Digital Library
Search: "[ author: 김휘강 ]" (69)
위협 모델링을 통한 스마트밴드 보안 요구사항 분석
강수인,
김혜민,
김휘강,
Vol. 28, No. 6, pp. 1355-1369,
12월.
2018
10.13089/JKIISC.2018.28.6.1355
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
헨젤과 그레텔 : 게임 내 아이템 거래를 기반으로 한 GFG 탐지 방안
이경민,
김휘강,
Vol. 28, No. 6, pp. 1415-1425,
12월.
2018
10.13089/JKIISC.2018.28.6.1415
주제어: Online Games, MMORPG, game bot, GFG, Trading Network, Online Games, MMORPG, game bot, GFG, Trading Network
주제어: Online Games, MMORPG, game bot, GFG, Trading Network, Online Games, MMORPG, game bot, GFG, Trading Network
공개 취약점 정보를 활용한 소프트웨어 취약점 위험도 스코어링 시스템
김민철,
오세준,
강현재,
김진수,
김휘강,
Vol. 28, No. 6, pp. 1449-1461,
12월.
2018
10.13089/JKIISC.2018.28.6.1449
주제어: scoring system, risk based prioritization, CVE, CWE, CVSS, scoring system, risk based prioritization, CVE, CWE, CVSS
주제어: scoring system, risk based prioritization, CVE, CWE, CVSS, scoring system, risk based prioritization, CVE, CWE, CVSS
행위 시간 간격 기반 게임 봇 탐지 기법
강용구,
김휘강,
Vol. 28, No. 5, pp. 1153-1160,
10월.
2018
10.13089/JKIISC.2018.28.5.1153
주제어: Online game, Bot detection, Machine Learning, Online game, Bot detection, Machine Learning
주제어: Online game, Bot detection, Machine Learning, Online game, Bot detection, Machine Learning
메모리 추가 신경망을 이용한 희소 악성코드 분류
강민철,
김휘강,
Vol. 28, No. 4, pp. 847-857,
8월.
2018
10.13089/JKIISC.2018.28.4.847
주제어: Malware classification, Visualization, Memory Augmented Neural Network, Malware classification, Visualization, Memory Augmented Neural Network
주제어: Malware classification, Visualization, Memory Augmented Neural Network, Malware classification, Visualization, Memory Augmented Neural Network
VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석
강태운,
김휘강,
Vol. 28, No. 2, pp. 437-447,
4월.
2018
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구
문주연,
김태규,
김인성,
김휘강,
Vol. 28, No. 2, pp. 485-500,
4월.
2018
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
Threat Modeling을 이용한 PS4와 PC간의 Remote Play 상황 속 위험 분석
김혜민,
김휘강,
Vol. 28, No. 1, pp. 135-143,
2월.
2018
10.13089/JKIISC.2018.28.1.135
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling