Digital Library
Search: "[ keyword: ECU ]" (602)
차세대 보안리더 양성프로그램의 성과평가 지표 개발
박성규,
김태성,
김진석,
유성재,
Vol. 28, No. 2, pp. 501-511,
4월.
2018
10.13089/JKIISC.2018.28.2.501
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
10.13089/JKIISC.2018.28.2.501
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구
문주연,
김태규,
김인성,
김휘강,
Vol. 28, No. 2, pp. 485-500,
4월.
2018
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
CTI 모델 활용 제어시스템 보안정보 수집 방안 연구
최종원,
김예솔,
민병길,
Vol. 28, No. 2, pp. 471-484,
4월.
2018
10.13089/JKIISC.2018.28.2.471
주제어: Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log, Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log
10.13089/JKIISC.2018.28.2.471
주제어: Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log, Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log
망혼용단말 탐지방법에 대한 연구 및 자동탐지시스템 구현
이미화,
윤지원,
Vol. 28, No. 2, pp. 457-469,
4월.
2018
10.13089/JKIISC.2018.28.2.457
주제어: detecting multi-homed host, clock skew, Network Security, detecting multi-homed host, clock skew, Network Security
10.13089/JKIISC.2018.28.2.457
주제어: detecting multi-homed host, clock skew, Network Security, detecting multi-homed host, clock skew, Network Security
VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석
강태운,
김휘강,
Vol. 28, No. 2, pp. 437-447,
4월.
2018
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
지능형 영상 감시 환경에서의 개인정보보호를 위한 COP-변환 기반 메타데이터 보안 기법 연구
이동혁,
박남제,
Vol. 28, No. 2, pp. 417-428,
4월.
2018
10.13089/JKIISC.2018.28.2.417
주제어: video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security, video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security
10.13089/JKIISC.2018.28.2.417
주제어: video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security, video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security
기계학습 기반 IDS 보안이벤트 분류 모델의 정확도 및 신속도 향상을 위한 실용적 feature 추출 연구
신익수,
송중석,
최장원,
권태웅,
Vol. 28, No. 2, pp. 385-395,
4월.
2018
10.13089/JKIISC.2018.28.2.385
주제어: Network Security, IDS, False Alarm, Machine Learning, SVM, Network Security, IDS, False Alarm, Machine Learning, SVM
10.13089/JKIISC.2018.28.2.385
주제어: Network Security, IDS, False Alarm, Machine Learning, SVM, Network Security, IDS, False Alarm, Machine Learning, SVM
RSA 문제와 동등한 안전성을 갖는 온라인/오프라인 서명 기법
최경용,
박종환,
Vol. 28, No. 2, pp. 327-338,
4월.
2018
10.13089/JKIISC.2018.28.2.327
주제어: On-line/off-line signature, RSA problem, tight security reduction, On-line/off-line signature, RSA problem, tight security reduction
10.13089/JKIISC.2018.28.2.327
주제어: On-line/off-line signature, RSA problem, tight security reduction, On-line/off-line signature, RSA problem, tight security reduction