HEVC : High Efficiency Video Coding
NFC : Near Field Communication
NRI : Networked Readiness Index
Multipath Fading
Digerati : Digital + Literati
DPM : Digital PostMark
Network Neutrality
Media Big Bang
FDR : Flight Data Recoder
Space Club
AMR : Automatic Meter Reading
OFDM : Orthogonal Frequency Division Multiplexing
VMC : Vehicle Multihop Communication
Cloud Computing
PostNet
Protocol
CODEC : COder/DECoder
CTTH : Coax To The Home
EPC Class : Electronic Product Code Class
GIS : Geographic Information System
HSDPA : High Speed Downlink Packet Access
ICMP : Internet Control Management Protocol
IPSec : IP security protocol
IT839(u-IT839)
ITSM : Information Technology Service Management
LAN : Local Area Network
MICS : Medical Implant Communication Service
NGN : Next Generation Network
PAD : Packet Assembly and Disassembly
PICONET
Qos : Quality of Service
SYN : SYNchronous idle
TCP/IP
u-Health
USN : Ubiquitous Sensor Network
UWB : Ultra WideBand
VOD : Video On Demand
VPN : Virtual Private Network
WBAN : Wireless Body Area Network
WPAN : Wireless Personal Area Network
Light Amplifier
Wireless Power Transmission
DSA : Dynamic Spectrum Access
TVWS : TV White Space
HNIS : Heterogeneous Network Inegration Solution
Convergent Contents
Internet Ehics
Electromagnetic Environment
KOREN : Korea Advanced Research Network
White Domain
MAN : Metropolitan Area Network
URL : Uniform Resource Locater
Space Information
AAA : Active Array Antenna
MMIC : Monolithic Microwave Intergrated Circuit
D2DC : Device-to-Device Communication
3GPP : 3rd Generation Partnership Project
W-CDMA : Wide-Code Division Mutiple Access
Shannon-Hartley Theorem
SNR : Signal to Noise Ratio
Smart Sensor
QIS : Quantum Information Science
Location Information
UN-GGIM : United Nations Global Geospatial Information Management
Disaster Security Communication Network
Information Centric Networking
Clear QAM
Scramble
SBR : Spectral Band Replication
HE-AAC : High-Efficiency Advanced Audio Coding
AJAX : Asynchronous JavaScript and Xml
Carrier Aggregation
Telepresence
NFV : Network Function Virtualization
Nielsen's Law
IoE : Internet of Everything
IoT : Internet of Things
WoT : Web of Things
SSOC : Smart Social Overhead Capital
Information Wellness
GENI : Global Environment for Network Innovations
Tor Network
HEMS : Home Energy Management System
Groupware
Domain Name
Digital Native
Muticast
Metadata
BLOG : web + log
UCC : User Created Contents
Cyber Stalking
Social Search
SCORM : Sharable Content Object Reference Model
Spam
Anycast
Web 2.0
Unicast
AR : Augmented Reality
ZigBee
QoE : Quality of Experience
Cookie
Quickdom : Quick + Domain
qmail
Tagging
Phishing
Alt-Text
FTP : File Transfer Protocol
IMS : IP Multimedia Subsystem
IPTV : Internet Protocol TV
IPv6 : Internet Protocol Version 6
m-commerce
Mashup
MMS : Multimedia Messaging System
Ping of Death
Pro-teur : Professional amateur
RIA : Rich Internet Application
RSS : Really Simple Syndication
Semantic Web
Splogger : Spam + Blogger
UCC Guideline
VoIP : Voice over Internet Protocol
WebKit
WWW
HTTP : Hyper Text Tranfer Protocol
XML : eXtensible Markup Language
Joint WiFi Zone
Green i-Net
Digital Prosumer
Smart Divide
Wi-Fi P2P
LBSNS : Location Based Social Network Service
Cloud Auditor
Cloud Service Authentication System
SEO : Search Engine Optimization
Miracast
Bounce Back
Video Curation
Social Network Game
WiGig Alliance
URL Shortening
Deep Web
Contextual Search
Responsive Web
sunfull : full of sunshine
Social Search
Social Dating
Vertical Platform
Vertical Portal
PKI : Public Key Infrastructure
Attack Toolkit
Certificate
DLP : Data Loss Prevention
Digital Evidence
Vandalism
Firewall
Sniffing
Switch Jamming
Stuxnet
Authentification
Certiication Authority
i-PIN : internet Personal Idenfication Number
CLMS : Copyright License Management System
Goverment-Personal Idenfication Number
IDS : Intrusion Detection System
Key Pair
PET : Privacy Enhancing Technology
Proxy Server
CRL : Certificate Revocation List
DDos : Distributed Denial of Service
DES : Data Encryption Standard
DRM : Digital Radio Modiale
IP Spoofing
OTP : One-Time Password
SAM : Secure Application Module
VoIP Security Threat
WPA : Wi-Fi Protected Access
Monitoring
PIA : Privacy Impact Assessment
Personal Information Manager
Personal Information Handler
Personal Information File
Ghost Identity
공공누리 표시제도
Common Literary Work
Brute Force Attack
Biometric Information Security
Security Audit
Security Evaluation
Asymetric Key Algorithm
Smart Sign
Works
e-Navigation
Access Recording
ISAC : Information Sharing & Analysis Center
Information Security Audit System
Information Security Management System Authentication
주민등록번호 클린센터
Security Incident
Homeland Security
Screen Hacking
Cyber Bullying
Digital Forensics
Patent Troll
Signature Recognition
Message Authentication Code Algorithm
Block Cipher Modes of Operation
Cybershelter
Web Firewall
Exclusive Vaccine
G-ISMS : Goverment Information Security Management System
CII : Critical Information Infrastructure
CRO : Chief Risk-management Officer
Keylogging
KCAC : Korea Certification Authority Central
KISO : Korea Internet Self-governance Organization
ARP Redirect Attack : Address Resolution Protocol Redirect Attack
LEA : Lightweight Low-power Encryption Algorithm
SHA : Secure Hash Algorithm
APT : Advanced Persistent Threats
Botnet
CCL : Creative Commons Licence
HDCP : High-bandwidth Digital Content Protection
Pharming
Social Engineering
SSL : Secure Sockets Layers
Trap Door
Zero Day Attack
Zeus
Zombie
PES : Personal Environment Service
Netbook
Mobile Computing
USIM : Universal Subscriber Identity Module
STTD : Space Time Transmit Diversity
OCAP : Open Cable Application Platform
One Seg
Ubiquitous
Haptic Technology
Telematics : Telecommunication + Informatics
Femto Cell
Femto Cell Base Station
AP : Access Point
App Store
GPS : Global Positioning System
IMT-2000 : International Mobile Telecommunication - 2000
ITS : Intelligent Transportation System
LBS : Location-Based Services
RFID : Radio Frequency IDentification
SCO : Synchronous Connection Oriented link
VHT : Very High Throughtput
WCDMA : Wide-band CDMA
WEP : Wired Equivalent Privacy
WiBro(Wireless Broadband)
WiFi : Wireless-Fidelity
WIPI : Wireless Internet Platform for Interoperability
Affective Computing
Motion Recognition
Mobile Virtualization
Smart Classroom
LTE : Long Term Evolution
BYOD : Bring Your Own Device
Meta Mirror
Wikipedia
BPR : Business Process Reengineering
CRM : Customer Relationship Management
DMB : Digital Multimedia Broadcasting
EDI : Electronic Data Interchage
EIS : Executive Information System
ERP : Enterprise Resource Planning
KMS : Knowledge Management System
SCM : Suppy Chain Management
Light Time
Articulated Robot
Urban Mining
Independent Film
Digital Radio Broadcasting
Remix
Maxwell's Equation
Mise-en-scene Effect
Bio Battery
Stereoscope
Public Access Program
Atomic Standard of Frequency
Health Informatics
Broadcast for a person with disability
Coordinates System
Mass Spectrographs
Camera Work
Continuity
Integration Rating
CPM : Corporate Performance Management
EMP Attack : Electromagnetic Pulse Attack
SIS : Strategic Information System
TPS : Transaction Processing System
Interferometer
Speculative Games
Slow Motion Technic
Automotive Event Data Recoder
Time Slice
C4I : Command Control Communication Computer Intelligence
Hold Back
SMPTE : Society of Motion Picture and TV Engineers
Open Banking
Digital Frame
Digital Table
Connected House
Social Mining
Synaptic Web
Open Graph
Opinion Mining
Web Mining
Web Bot : Web + Micro robot
Walled Garden
Curation Commerce
Twitter Bot : Twitter + Robot
Proxy Program
NFC : Near Field Communication
NRI : Networked Readiness Index
Multipath Fading
Digerati : Digital + Literati
DPM : Digital PostMark
Network Neutrality
Media Big Bang
FDR : Flight Data Recoder
Space Club
AMR : Automatic Meter Reading
OFDM : Orthogonal Frequency Division Multiplexing
VMC : Vehicle Multihop Communication
Cloud Computing
PostNet
Protocol
CODEC : COder/DECoder
CTTH : Coax To The Home
EPC Class : Electronic Product Code Class
GIS : Geographic Information System
HSDPA : High Speed Downlink Packet Access
ICMP : Internet Control Management Protocol
IPSec : IP security protocol
IT839(u-IT839)
ITSM : Information Technology Service Management
LAN : Local Area Network
MICS : Medical Implant Communication Service
NGN : Next Generation Network
PAD : Packet Assembly and Disassembly
PICONET
Qos : Quality of Service
SYN : SYNchronous idle
TCP/IP
u-Health
USN : Ubiquitous Sensor Network
UWB : Ultra WideBand
VOD : Video On Demand
VPN : Virtual Private Network
WBAN : Wireless Body Area Network
WPAN : Wireless Personal Area Network
Light Amplifier
Wireless Power Transmission
DSA : Dynamic Spectrum Access
TVWS : TV White Space
HNIS : Heterogeneous Network Inegration Solution
Convergent Contents
Internet Ehics
Electromagnetic Environment
KOREN : Korea Advanced Research Network
White Domain
MAN : Metropolitan Area Network
URL : Uniform Resource Locater
Space Information
AAA : Active Array Antenna
MMIC : Monolithic Microwave Intergrated Circuit
D2DC : Device-to-Device Communication
3GPP : 3rd Generation Partnership Project
W-CDMA : Wide-Code Division Mutiple Access
Shannon-Hartley Theorem
SNR : Signal to Noise Ratio
Smart Sensor
QIS : Quantum Information Science
Location Information
UN-GGIM : United Nations Global Geospatial Information Management
Disaster Security Communication Network
Information Centric Networking
Clear QAM
Scramble
SBR : Spectral Band Replication
HE-AAC : High-Efficiency Advanced Audio Coding
AJAX : Asynchronous JavaScript and Xml
Carrier Aggregation
Telepresence
NFV : Network Function Virtualization
Nielsen's Law
IoE : Internet of Everything
IoT : Internet of Things
WoT : Web of Things
SSOC : Smart Social Overhead Capital
Information Wellness
GENI : Global Environment for Network Innovations
Tor Network
HEMS : Home Energy Management System
Groupware
Domain Name
Digital Native
Muticast
Metadata
BLOG : web + log
UCC : User Created Contents
Cyber Stalking
Social Search
SCORM : Sharable Content Object Reference Model
Spam
Anycast
Web 2.0
Unicast
AR : Augmented Reality
ZigBee
QoE : Quality of Experience
Cookie
Quickdom : Quick + Domain
qmail
Tagging
Phishing
Alt-Text
FTP : File Transfer Protocol
IMS : IP Multimedia Subsystem
IPTV : Internet Protocol TV
IPv6 : Internet Protocol Version 6
m-commerce
Mashup
MMS : Multimedia Messaging System
Ping of Death
Pro-teur : Professional amateur
RIA : Rich Internet Application
RSS : Really Simple Syndication
Semantic Web
Splogger : Spam + Blogger
UCC Guideline
VoIP : Voice over Internet Protocol
WebKit
WWW
HTTP : Hyper Text Tranfer Protocol
XML : eXtensible Markup Language
Joint WiFi Zone
Green i-Net
Digital Prosumer
Smart Divide
Wi-Fi P2P
LBSNS : Location Based Social Network Service
Cloud Auditor
Cloud Service Authentication System
SEO : Search Engine Optimization
Miracast
Bounce Back
Video Curation
Social Network Game
WiGig Alliance
URL Shortening
Deep Web
Contextual Search
Responsive Web
sunfull : full of sunshine
Social Search
Social Dating
Vertical Platform
Vertical Portal
PKI : Public Key Infrastructure
Attack Toolkit
Certificate
DLP : Data Loss Prevention
Digital Evidence
Vandalism
Firewall
Sniffing
Switch Jamming
Stuxnet
Authentification
Certiication Authority
i-PIN : internet Personal Idenfication Number
CLMS : Copyright License Management System
Goverment-Personal Idenfication Number
IDS : Intrusion Detection System
Key Pair
PET : Privacy Enhancing Technology
Proxy Server
CRL : Certificate Revocation List
DDos : Distributed Denial of Service
DES : Data Encryption Standard
DRM : Digital Radio Modiale
IP Spoofing
OTP : One-Time Password
SAM : Secure Application Module
VoIP Security Threat
WPA : Wi-Fi Protected Access
Monitoring
PIA : Privacy Impact Assessment
Personal Information Manager
Personal Information Handler
Personal Information File
Ghost Identity
공공누리 표시제도
Common Literary Work
Brute Force Attack
Biometric Information Security
Security Audit
Security Evaluation
Asymetric Key Algorithm
Smart Sign
Works
e-Navigation
Access Recording
ISAC : Information Sharing & Analysis Center
Information Security Audit System
Information Security Management System Authentication
주민등록번호 클린센터
Security Incident
Homeland Security
Screen Hacking
Cyber Bullying
Digital Forensics
Patent Troll
Signature Recognition
Message Authentication Code Algorithm
Block Cipher Modes of Operation
Cybershelter
Web Firewall
Exclusive Vaccine
G-ISMS : Goverment Information Security Management System
CII : Critical Information Infrastructure
CRO : Chief Risk-management Officer
Keylogging
KCAC : Korea Certification Authority Central
KISO : Korea Internet Self-governance Organization
ARP Redirect Attack : Address Resolution Protocol Redirect Attack
LEA : Lightweight Low-power Encryption Algorithm
SHA : Secure Hash Algorithm
APT : Advanced Persistent Threats
Botnet
CCL : Creative Commons Licence
HDCP : High-bandwidth Digital Content Protection
Pharming
Social Engineering
SSL : Secure Sockets Layers
Trap Door
Zero Day Attack
Zeus
Zombie
PES : Personal Environment Service
Netbook
Mobile Computing
USIM : Universal Subscriber Identity Module
STTD : Space Time Transmit Diversity
OCAP : Open Cable Application Platform
One Seg
Ubiquitous
Haptic Technology
Telematics : Telecommunication + Informatics
Femto Cell
Femto Cell Base Station
AP : Access Point
App Store
GPS : Global Positioning System
IMT-2000 : International Mobile Telecommunication - 2000
ITS : Intelligent Transportation System
LBS : Location-Based Services
RFID : Radio Frequency IDentification
SCO : Synchronous Connection Oriented link
VHT : Very High Throughtput
WCDMA : Wide-band CDMA
WEP : Wired Equivalent Privacy
WiBro(Wireless Broadband)
WiFi : Wireless-Fidelity
WIPI : Wireless Internet Platform for Interoperability
Affective Computing
Motion Recognition
Mobile Virtualization
Smart Classroom
LTE : Long Term Evolution
BYOD : Bring Your Own Device
Meta Mirror
Wikipedia
BPR : Business Process Reengineering
CRM : Customer Relationship Management
DMB : Digital Multimedia Broadcasting
EDI : Electronic Data Interchage
EIS : Executive Information System
ERP : Enterprise Resource Planning
KMS : Knowledge Management System
SCM : Suppy Chain Management
Light Time
Articulated Robot
Urban Mining
Independent Film
Digital Radio Broadcasting
Remix
Maxwell's Equation
Mise-en-scene Effect
Bio Battery
Stereoscope
Public Access Program
Atomic Standard of Frequency
Health Informatics
Broadcast for a person with disability
Coordinates System
Mass Spectrographs
Camera Work
Continuity
Integration Rating
CPM : Corporate Performance Management
EMP Attack : Electromagnetic Pulse Attack
SIS : Strategic Information System
TPS : Transaction Processing System
Interferometer
Speculative Games
Slow Motion Technic
Automotive Event Data Recoder
Time Slice
C4I : Command Control Communication Computer Intelligence
Hold Back
SMPTE : Society of Motion Picture and TV Engineers
Open Banking
Digital Frame
Digital Table
Connected House
Social Mining
Synaptic Web
Open Graph
Opinion Mining
Web Mining
Web Bot : Web + Micro robot
Walled Garden
Curation Commerce
Twitter Bot : Twitter + Robot
Proxy Program
댓글 없음:
댓글 쓰기