The study on the detection of the damaged file using the graph of the information entropy for Security Management; Chae Ho Cho, et al.- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications; Absi, Dae-Ki Kang.- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds; Mourad Elhadef.- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis; Kauznori Wagatsuma, et al.- Idea of Personal Digital Memories using Smart Application; Martin Zmitko, Ondrej Krejcar.- Proxy based Mobility Management Scheme using Prediction Algorithm; Daewon Lee, et al.- Principles of Usability in Human-Computer Interaction; Tomas Hustak, Ondrej Krejcar.- Design and Performance Evaluation of a VANET-based Adaptive Overtaking Assistance System; Ihn-Han Bae, Jae-Kon Lee.- Vulnerability Analysis on Smartphone Fingerprint Templates; Young-Hoo Jo, et al.- Study of Measures for Detecting Abnormal Access by Establishing the Context Data-Based Security Policy in the BYOD Environment; Changmin Jo.- Incremental Multilevel Association Rule Mining of a Dynamic Database under a Change of a Minimum Support Threshold; Nophadon Pumjun, Worapoj Kreesuradej.- Compressing Method of NetCDF Files containing Clustered Sparse Matrix; Suntae Hwang, et al.- An Approach to Discovering Weighted Service Pattern; Jeong Hee Hwang, MiSug Gu.- Cyber Security Modeling for the Operation of Virtualized Trusted Networks (VTN); Yong-Hee Jeon.- Development of a quantitative evaluation method for vehicle control systems based on road information; Jinyong Kim, et al.- Design challenges and Implementation of A Shipborne Gateway for Safe and Secure Navigational Networks; Kwangil Lee, MoonSub Song.- A Design and Implementation of lightweight ENC for Android App; Moonsub Song, et al.- Study of Censorship in Named Data Networking; Xingmin Cui, et al.- Research on Design of LTE-based High-Speed Railway Networks in Korea: Current and emerging issues; Jin-Kyu Choi, et al.- Alternative way to manage the research documents; Jeong Ah Kim, et al.- R&D Project Management using Context in Document: Research Descriptor; Jong-Won Ko, et al.- Research Descriptor based Project Management Approach for R&D Projects; Jong-Won Ko, et al.- Attributes for Characterizing Java Methods; Illo Lee, et al.- A study on Real Time Circular Motion in Robots using Kalman Filters; Malrey Lee, et al.- A Study on Traceability Between Documents of a Software R&D Project; Suntae Kim, et al.- Path Planning for Avoiding Obstacles for Unmanned Ground Vehicles; Gyoungeun Kim, et al.- Improved AEB Performance at Intersections with Diverse Road Surface Conditions Based on V2V Communication; Sangduck Jeon, et al.- Integrated Information Retrieval for Distributed Heterogeneous Ontology System; Sang-Won Hwang, et al.- hFractal: A Cloud-assisted Simulator of Virtual Plants for Digital Agriculture; Fei Hao, et al.- Proposal and Validation of AEB System Algorithm for Various Slope Environments; Ming Lin, et al.- A Study on the Performance Analysis of a V2V-Communication-Based Autonomous Emergency Braking System for High-Speed Driving under Various Road Surface Conditions; Hyeonggeun Mun, Byeongwoo Kim.- Implementation of power off recovery scheme for block mapping FTL; Ji-Hwan Chung, Tae-Sun Chung.- PLC Monitoring and Protection for SCADA Framework; Ahmed AlShemeili, et al.- Modeling Of Smart Supply Chain For Sustainability; Kyeongrim Ahn, et al.- Human Action Classification Using Multidimensional Functional Data Analysis Method; Wanhyun Cho, et al.- Light-weight Authentication Scheme for NFC mCoupon Service in IoT Environments; Sung-Wook Park, Im-Yeong Lee.- Model of CPU-intensive Applications in Cloud Computing; Junjie Peng, et al.- A Study of Effects of UTAUT-Based Factors on Acceptance of Smart Health Care Services; Yoo-Jin Moon , Young-Ho Hwang.- Detection and recognition of road markings for advanced driver assistance system; JongBae Kim.- Color and depth image correspondence for Kinect v2; Changhee Kim, et al.- Equivalent Test Model of Wireless Optical Communication System for Automotive Environment; Sangyub Lee, et al.- Feasibility Study of Non-linear Apodization for IVUS B-mode Imaging; Jin Ho Sung, et al.- An Empirial Study of Impacts of User Intention for Smart Wearable Devieces and Use Behavior; Yoojin Moon, et al.- Lightweight Context-aware Activity Recognition; Byung Gill Go, et al.- Efficient Sliding Window Join in Data Stream Processing; Hyeon Gyu Kim.- The Effect of the User Interface Design of Smartphone Applications on Users’ Individual Experiences of Performance; Wonjin Jung.- Data Hiding for H.264/AVC Based on the Motion Vector of 16 Grids; Cheng-Hsing Yang, et al.- Idle-Time Processing in Time-Slide Window; Join Hyeon Gyu Kim.- A Large-scale Object-based Active Storage Platform for Data Analytics in the Internet of Things; Quanqing Xu, et al.- Concurrent Regeneration Code with Local Reconstruction in Distributed Storage Systems; Quanqing Xu, et al.- A Technique for Streaming Multiple Video Parts in Parallel Based on Dash.js; Jo Yew Tham.- Prioritized Medical Image Forwarding over DTN in a Volcano Disaster; Muhammad Ashar, et al.- A Framework of Personal Data Analytics for Well-Being Oriented Life Support; Seiji Kasuya, et al.- Secure Initial Attach based on Challenge-Response Method in LTE Conforming to LTE Standards; Jungho Kang.- A Design and Development of Secure-Coding Check System Based on CVE and CWE; Hyungjoo Kim, Moonseog Jun.- Lightweight Encryption Technique for Content Security in Open IPTV Environment; Jaewoo Kim, et al.- Lightweight mutual authentication routing protocols design based on LEACH in sensor network environment; Jaeseung Lee, et al.- Method research for safe authentication in cloud environment; Jaeseung Lee, et al.- A Design of Dual Encryption Based On Data Obfuscation and Mutual Authentication in the Smart-Grid Environment; Wonkyu Choi, et al.- A Study on Realtime Detecting Smishing on Cloud Computing Environments; Ayoung Lee, et al.- Application of Data Mining for Crime Analysis; Aziz Nasridinov, et al.- Graph-based Motor Primitive Generation Method of UAVs based on Demonstration-based Learning; The study on the detection of the damaged file using the graph of the information entropy for Security Management; Chae Ho Cho, et al.- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications; Ahmed Absi, Dae-Ki Kang.- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds; Mourad Elhadef.- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis; Kauznori Wagatsuma, et al.- Idea of Personal Digital Memories using Smart Application; Martin Zmitko, Ondrej Krejcar.- Proxy based Mobility Management Scheme using Prediction Algorithm; Daewon Lee, et al.- Principles of Usability in Human-Computer Interaction; Tomas Hustak, Ondrej Krejcar.- Design and Performance Evaluation of a VANET-based Adaptive Overtaking Assistance System; Ihn-Han Bae, Jae-Kon Lee.- Vulnerability Analysis on Smartphone Fingerprint Templates; Young-Hoo Jo, et al.- Study of Measures for Detecting Abnormal Access by Establishing the Context Data-Based Security Policy in the BYOD Environment; Changmin Jo.- Incremental Multilevel Association Rule Mining of a Dynamic Database under a Change of a Minimum Support Threshold; Nophadon Pumjun, Worapoj Kreesuradej.- Compressing Method of NetCDF Files containing Clustered Sparse Matrix; Suntae Hwang, et al.- An Approach to Discovering Weighted Service Pattern; Jeong Hee Hwang, MiSug Gu.- Cyber Security Modeling for the Operation of Virtualized Trusted Networks (VTN); Yong-Hee Jeon.- Development of a quantitative evaluation method for vehicle control systems based on road information; Jinyong Kim, et al.- Design challenges and Implementation of A Shipborne Gateway for Safe and Secu