Digital Library
Search: "[ keyword: AC ]" (826)
위협 모델링 분석 및 국제공통평가기준을 통한 스마트홈 허브의 보안요구사항에 관한 연구
박재현,
강수영,
김승주,
Vol. 28, No. 2, pp. 513-528,
4월.
2018
10.13089/JKIISC.2018.28.2.513
주제어: Smart Home, Privacy, Threat modeling, LINDDUN, criteria, Smart Home, Privacy, Threat modeling, LINDDUN, criteria
10.13089/JKIISC.2018.28.2.513
주제어: Smart Home, Privacy, Threat modeling, LINDDUN, criteria, Smart Home, Privacy, Threat modeling, LINDDUN, criteria
동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구
문주연,
김태규,
김인성,
김휘강,
Vol. 28, No. 2, pp. 485-500,
4월.
2018
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법
김광준,
황규호,
김인경,
오형근,
이만희,
Vol. 28, No. 2, pp. 449-456,
4월.
2018
10.13089/JKIISC.2018.28.2.449
주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
10.13089/JKIISC.2018.28.2.449
주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석
강태운,
김휘강,
Vol. 28, No. 2, pp. 437-447,
4월.
2018
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
지능형 영상 감시 환경에서의 개인정보보호를 위한 COP-변환 기반 메타데이터 보안 기법 연구
이동혁,
박남제,
Vol. 28, No. 2, pp. 417-428,
4월.
2018
10.13089/JKIISC.2018.28.2.417
주제어: video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security, video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security
10.13089/JKIISC.2018.28.2.417
주제어: video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security, video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security
기계학습 기반 IDS 보안이벤트 분류 모델의 정확도 및 신속도 향상을 위한 실용적 feature 추출 연구
신익수,
송중석,
최장원,
권태웅,
Vol. 28, No. 2, pp. 385-395,
4월.
2018
10.13089/JKIISC.2018.28.2.385
주제어: Network Security, IDS, False Alarm, Machine Learning, SVM, Network Security, IDS, False Alarm, Machine Learning, SVM
10.13089/JKIISC.2018.28.2.385
주제어: Network Security, IDS, False Alarm, Machine Learning, SVM, Network Security, IDS, False Alarm, Machine Learning, SVM
관심영역 암호화 시 발생하는 H.264 영상의 비트레이트 오버헤드 최소화 방법 연구
손동열,
김지민,
지청민,
김강석,
김기형,
홍만표,
Vol. 28, No. 2, pp. 311-325,
4월.
2018
10.13089/JKIISC.2018.28.2.311
주제어: H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead, H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead
10.13089/JKIISC.2018.28.2.311
주제어: H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead, H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead