Digital Library
Search: "[ keyword: EM ]" (592)
거래당사자간 합의에 기반하는 온라인 전자금융 2-WAY 거래인증 모델 제안
이익준,
오재섭,
염흥열,
Vol. 28, No. 6, pp. 1475-1487,
12월.
2018
10.13089/JKIISC.2018.28.6.1475
주제어: authentication, transaction authentication, voice phishing fraud, error remittance, authentication, transaction authentication, voice phishing fraud, error remittance
주제어: authentication, transaction authentication, voice phishing fraud, error remittance, authentication, transaction authentication, voice phishing fraud, error remittance
공개 취약점 정보를 활용한 소프트웨어 취약점 위험도 스코어링 시스템
김민철,
오세준,
강현재,
김진수,
김휘강,
Vol. 28, No. 6, pp. 1449-1461,
12월.
2018
10.13089/JKIISC.2018.28.6.1449
주제어: scoring system, risk based prioritization, CVE, CWE, CVSS, scoring system, risk based prioritization, CVE, CWE, CVSS
주제어: scoring system, risk based prioritization, CVE, CWE, CVSS, scoring system, risk based prioritization, CVE, CWE, CVSS
생체 정보와 다중 분류 모델을 이용한 암호학적 키 생성 방법
이현석,
김혜진,
양대헌,
이경희,
Vol. 28, No. 6, pp. 1427-1437,
12월.
2018
10.13089/JKIISC.2018.28.6.1427
주제어: biometrics, Cryptosystem, Key-binding scheme, Multiple classifiers, biometrics, Cryptosystem, Key-binding scheme, Multiple classifiers
주제어: biometrics, Cryptosystem, Key-binding scheme, Multiple classifiers, biometrics, Cryptosystem, Key-binding scheme, Multiple classifiers
보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구
이상규,
김인석,
Vol. 28, No. 6, pp. 1585-1594,
12월.
2018
10.13089/JKIISC.2018.28.6.1585
주제어: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
주제어: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
위협 모델링을 통한 스마트밴드 보안 요구사항 분석
강수인,
김혜민,
김휘강,
Vol. 28, No. 6, pp. 1355-1369,
12월.
2018
10.13089/JKIISC.2018.28.6.1355
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
분석적 방법을 적용한 원전디지털자산 취약점 평가 연구
김인경,
권국희,
Vol. 28, No. 6, pp. 1539-1552,
12월.
2018
10.13089/JKIISC.2018.28.6.1539
주제어: Nuclear digital assets, Control system cyber security, Vulnerability Assessment, Nuclear digital assets, Control system cyber security, Vulnerability Assessment
주제어: Nuclear digital assets, Control system cyber security, Vulnerability Assessment, Nuclear digital assets, Control system cyber security, Vulnerability Assessment
포털 전자메일 압수수색을 위한 메일헤더기반 디지털포렌식
이해진,
손태식,
Vol. 28, No. 5, pp. 1129-1140,
10월.
2018
10.13089/JKIISC.2018.28.5.1129
주제어: Digital Forensics, e-mail seizure search, infringement of privacy, Digital Forensics, e-mail seizure search, infringement of privacy
주제어: Digital Forensics, e-mail seizure search, infringement of privacy, Digital Forensics, e-mail seizure search, infringement of privacy
HyMES에 대한 결합 확률 분포 기반 단일 파형 분석
박병규,
김수리,
김희석,
홍석희,
Vol. 28, No. 5, pp. 1099-1112,
10월.
2018
10.13089/JKIISC.2018.28.5.1099
주제어: HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution, HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution
주제어: HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution, HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution
기호 형태의 값-집합 분석을 이용한 ARM 위치 독립적 코드의 정교한 역어셈블리 기법
하동수,
오희국,
Vol. 28, No. 5, pp. 1233-1246,
10월.
2018
10.13089/JKIISC.2018.28.5.1233
주제어: Disassembly, Disassembler, Value-set analysis (VSA), Position-independent code (PIC), ARM architecture, Disassembly, Disassembler, Value-set analysis (VSA), Position-independent code (PIC), ARM architecture
주제어: Disassembly, Disassembler, Value-set analysis (VSA), Position-independent code (PIC), ARM architecture, Disassembly, Disassembler, Value-set analysis (VSA), Position-independent code (PIC), ARM architecture
메모리 추가 신경망을 이용한 희소 악성코드 분류
강민철,
김휘강,
Vol. 28, No. 4, pp. 847-857,
8월.
2018
10.13089/JKIISC.2018.28.4.847
주제어: Malware classification, Visualization, Memory Augmented Neural Network, Malware classification, Visualization, Memory Augmented Neural Network
주제어: Malware classification, Visualization, Memory Augmented Neural Network, Malware classification, Visualization, Memory Augmented Neural Network