Fig. 1. Cloud Server Networking
Fig. 2. Cloud Server Layer
Fig. 3. Cloud Security Framework
Fig. 4. Trust between Host and Agent
Fig. 5. Security Test-bed
Fig. 6. Detection Time
Fig. 7. False Positive Comparison
Fig. 8 False Negative Comparison
참고문헌
- K. J. Lee & W. S. Jeong. (2011). An Analysis of the Economic Effects for the Immersive Media Industry. The Journal of Korean Institute of Communications and Information Sciences, 36(7), 795-805. https://doi.org/10.7840/KICS.2011.36B.7.795
- S. Jonathan (1992). Defining virtual reality: Dimensions determining telepresence. Journal of communication, 42(4), 73-93. https://doi.org/10.1111/j.1460-2466.1992.tb00812.x
- E. Damiani, S. Vimercati, S. Paraboschi & P. Samarati (2000). Securing XML Documents. Proceedings of the 2000 International Conference on Extending Database Technology(EDBT2000).
- Wen, Quan, Yufei Wang & Peng Li. (2018). Two Zero-Watermark methods for XML documents. Journal of Real-Time Image Processing, 14(1), 183-192. https://doi.org/10.1007/s11554-016-0647-2
- J. L. Raheja, A. Chaudhary, K. Singal. (2011). Tracking of fingertips and centers of palm using kinect. In Computational intelligence, modelling and simulation (CIMSiM), 248-252.
- S. A. Kumar. (2017). Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications, 76(6), 8881-8900. https://doi.org/10.1007/s11042-016-3514-z
- S. H. Kim. (2016). Realtime 3D Human Full-Body Convergence Motion Capture using a Kinect Sensor. Journal of Digital Convergence, 14(1), 189-194. https://doi.org/10.14400/JDC.2016.14.1.189
- K. W. Park & J. Y. Lee. (2015). A Morphology Technique-Based Boundary Detection in a Two-Dimensional QR Code. Journal of Digital Convergence, 13(12), 159-175.
- S. M. Jung, J. G. Song, D. J. Hwang, J. Y. Aan & S. S. Kim. (2010). A Study on Software-based Sensing Technology for Multiple Object Control in AR Video. Sensors, 10(11), 9857-9871. https://doi.org/10.3390/s101109857
- J. U. Hou, D. G. Kim & H. K. Lee. (2017). Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact. IEEE Transactions on Information Forensics and Security, 12(11), 2712-2725. https://doi.org/10.1109/TIFS.2017.2718482
- A. F. Tawfiq & J. Lu. (2017). Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques: A Smart Fuzzy-Based Model for Financial XML Transactions Security Using XML Encryption. Ontologies and Big Data Considerations for Effective Intelligence. IGI Global, 2017, 214-326.
- K. Fatma. (2017). High Performance and Reliable Fault Detection Scheme for the Secure Hash Algorithm. Indian Journal of Science and Technology 10.19 (2017).
- S. R. Kokate & S. G. Salunke. (2017). Implementation of Intelligent Malware Detection System Using Post Processing Techniques. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). (pp. 1-4).
- S. W Jeong, U. R Chio & I. G. Lee. (2018). Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things. Journal of Digital Convergence, 16(9), 179-185. https://doi.org/10.14400/JDC.2018.16.9.179
- H. U. Kim, H. J. Kim, J. H. Kang & M. S. Jun. (2017). A Study on Analysis and Countermeasure of Security threat in NFC. Journal of Digital Convergence, 14(12), 183-191. https://doi.org/10.14400/JDC.2016.14.12.183
- K. H Ko. (2018). An Estimating Algorithm of Vehicle Collision Speed Through Images of Blackbox. Journal of Digital Convergence, 16(9), 173-178. https://doi.org/10.14400/JDC.2018.16.5.173