Digital Library
Search: "[ keyword: Defense ]" (12)
AI 기반 국방정보시스템 개발 생명주기 단계별 보안 활동 수행 방안
박규도,
이영란,
Vol. 33, No. 3, pp. 577-589,
6월.
2023
10.13089/JKIISC.2023.33.3.577
주제어: Artificial intelligence, AI Security, Defense Information System, Defense Acquisition, SDLC
10.13089/JKIISC.2023.33.3.577
주제어: Artificial intelligence, AI Security, Defense Information System, Defense Acquisition, SDLC
적대적 공격을 방어하기 위한 StarGAN 기반의 탐지 및 정화 연구
박성준,
최대선,
류권상,
Vol. 33, No. 3, pp. 449-458,
6월.
2023
10.13089/JKIISC.2023.33.3.449
주제어: Adversarial example, generative adversarial networks, Adversarial Defense, Purification network
10.13089/JKIISC.2023.33.3.449
주제어: Adversarial example, generative adversarial networks, Adversarial Defense, Purification network
iRF: 대규모 사이버 방어 훈련을 위한 통합 레드팀 프레임워크
장인숙,
조은선,
Vol. 31, No. 5, pp. 1045-1054,
10월.
2021
10.13089/JKIISC.2021.31.5.1045
주제어: Cyber defense exercise, Red Team Framework, Cybersecurity Training
10.13089/JKIISC.2021.31.5.1045
주제어: Cyber defense exercise, Red Team Framework, Cybersecurity Training
방산기술보호를 위한 방산기술 마스터 데이터 관리 체계구현 방안
박흥순,
김세용,
권혁진,
Vol. 31, No. 1, pp. 111-122,
2월.
2021
10.13089/JKIISC.2021.31.1.111
주제어: National Defense, Defense Industry, Defense Technology Security, Master Data Management(MDM), National Defense, Defense Industry, Defense Technology Security, Master Data Management(MDM)
10.13089/JKIISC.2021.31.1.111
주제어: National Defense, Defense Industry, Defense Technology Security, Master Data Management(MDM), National Defense, Defense Industry, Defense Technology Security, Master Data Management(MDM)
적대적 공격에 견고한 Perceptual Ad-Blocker 기법
김민재,
김보민,
허준범,
Vol. 30, No. 5, pp. 871-879,
10월.
2020
10.13089/JKIISC.2020.30.5.871
주제어: Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet, Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet
10.13089/JKIISC.2020.30.5.871
주제어: Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet, Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet
사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구
최영한,
장인숙,
황인택,
김태균,
홍순좌,
박인성,
양진석,
권영재,
강정민,
Vol. 30, No. 5, pp. 805-821,
10월.
2020
10.13089/JKIISC.2020.30.5.805
주제어: Cyber defense exercise, Cyber Security Training, Cyber defense exercise, Cyber Security Training
10.13089/JKIISC.2020.30.5.805
주제어: Cyber defense exercise, Cyber Security Training, Cyber defense exercise, Cyber Security Training
국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구
최재혁,
김완주,
임재성,
Vol. 29, No. 5, pp. 1153-1165,
10월.
2019
10.13089/JKIISC.2019.29.5.1153
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
10.13089/JKIISC.2019.29.5.1153
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
한국군 환경에 적합한 내부자(위협) 정의 및 완화방안 제안
원경수,
김승주,
Vol. 29, No. 5, pp. 1133-1151,
10월.
2019
10.13089/JKIISC.2019.29.5.1133
주제어: Insider, Insider threat, Mitigation, defense IT, military IT, Insider, Insider threat, Mitigation, defense IT, military IT
10.13089/JKIISC.2019.29.5.1133
주제어: Insider, Insider threat, Mitigation, defense IT, military IT, Insider, Insider threat, Mitigation, defense IT, military IT
동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구
문주연,
김태규,
김인성,
김휘강,
Vol. 28, No. 2, pp. 485-500,
4월.
2018
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security