Digital Library
Search: "[ author: 손태식 ]" (32)
ISA 100.11a 및 WirelessHART 기반 보안위협 식별 및 보안요구사항 도출 연구
정재한,
권성문,
손태식,
Vol. 29, No. 5, pp. 1063-1075,
10월.
2019
10.13089/JKIISC.2019.29.5.1063
주제어: ISA 100, WirelessHART, Security, WISN, Threat Analysis, ISA 100, WirelessHART, Security, WISN, Threat Analysis
10.13089/JKIISC.2019.29.5.1063
주제어: ISA 100, WirelessHART, Security, WISN, Threat Analysis, ISA 100, WirelessHART, Security, WISN, Threat Analysis
신뢰성 있는 스마트팩토리를 위한 사이버보안 아키텍처
김현진,
김성진,
김예솔,
김신규,
손태식,
Vol. 29, No. 3, pp. 629-643,
5월.
2019
10.13089/JKIISC.2019.29.3.629
주제어: Smartfactory, Architecture, Security Threats, Security requirement, Smartfactory, Architecture, Security Threats, Security requirement
10.13089/JKIISC.2019.29.3.629
주제어: Smartfactory, Architecture, Security Threats, Security requirement, Smartfactory, Architecture, Security Threats, Security requirement
Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지
김용준,
손태식,
Vol. 29, No. 2, pp. 331-346,
3월.
2019
10.13089/JKIISC.2019.29.2.331
주제어: ICS/SCADA, Legacy ICS, CTI, Sysmon, ELK, ICS/SCADA, Legacy ICS, CTI, Sysmon, ELK
10.13089/JKIISC.2019.29.2.331
주제어: ICS/SCADA, Legacy ICS, CTI, Sysmon, ELK, ICS/SCADA, Legacy ICS, CTI, Sysmon, ELK
공개 딥러닝 라이브러리에 대한 보안 취약성 검증
정재한,
손태식,
Vol. 29, No. 1, pp. 117-125,
1월.
2019
10.13089/JKIISC.2019.29.1.117
주제어: Adversarial attack, MNIST, Deep Learning, Security, Autoencoder, Convolution Neural Network, Adversarial attack, MNIST, Deep Learning, Security, Autoencoder, Convolution Neural Network
10.13089/JKIISC.2019.29.1.117
주제어: Adversarial attack, MNIST, Deep Learning, Security, Autoencoder, Convolution Neural Network, Adversarial attack, MNIST, Deep Learning, Security, Autoencoder, Convolution Neural Network
리눅스 커널에 따른 메타데이터 기반 파일 복원 연구
신영훈,
조우연,
손태식,
Vol. 29, No. 1, pp. 77-91,
1월.
2019
10.13089/JKIISC.2019.29.1.77
주제어: Digital Forensics, Filesystem, Linux, Ext, file recovery, Digital Forensics, Filesystem, Linux, Ext, file recovery
10.13089/JKIISC.2019.29.1.77
주제어: Digital Forensics, Filesystem, Linux, Ext, file recovery, Digital Forensics, Filesystem, Linux, Ext, file recovery
포털 전자메일 압수수색을 위한 메일헤더기반 디지털포렌식
이해진,
손태식,
Vol. 28, No. 5, pp. 1129-1140,
9월.
2018
10.13089/JKIISC.2018.28.5.1129
주제어: Digital Forensics, e-mail seizure search, infringement of privacy, Digital Forensics, e-mail seizure search, infringement of privacy
10.13089/JKIISC.2018.28.5.1129
주제어: Digital Forensics, e-mail seizure search, infringement of privacy, Digital Forensics, e-mail seizure search, infringement of privacy
산업제어시스템 취약성 분석을 위한 무작위성 기반 퍼징 테스트 케이스 평가 기법
김성진,
손태식,
Vol. 28, No. 1, pp. 179-186,
2월.
2018
10.13089/JKIISC.2018.28.1.179
주제어: vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System, vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System
10.13089/JKIISC.2018.28.1.179
주제어: vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System, vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System