위협 모델링을 통한 스마트밴드 보안 요구사항 분석
Vol. 28, No. 6, pp. 1355-1369,
11월.
2018
10.13089/JKIISC.2018.28.6.1355, Full Text:
Keywords: Security requirement, Smart band, Threat modeling
Abstract Statistics
Cite this article
10.13089/JKIISC.2018.28.6.1355, Full Text:
Keywords: Security requirement, Smart band, Threat modeling
Abstract Statistics
Cite this article
[IEEE Style]
강수인, 김혜민, 김휘강, "Trustworthy Smart Band: Security Requirements Analysis with Threat Modeling," Journal of The Korea Institute of Information Security and Cryptology, vol. 28, no. 6, pp. 1355-1369, 2018. DOI: 10.13089/JKIISC.2018.28.6.1355.
[ACM Style]
강수인, 김혜민, and 김휘강. 2018. Trustworthy Smart Band: Security Requirements Analysis with Threat Modeling. Journal of The Korea Institute of Information Security and Cryptology, 28, 6, (2018), 1355-1369. DOI: 10.13089/JKIISC.2018.28.6.1355.