Digital Library
Search: "[ keyword: EM ]" (592)
최신 버전의 Themida가 보이는 정규화가 어려운 API 난독화 분석방안 연구
이재휘,
이병희,
조상현,
Vol. 29, No. 6, pp. 1375-1382,
12월.
2019
10.13089/JKIISC.2019.29.6.1375
주제어: Themida, API wrapping, Unpacking, Themida, API wrapping, Unpacking
주제어: Themida, API wrapping, Unpacking, Themida, API wrapping, Unpacking
함수암호를 이용한 인증정보 Template 보호 기술
박동희,
박영호,
Vol. 29, No. 6, pp. 1319-1326,
12월.
2019
10.13089/JKIISC.2019.29.6.1319
주제어: Function encryption, Biometric Authentication, Authentication template protection, Function encryption, Biometric Authentication, Authentication template protection
주제어: Function encryption, Biometric Authentication, Authentication template protection, Function encryption, Biometric Authentication, Authentication template protection
금융 클라우드의 데이터 국지화에 대한 비판적 고찰
장우경,
김인석,
Vol. 29, No. 5, pp. 1191-1204,
10월.
2019
10.13089/JKIISC.2019.29.5.1191
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
위험 평가 모델 기반의 정량적 사이버 보안 평가 체계
김인경,
박남제,
Vol. 29, No. 5, pp. 1179-1189,
10월.
2019
10.13089/JKIISC.2019.29.5.1179
주제어: Risk Assessment, Cyber security Scoring System, Quantitative Risk Model, Risk Assessment, Cyber security Scoring System, Quantitative Risk Model
주제어: Risk Assessment, Cyber security Scoring System, Quantitative Risk Model, Risk Assessment, Cyber security Scoring System, Quantitative Risk Model
취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구
현석우,
권태경,
Vol. 29, No. 5, pp. 1167-1177,
10월.
2019
10.13089/JKIISC.2019.29.5.1167
주제어: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
주제어: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구
최재혁,
김완주,
임재성,
Vol. 29, No. 5, pp. 1153-1165,
10월.
2019
10.13089/JKIISC.2019.29.5.1153
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
미국 공급망 보안 관리 체계 분석
손효현,
김광준,
이만희,
Vol. 29, No. 5, pp. 1089-1097,
10월.
2019
10.13089/JKIISC.2019.29.5.1089
주제어: Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM, Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM
주제어: Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM, Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM
사이버 공격에 의한 시스템 이상상태 탐지 기법
윤여정,
정유진,
Vol. 29, No. 5, pp. 1027-1037,
10월.
2019
10.13089/JKIISC.2019.29.5.1027
주제어: Cyber Attack, Unknown Attack, Word Embedding, Novelty Detection, Anomaly Detection, Cyber Attack, Unknown Attack, Word Embedding, Novelty Detection, Anomaly Detection
주제어: Cyber Attack, Unknown Attack, Word Embedding, Novelty Detection, Anomaly Detection, Cyber Attack, Unknown Attack, Word Embedding, Novelty Detection, Anomaly Detection
TPM을 활용한 임베디드 시스템 환경의 보안 부팅 구현
김진우,
이상길,
고재용,
이철훈,
Vol. 29, No. 5, pp. 949-960,
10월.
2019
10.13089/JKIISC.2019.29.5.949
주제어: Secure boot, Embedded System, TPM, integrity, Secure boot, Embedded System, TPM, integrity
주제어: Secure boot, Embedded System, TPM, integrity, Secure boot, Embedded System, TPM, integrity
오픈소스 기반 분산원장기술 시스템을 위한 보안 강화 방안
박근덕,
김대경,
염흥열,
Vol. 29, No. 4, pp. 919-943,
8월.
2019
10.13089/JKIISC.2019.29.4.919
주제어: Security, Blockchain, distributed ledger technology (DLT) system, Open Source, blockchain platform, Common Criteria, Security Function, Security, Blockchain, distributed ledger technology (DLT) system, Open Source, blockchain platform, Common Criteria, Security Function
주제어: Security, Blockchain, distributed ledger technology (DLT) system, Open Source, blockchain platform, Common Criteria, Security Function, Security, Blockchain, distributed ledger technology (DLT) system, Open Source, blockchain platform, Common Criteria, Security Function