÁ·ÎÅäÄÝÀÇ ¼³°è,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 8 (2), pp. 43-54, 2007. 4.
  • À¯¼®´ë, Á¶±âȯ, "Â÷·®¾ÈÀüÅë½ÅÀ» À§ÇÑ ÁÙ±â¿Í °¡Áö ±¸Á¶¸¦ ÀÌ¿ëÇÑ ±ä±Þ ¸Þ½ÃÁö ÀüÆÄ¹æ¹ý,¡± Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö, 32 (2), pp. 203-212, 2007. 2.
  • Àü¿ëÁØ, ¾çº´¿ì, Á¶±âȯ, ¿À¹Î±Ç, "Á¤º¸º¸È£ »ê¾÷ Åë°èÁ¶»ç º¸¿ÏÀ» À§ÇÑ ±â¾÷°æ±âÀü¸ÁÁ¶»ç ½Ã½ºÅÛ ¼³°è ¹× ±¸Çö,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 8 (1), pp. 82-93, 2007. 2.
  • Â÷¿ì¼®, ±èÀº¹Ì, ¹èÈ£¿µ, Á¶±âȯ, "ÁöÇ⼺ ºê·Îµåij½ºÆ®¸¦ À§ÇÑ MNDB ÇÁ·ÎÅäÄÝ,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 43 (11), pp. 118-127, 2006. 11.
  • Àü¿ëÁØ, Á¶±âȯ, ±è¿ø±Ô, "°ø°ø±â°üÀÇ Á¤º¸º¸È£°ü¸®Ã¼°è °¨»ç½Ã½ºÅÛÀÇ ¼³°è ¹× ±¸Çö,¡± Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö, 7 (5), pp. 81-93, 2006. 10.
  • ÃÖÀμ±, Á¶±âȯ, "À̵¿ÄÄÇ»ÆÃ ȯ°æ¿¡¼­ »ç¿ëÀÚÀÇ ¼±È£µµ¸¦ °í·ÁÇÑ ÇÁ¸®ÆÐĪ,¡± Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 13-C (5), pp. 651-658, 2006. 10.
  • À¯¼®´ë, À̹®±Ù, Á¶±âȯ, "±³Åë»ç°í ¿¹¹æÀ» À§ÇÑ Â÷·®¾ÈÀü¸Þ½ÃÁö Áß°è³ëµå ¼±Åùæ¹ý,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 43 (9), pp. 60-68, 2006. 9.
  • ±è½ÂÇØ, Á¤º´È£, ¿Õ±âö, Á¶±âȯ, "¾Öµå Ȥ ¼¾¼­ ³×Æ®¿öÅ©¸¦ À§ÇÑ Å° °ü¸® ¹æ¾È,¡± ´ëÇÑÀüÀÚ°øÇÐȸ ³í¹®Áö, 43 (7), pp. 32-40, 2006. 7.
  • Seung-Hae Kim, Won-Hyuk Lee, and Gi-Hwan Cho, "A Study of a Server Selection Model for Selecting a Replicated Server based on Downstream Measurement in the Server-side,¡± International Journal of Information Processing Systems, 2 (2), KIPS, pp. 32-36, June. 2006.
  • ±èÀçȯ, ¹ÚűÔ, Á¶±âȯ, "»ç¿ëÀÚ Åõ¸í¼ºÀ» °®´Â Ä¿³Î ¼öÁØÀÇ ÆÄÀÏ ¾Ïȣȭ ¸ÞÄ«´ÏÁò,¡± Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, 16 (3), pp. 3-16, 2006. 6.
  • Â÷¿ì¼®, Á¶±âȯ, "ÁöÇ⼺ ºê·ÎµåÄɽºÆ®¸¦ À§ÇÑ ¹«¼± LAN MAC ÇÁ·ÎÅäÄÝ,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 33 (1), pp. 16-27, 2006. 2.
  • ¿Õ±âö, ±èÅ¿¬, Á¶±âȯ, "¾Öµå Ȥ ³×Æ®¿öÅ©¿¡¼­ Ŭ·¯½ºÅ͸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ Ç÷¯µù ¹æ¾È,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 32 (6), pp. 696-704, 2005. 12.
  • ¿Õ±âö, Á¤º´È£, Á¶±âȯ, "À̵¿ ¾ÖµåȤ ³×Æ®¿öÅ©¿¡¼­ ¼¼¼Ç Ű ¼³Á¤¹æ¾È,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 31 (4), pp. 353-362, 2004. 8.
  • ¿Õ±âö, ¹æ»ó¿ø, Á¤º´È£, Á¶±âȯ, "Ad-Hoc ³×Æ®¿öÅ©¿¡¼­ ¼±Çà Ű ºÐ¹è ¾ø´Â ´Ü ´ë ´Ü Ű ¼³Á¤ ¹æ¾È,¡± Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö, 29 (7C), pp. 1015-1023. 2004. 7.
  • °í±¤½Å, Â÷¿ì¼®, ±èÇüÁØ, Á¶±âȯ, "¹«¼± LAN ȯ°æ¿¡¼­ ¸¶ÀÌÅ©·Î À̵¿¼º Áö¿ø ¹æ¾È,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 31 (2), pp. 158-170. 2004. 4.
  • ¿Õ±âö, ¹æ»ó¿ø, Á¶±âȯ, "Ad hoc ³×Æ®¿öÅ©¿¡¼­ Á¦¾î¸Þ½ÃÁö ºÎÇϸ¦ °¨¼Ò½ÃŰ´Â Ŭ·¯½ºÅÍ À¯Áö ¹æ¹ý,¡± Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å 31(1), pp. 62-69, 2004. 2.
  • ¹ÚÁö¿¬, Á¶±âȯ, À̹®±Ù, "½Ç½Ã°£ ½Ã½ºÅÛÀÇ ½ÇÇà °ø°£»ó¿¡¼­ÀÇ ±¸¹®°ú ÀÇ¹Ì ÆÐÅÏ¿¡ ±â¹ÝÀ» µÐ »óÅ ÃÖ¼ÒÈ­¸¦ À§ÇÑ Ãß»óÈ­ ¹æ¹ý," Á¤º¸°úÇÐȸ ³í¹®Áö, ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë, 30 (2), pp. 103-116, 2003. 2.
  • °í±¤½Å, Â÷¿ì¼®, ¾ÈÀ翵, Á¶±âȯ, "´Ü¸»ÀÇ ¸¶ÀÌÅ©·Î À̵¿¼ºÀ» °í·ÁÇÑ ÀÚ¿ø¿¹¾à ¸ÞÄ¿´ÏÁòÀÇ ¼³°è," Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C, 9 (5), pp. 733-742, 2002. 10.
  • ÃÖÀçÈÆ, ±èÁö¼÷, Á¶±âȯ, "¹®Á¦ ÀºÇà¿¡¼­ ¿¬»óÇнÀÀ» Áö¿øÇÏ´Â ÆÛÁö°Ë»ö ½Ã½ºÅÛ," Á¤º¸°úÇÐȸ ³í¹®Áö, ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë, 29 (4), pp. 278-288, 2002. 4.
  • ±è¹®ÀÚ, Â÷¿ì¼®, Á¶ÀÎÁØ, Á¶±âȯ, "À§Ä¡ÀÎ½Ä À̵¿Á¤º¸¼­ºñ½º¸¦ À§ÇÑ ÇÁ¸®ÆÐĪ ¹æ¹ý·Ð," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 8-C (6), pp. 831-838, 2001. 12.
  • Á¶ÀÎÁØ, Á¶±âȯ, "ÀÎÅÍ³Ý È£½ºÆ® À̵¿¼ºÀ» Áö¿øÇÏ´Â DNS ±â¹Ý À§Ä¡¼öÁ¤ ¹æ¾È," Á¤º¸°úÇÐȸ ³í¹®Áö : Á¤º¸Åë½Å, 27 (4), pp. 429-440, 2000. 12.
  • ¹ÚÁØÈñ, ¹®°æ´ö, ±èűÙ, Á¶±âȯ, "´Ù¸ñÀû Ŭ·¯½ºÅ͸µ ½Ã½ºÅÛÀ» À§ÇÑ °í¼Ó ¸Þ½Ã¡ °èÃþ ±¸Çö," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 7 (3), pp. 909-922, 2000. 3.
  • Gihwan Cho, "Simulation-based Comparison of Location and Routing Optimization Schemes for Internet Host Mobility," Telecommunications Review, 9 (3), pp. 301-313, 1999. 6.
  • Á¶ÀÎÁØ, ±è¹®ÀÚ, Á¶±âȯ, ±èµ¿±Ô, "À̵¿ÄÄÇ»ÆÃ ȯ°æÀ» À§ÇÑ °èÃþ±¸Á¶ ±â¹Ý À§Ä¡¼öÁ¤ ¹× °æ·Î¼³Á¤," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 5 (12), pp. 3221-3229, 1998. 12.
  • ¹æ»ó¿ø, Á¶±âȯ, ±èº´±â, "ÀÎÅͳݻ󿡼­ È£½ºÆ® À̵¿¼ºÀ» Áö¿øÇÏ´Â ¸ÖƼij½ºÆ® ÇÁ·ÎÅäÄÝ," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 4 (5), pp. 1231-1242, 1997. 5.
  • ¹æ»ó¿ø, Á¶±âȯ, ±èº´±â, "À̵¿ È£½ºÆ®¸¦ À§ÇÑ ¸ÖƼij½ºÆ® ¼­ºñ½º ¹æ¾È," Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö, 4 (4), pp.973-981, 1997. 4.

                                contact mailto:monitor@dcs.chonbuk.ac.kr for more information.  
                                                        
Copyright (c) 2003. Designed by DCS lab. All right reserved

Journal