윈도우 비스타 보안기술 분석 : 포렌식 관점을 중심으로

The Korea Institute of Information Security and Cryptology, Vol. 17, No. 2, pp. 39-44, 4월. 2007
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. Kim, Y. Kim, W. Kim, "nan," The Korea Institute of Information Security and Cryptology, vol. 17, no. 2, pp. 39-44, 2007.

[ACM Style]
Young-Baek Kim, Young-Jik Kim, and Woo-Han Kim. 2007. nan. The Korea Institute of Information Security and Cryptology, 17, 2, (2007), 39-44.