Digital Library
Search: "[ keyword: AI ]" (204)
ICT 공급망 보안기준 및 프레임워크 비교 분석
민성현,
손경호,
Vol. 30, No. 6, pp. 1189-1206,
12월.
2020
10.13089/JKIISC.2020.30.6.1189
주제어: Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management, Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management, Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management
GDPR 준수 가능한 블록체인 기반 접근제어 시스템
임준호,
천지영,
노건태,
정익래,
Vol. 30, No. 6, pp. 981-997,
12월.
2020
10.13089/JKIISC.2020.30.6.981
주제어: Blockchain, GDPR, access control, ABE(Attribute Based Encryption), Chameleon Hash, Smart Contract, Blockchain, GDPR, access control, ABE(Attribute Based Encryption), Chameleon Hash, Smart Contract
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Blockchain, GDPR, access control, ABE(Attribute Based Encryption), Chameleon Hash, Smart Contract, Blockchain, GDPR, access control, ABE(Attribute Based Encryption), Chameleon Hash, Smart Contract
3D 환경을 고려한 무선 센서 네트워크의 키 사전 분배 기법 실험 연구
윤혜민,
신수연,
권태경,
Vol. 30, No. 6, pp. 975-980,
12월.
2020
10.13089/JKIISC.2020.30.6.975
주제어: Wirless sensor networks, Pairwise key pre-distribution, 2D, 3D, ns-3, Wirless sensor networks, Pairwise key pre-distribution, 2D, 3D, ns-3
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Wirless sensor networks, Pairwise key pre-distribution, 2D, 3D, ns-3, Wirless sensor networks, Pairwise key pre-distribution, 2D, 3D, ns-3
AI를 통한 BEC (Business Email Compromise) 공격의 효과적인 대응방안 연구
이도경,
장건수,
이경호,
Vol. 30, No. 5, pp. 835-846,
10월.
2020
10.13089/JKIISC.2020.30.5.835
주제어: Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning, Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning, Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning
사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구
최영한,
장인숙,
황인택,
김태균,
홍순좌,
박인성,
양진석,
권영재,
강정민,
Vol. 30, No. 5, pp. 805-821,
10월.
2020
10.13089/JKIISC.2020.30.5.805
주제어: Cyber defense exercise, Cyber Security Training, Cyber defense exercise, Cyber Security Training
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Cyber defense exercise, Cyber Security Training, Cyber defense exercise, Cyber Security Training
제3자의 행위에 의한 개인정보침해사고로 발생한 손해배상책임의 합리적 배분
유비용,
권헌영,
Vol. 30, No. 2, pp. 231-242,
4월.
2020
10.13089/JKIISC.2020.30.2.231
주제어: Personal Information Infringement, compensation for damages of personal infringement, claims for damages, distribution of liability for information infringement, Personal Information Infringement, compensation for damages of personal infringement, claims for damages, distribution of liability for information infringement
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Personal Information Infringement, compensation for damages of personal infringement, claims for damages, distribution of liability for information infringement, Personal Information Infringement, compensation for damages of personal infringement, claims for damages, distribution of liability for information infringement
악성메일 훈련 모델에 관한 연구
강영묵,
이상진,
Vol. 30, No. 2, pp. 197-212,
4월.
2020
10.13089/JKIISC.2020.30.2.197
주제어: Malicious Mail, Malware, Reversing, Training, Security Awareness, Malicious Mail, Malware, Reversing, Training, Security Awareness
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Malicious Mail, Malware, Reversing, Training, Security Awareness, Malicious Mail, Malware, Reversing, Training, Security Awareness