Digital Library
Search: "[ keyword: AC ]" (839)
데이터 3법 개정에 따른 분쟁조정위원회 역할과 이슈분석
윤덕중,
지윤석,
김영애,
신용태,
Vol. 30, No. 2, pp. 279-286,
4월.
2020
10.13089/JKIISC.2020.30.2.279
주제어: Personal Information Act, Secure, Safe Use, ADR, Personal Information, Personal Information Act, Secure, Safe Use, ADR, Personal Information
10.13089/JKIISC.2020.30.2.279
주제어: Personal Information Act, Secure, Safe Use, ADR, Personal Information, Personal Information Act, Secure, Safe Use, ADR, Personal Information
오프라인 거래에서 개인정보 보호방안 : 주택임대차계약을 중심으로
김효석,
박순태,
김용민,
Vol. 30, No. 2, pp. 243-252,
4월.
2020
10.13089/JKIISC.2020.30.2.243
주제어: Privacy, personal information processing, housing lease agreement, Electronic contract, IRTS, Privacy, personal information processing, housing lease agreement, Electronic contract, IRTS
10.13089/JKIISC.2020.30.2.243
주제어: Privacy, personal information processing, housing lease agreement, Electronic contract, IRTS, Privacy, personal information processing, housing lease agreement, Electronic contract, IRTS
참조 테이블 기반 스칼라 곱 알고리즘에 대한 충돌 특성을 이용한 향상된 수평상관분석
박동준,
이상엽,
조성민,
김희석,
홍석희,
Vol. 30, No. 2, pp. 179-187,
4월.
2020
10.13089/JKIISC.2020.30.2.179
주제어: Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis, Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis
10.13089/JKIISC.2020.30.2.179
주제어: Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis, Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis
Adaptive Boosting을 사용한 패커 식별 방법 연구
장윤환,
박성준,
박용수,
Vol. 30, No. 2, pp. 169-177,
4월.
2020
10.13089/JKIISC.2020.30.2.169
주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.
10.13089/JKIISC.2020.30.2.169
주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.
로컬 차분 프라이버시 실제 적용 사례연구 : 프라이버시 보존형 설문조사
정수용,
홍도원,
서창호,
Vol. 30, No. 1, pp. 141-156,
2월.
2020
10.13089/JKIISC.2020.30.1.141
주제어: Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis, Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis
10.13089/JKIISC.2020.30.1.141
주제어: Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis, Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis
미국 사이버보안 인력 양성 법.규정 분석을 통한 국내 법.규정 개선 방안 연구
홍순좌,
김준수,
Vol. 30, No. 1, pp. 123-139,
2월.
2020
10.13089/JKIISC.2020.30.1.123
주제어: Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act, Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act
10.13089/JKIISC.2020.30.1.123
주제어: Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act, Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act
저작권 침해 사이트 생애 주기 모델 개발
김득훈,
정해선,
곽진,
Vol. 30, No. 1, pp. 101-121,
2월.
2020
10.13089/JKIISC.2020.30.1.101
주제어: Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate, Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate
10.13089/JKIISC.2020.30.1.101
주제어: Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate, Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate
위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅
쿠미산드라,
임채호,
이상곤,
Vol. 30, No. 1, pp. 59-74,
2월.
2020
10.13089/JKIISC.2020.30.1.59
주제어: Security Management, Cyber Attack, Vulnerability, OWASP, MITRE, BITSCAN, Security Management, Cyber Attack, Vulnerability, OWASP, MITRE, BITSCAN
10.13089/JKIISC.2020.30.1.59
주제어: Security Management, Cyber Attack, Vulnerability, OWASP, MITRE, BITSCAN, Security Management, Cyber Attack, Vulnerability, OWASP, MITRE, BITSCAN
API Call Time Interval을 활용한 머신러닝 기반의 악성코드 탐지
조영민,
권헌영,
Vol. 30, No. 1, pp. 51-58,
2월.
2020
10.13089/JKIISC.2020.30.1.51
주제어: Machine Learning, Malware detection, Time Interval, AI, Machine Learning, Malware detection, Time Interval, AI
10.13089/JKIISC.2020.30.1.51
주제어: Machine Learning, Malware detection, Time Interval, AI, Machine Learning, Malware detection, Time Interval, AI
블록 암호 SM4에 대한 부채널 공격 및 마스킹 기반 대응기법 분석
배대현,
남승현,
하재철,
Vol. 30, No. 1, pp. 39-49,
2월.
2020
10.13089/JKIISC.2020.30.1.39
주제어: Side-Channel Analysis, Power Analysis Attack, DPA, CPA, Data Masking, MLP, Side-Channel Analysis, Power Analysis Attack, DPA, CPA, Data Masking, MLP
10.13089/JKIISC.2020.30.1.39
주제어: Side-Channel Analysis, Power Analysis Attack, DPA, CPA, Data Masking, MLP, Side-Channel Analysis, Power Analysis Attack, DPA, CPA, Data Masking, MLP