Digital Library


Search: "[ author: 홍순좌 ]" (8)
    A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation
    홍순좌, 최영한, 강정민, 박한진, Vol. 30, No. 6, pp. 1167-1187, Dec. 2020
    10.13089/JKIISC.2020.30.6.1167
    Keywords: Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R, Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R

    Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert
    최영한, 장인숙, 황인택, 김태균, 홍순좌, 박인성, 양진석, 권영재, 강정민, Vol. 30, No. 5, pp. 805-821, Oct. 2020
    10.13089/JKIISC.2020.30.5.805
    Keywords: Cyber defense exercise, Cyber Security Training, Cyber defense exercise, Cyber Security Training

    A Study on the Laws and Regulations in Korea through the Analysis of Cybersecurity Workforce Developing Laws and Regulations in U.S.
    Soonjwa Hong, Joonsoo Kim, Vol. 30, No. 1, pp. 123-139, Feb. 2020
    10.13089/JKIISC.2020.30.1.123
    Keywords: Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act, Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act

    A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S.
    Soonjwa Hong, Vol. 28, No. 1, pp. 249-267, Feb. 2018
    10.13089/JKIISC.2018.28.1.249
    Keywords: ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training, ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training

    Software Security Testing using Block-based File Fault Injection
    Young-Han Choi, Hyoung-Chun Kim, Soon-Jwa Hong, Vol. 17, No. 4, pp. 3-10, Aug. 2007
    10.13089/JKIISC.2007.17.4.3
    Keywords: Software Testing, fault injection, file fuzzing

    A Design and Implementation of ROAD(RPC Object vulnerability Automatic Detector)
    Jin-Seok Yang, Tae-Ghyoon Kim, Hyoung-Chun Kim, Soon-Jwa Hong, Vol. 17, No. 2, pp. 51-60, Apr. 2007
    10.13089/JKIISC.2007.17.2.51
    Keywords: Software Testing, Fuzzing, Fuzzer, RPC, Windows XP SP2, Vulnerability

    The Study on the Effective Prevention Mechanism of Masquerade Attacks on Wireless Ad hoc Network
    Soon-Jwa Hong, Hyun-Dong Park, Vol. 16, No. 6, pp. 135-150, Dec. 2006
    10.13089/JKIISC.2006.16.6.135
    Keywords: ad hoc network, wireless network, survivability, masquerade packet attack

    On Design of the Recoverable Cryptosystem in Public Key Infrastructure
    , , , , Vol. 12, No. 1, pp. 11-20, Feb. 2002
    10.13089/JKIISC.2002.12.1.11
    Keywords: auto-recovery auto-cerificate cryptosystem, RSA, software key escrow