Digital Library
Search: "[ keyword: CA ]" (792)
의료산업에서의 랜섬웨어 대응 방법
전인석,
김동원,
한근희,
Vol. 28, No. 1, pp. 155-165,
2월.
2018
10.13089/JKIISC.2018.28.155
주제어: healthcare industry, Ransomware, Malware, Telemedicine, Medical Services, healthcare industry, Ransomware, Malware, Telemedicine, Medical Services
주제어: healthcare industry, Ransomware, Malware, Telemedicine, Medical Services, healthcare industry, Ransomware, Malware, Telemedicine, Medical Services
CAN 트레이스 분석을 통한 데이터 필드 형식 추론 방법 연구
지청민,
김지민,
홍만표,
Vol. 28, No. 1, pp. 167-177,
2월.
2018
10.13089/JKIISC.2018.28.1.167
주제어: Vehicle Security, CAN, protocol reverse engineering, Vehicle Security, CAN, protocol reverse engineering
주제어: Vehicle Security, CAN, protocol reverse engineering, Vehicle Security, CAN, protocol reverse engineering
산업제어시스템 취약성 분석을 위한 무작위성 기반 퍼징 테스트 케이스 평가 기법
김성진,
손태식,
Vol. 28, No. 1, pp. 179-186,
2월.
2018
10.13089/JKIISC.2018.28.1.179
주제어: vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System, vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System
주제어: vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System, vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System
개인정보유출 피해 비용 산출 모델에 관한 연구
임규건,
류미나,
이정미,
Vol. 28, No. 1, pp. 215-227,
2월.
2018
10.13089/JKIISC.2018.28.1.215
주제어: Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model, Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model
주제어: Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model, Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model
효율적인 Quadratic Projection 기반 홍채 인식: Dual QML을 적용한 홍채 인식의 성능 개선 방안
권태연,
노건태,
정익래,
Vol. 28, No. 1, pp. 85-93,
2월.
2018
10.13089/JKIISC.2018.28.1.85
주제어: Dual QML, Iris Recognition, Non-linear Classification, Dual QML, Iris Recognition, Non-linear Classification
주제어: Dual QML, Iris Recognition, Non-linear Classification, Dual QML, Iris Recognition, Non-linear Classification
안드로이드 환경에서 개인정보 처리방침의 투명성 확보방안에 관한 연구: GDPR을 기반으로
백인주,
오준형,
이경호,
Vol. 29, No. 6, pp. 1477-1489,
12월.
2019
10.13089/JKIISC.2019.29.6.1477
주제어: Privacy Policy, transparency, Security, GDPR, Android Application, Privacy Policy, transparency, Security, GDPR, Android Application
주제어: Privacy Policy, transparency, Security, GDPR, Android Application, Privacy Policy, transparency, Security, GDPR, Android Application
금융 클라우드의 데이터 국지화에 대한 비판적 고찰
장우경,
김인석,
Vol. 29, No. 5, pp. 1191-1204,
10월.
2019
10.13089/JKIISC.2019.29.5.1191
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
산업용 제어기기의 통신 견고성 시험 방안 연구
박경미,
신동훈,
김우년,
김신규,
Vol. 29, No. 5, pp. 1099-1116,
10월.
2019
10.13089/JKIISC.2019.29.5.1099
주제어: ICS, Communication robustness testing, Industrial control devices, EDSA, Achilles, Network robustness test, Fuzzing Test, Stress test, ICS, Communication robustness testing, Industrial control devices, EDSA, Achilles, Network robustness test, Fuzzing Test, Stress test
주제어: ICS, Communication robustness testing, Industrial control devices, EDSA, Achilles, Network robustness test, Fuzzing Test, Stress test, ICS, Communication robustness testing, Industrial control devices, EDSA, Achilles, Network robustness test, Fuzzing Test, Stress test
미국 공급망 보안 관리 체계 분석
손효현,
김광준,
이만희,
Vol. 29, No. 5, pp. 1089-1097,
10월.
2019
10.13089/JKIISC.2019.29.5.1089
주제어: Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM, Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM
주제어: Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM, Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM
FIDO2 CTAP을 활용한 전자서명 방법
조한구,
이경호,
Vol. 29, No. 5, pp. 1049-1062,
10월.
2019
10.13089/JKIISC.2019.29.5.1049
주제어: FIDO2, CTAP, WebAuthn, certificate, ActiveX, Plug-in, FIDO2, CTAP, WebAuthn, certificate, ActiveX, Plug-in
주제어: FIDO2, CTAP, WebAuthn, certificate, ActiveX, Plug-in, FIDO2, CTAP, WebAuthn, certificate, ActiveX, Plug-in