Digital Library
Search: "[ keyword: EM ]" (592)
국내외 IT제품 도입제도 동향 분석 및 국내 제도 개선방안 도출
손효현,
김광준,
이만희,
Vol. 29, No. 4, pp. 897-906,
8월.
2019
10.13089/JKIISC.2019.29.4.897
주제어: Introduction Policy, Security Conformance, Common Criteria, Cryptographic Module Validation Program, Common Criteria Recognition Arrangement
주제어: Introduction Policy, Security Conformance, Common Criteria, Cryptographic Module Validation Program, Common Criteria Recognition Arrangement
고신뢰 드론 시스템을 위한 스케줄링 측면에서의 서비스 거부 공격 완화 방안 연구
곽지원,
강수영,
김승주,
Vol. 29, No. 4, pp. 821-834,
8월.
2019
10.13089/JKIISC.2019.29.4.821
주제어: High-Assurance, Formal specification, Verification, denial of service, drone system
주제어: High-Assurance, Formal specification, Verification, denial of service, drone system
전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜
이종관,
Vol. 29, No. 4, pp. 729-738,
8월.
2019
10.13089/JKIISC.2019.29.4.729
주제어: Authentication Protocol, Unmanned Systems, Hash Collision, Tactical Network
주제어: Authentication Protocol, Unmanned Systems, Hash Collision, Tactical Network
애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법
조준완,
이지은,
김광조,
Vol. 29, No. 4, pp. 719-728,
8월.
2019
10.13089/JKIISC.2019.29.4.719
주제어: Shared bike, Dockless bike sharing system, Analyzing application log, Reverse engineering
주제어: Shared bike, Dockless bike sharing system, Analyzing application log, Reverse engineering
악성코드 패밀리 분류를 위한 API 특징 기반 앙상블 모델 학습
이현종,
어성율,
황두성,
Vol. 29, No. 3, pp. 531-539,
6월.
2019
10.13089/JKIISC.2019.29.3.531
주제어: Malware detection, Malware classification, Feature selection, Tree-based Ensemble, Malware detection, Malware classification, Feature selection, Tree-based Ensemble
주제어: Malware detection, Malware classification, Feature selection, Tree-based Ensemble, Malware detection, Malware classification, Feature selection, Tree-based Ensemble
224비트 소수체에서 효율적인 모듈러 곱셈
장남수,
Vol. 29, No. 3, pp. 515-518,
6월.
2019
10.13089/JKIISC.2019.29.3.515
주제어: Elliptic Curve Cryptosystem, Modular multiplication, finite field arithmetic, Elliptic Curve Cryptosystem, Modular multiplication, finite field arithmetic
주제어: Elliptic Curve Cryptosystem, Modular multiplication, finite field arithmetic, Elliptic Curve Cryptosystem, Modular multiplication, finite field arithmetic
NIST 소수 P-256에서 효율적인 모듈러 감산 방법
장남수,
Vol. 29, No. 3, pp. 511-514,
6월.
2019
10.13089/JKIISC.2019.29.3.511
주제어: Elliptic Curve Cryptosystem, Fast reduction, finite field arithmetic, Elliptic Curve Cryptosystem, Fast reduction, finite field arithmetic
주제어: Elliptic Curve Cryptosystem, Fast reduction, finite field arithmetic, Elliptic Curve Cryptosystem, Fast reduction, finite field arithmetic
라운드 키 선행 로드를 통한 CHAM-64/128 카운터 모드 고속 구현
권혁동,
장경배,
박재훈,
서화정,
Vol. 30, No. 6, pp. 1217-1223,
12월.
2020
10.13089/JKIISC.2020.30.6.1217
주제어: 8-bit AVR Processors, CHAM block cipher, Optimized implementation, 8-bit AVR Processors, CHAM block cipher, Optimized implementation
주제어: 8-bit AVR Processors, CHAM block cipher, Optimized implementation, 8-bit AVR Processors, CHAM block cipher, Optimized implementation
ICT 공급망 보안기준 및 프레임워크 비교 분석
민성현,
손경호,
Vol. 30, No. 6, pp. 1189-1206,
12월.
2020
10.13089/JKIISC.2020.30.6.1189
주제어: Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management, Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management
주제어: Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management, Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management
산업제어망 보안 컴플라이언스를 위한 패치 영향성 평가 방안에 관한 실증 연구
최인지,
김승주,
Vol. 30, No. 6, pp. 1141-1149,
12월.
2020
10.13089/JKIISC.2020.30.6.1141
주제어: Security Compliance, Industrial Control System, Patch Impact Assessment, Patch Deployment, Security Compliance, Industrial Control System, Patch Impact Assessment, Patch Deployment
주제어: Security Compliance, Industrial Control System, Patch Impact Assessment, Patch Deployment, Security Compliance, Industrial Control System, Patch Impact Assessment, Patch Deployment