Digital Library
Search: "[ keyword: Collection ]" (7)
Automatic Patch Information Collection System Using Web Crawler
김용건,
나사랑,
김환국,
원유재,
Vol. 28, No. 6, pp. 1393-1399,
Nov.
2018
10.13089/JKIISC.2018.28.6.1393
Keywords: Web Crawler, Patch Information, Collection, regular expression, Web Crawler, Patch Information, Collection, regular expression
10.13089/JKIISC.2018.28.6.1393
Keywords: Web Crawler, Patch Information, Collection, regular expression, Web Crawler, Patch Information, Collection, regular expression
Comparing Recoverability of Deleted Data According to Original Source Collection Methods on Microsoft SQL Server
신지호,
Vol. 28, No. 4, pp. 859-868,
Jul.
2018
10.13089/JKIISC.2018.28.4.859
Keywords: database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page, database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page
10.13089/JKIISC.2018.28.4.859
Keywords: database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page, database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page
A Study on Digital Evidence Collection System in Cyberspace
정효정,
최종현,
이상진,
Vol. 28, No. 4, pp. 869-878,
Jul.
2018
10.13089/JKIISC.2018.28.4.869
Keywords: Digital Forensics, Digital Evidence, Data Collection, Digital Forensics, Digital Evidence, Data Collection
10.13089/JKIISC.2018.28.4.869
Keywords: Digital Forensics, Digital Evidence, Data Collection, Digital Forensics, Digital Evidence, Data Collection
A Study on ICS Security Information Collection Method Using CTI Model
Jongwon Choi,
Yesol Kim,
Byung-gil Min,
Vol. 28, No. 2, pp. 471-484,
Apr.
2018
10.13089/JKIISC.2018.28.2.471
Keywords: Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log, Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log
10.13089/JKIISC.2018.28.2.471
Keywords: Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log, Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log
A Study on Decision Making Model for Personal Information Collection and Use Policy Establishment through Internet Homepage of Financial Companies
Seong-hoon Kim,
Kyeong-ho Lee,
Vol. 27, No. 3, pp. 637-652,
Jun.
2017
10.13089/JKIISC.2017.27.3.637
Keywords: Personal Information Collection Policy, AHP, Decision Making
10.13089/JKIISC.2017.27.3.637
Keywords: Personal Information Collection Policy, AHP, Decision Making
A Study on the Design and Implementation of an Digital Evidence Collection Application on Windows based computer
SeungWon Lee,
YoungSup Roh,
Changwoo Han,
Vol. 23, No. 1, pp. 57-68,
Feb.
2013
10.13089/JKIISC.2013.23.1.57
Keywords: Digital Forensics, Digital Evidence, Evidence Collection, collection software
10.13089/JKIISC.2013.23.1.57
Keywords: Digital Forensics, Digital Evidence, Evidence Collection, collection software
An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence
Choi Yoon-Ho,
Park Jong-Ho,
Kim Sang-Kon,
Kang Yu,
Choe Jin-Gi,
Moon Ho-Gun,
Rhee Myung-Su,
Seo Seung-Woo,
Vol. 16, No. 4, pp. 69-82,
Aug.
2006
10.13089/JKIISC.2006.16.4.69
Keywords: Computer Forensics, Infringement Severity, Evidence Collection
10.13089/JKIISC.2006.16.4.69
Keywords: Computer Forensics, Infringement Severity, Evidence Collection