Digital Library
Search: "[ keyword: IT ]" (1122)
위협 모델링 분석 및 국제공통평가기준을 통한 스마트홈 허브의 보안요구사항에 관한 연구
박재현,
강수영,
김승주,
Vol. 28, No. 2, pp. 513-528,
4월.
2018
10.13089/JKIISC.2018.28.2.513
주제어: Smart Home, Privacy, Threat modeling, LINDDUN, criteria, Smart Home, Privacy, Threat modeling, LINDDUN, criteria
10.13089/JKIISC.2018.28.2.513
주제어: Smart Home, Privacy, Threat modeling, LINDDUN, criteria, Smart Home, Privacy, Threat modeling, LINDDUN, criteria
차세대 보안리더 양성프로그램의 성과평가 지표 개발
박성규,
김태성,
김진석,
유성재,
Vol. 28, No. 2, pp. 501-511,
4월.
2018
10.13089/JKIISC.2018.28.2.501
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
10.13089/JKIISC.2018.28.2.501
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구
문주연,
김태규,
김인성,
김휘강,
Vol. 28, No. 2, pp. 485-500,
4월.
2018
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
CTI 모델 활용 제어시스템 보안정보 수집 방안 연구
최종원,
김예솔,
민병길,
Vol. 28, No. 2, pp. 471-484,
4월.
2018
10.13089/JKIISC.2018.28.2.471
주제어: Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log, Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log
10.13089/JKIISC.2018.28.2.471
주제어: Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log, Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log
망혼용단말 탐지방법에 대한 연구 및 자동탐지시스템 구현
이미화,
윤지원,
Vol. 28, No. 2, pp. 457-469,
4월.
2018
10.13089/JKIISC.2018.28.2.457
주제어: detecting multi-homed host, clock skew, Network Security, detecting multi-homed host, clock skew, Network Security
10.13089/JKIISC.2018.28.2.457
주제어: detecting multi-homed host, clock skew, Network Security, detecting multi-homed host, clock skew, Network Security
VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석
강태운,
김휘강,
Vol. 28, No. 2, pp. 437-447,
4월.
2018
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지
전우진,
홍도원,
박기웅,
Vol. 28, No. 2, pp. 429-436,
4월.
2018
10.13089/JKIISC.2018.28.2.429
주제어: Cloud computing, Disk Monitoring, File System, Cloud computing, Disk Monitoring, File System
10.13089/JKIISC.2018.28.2.429
주제어: Cloud computing, Disk Monitoring, File System, Cloud computing, Disk Monitoring, File System
지능형 영상 감시 환경에서의 개인정보보호를 위한 COP-변환 기반 메타데이터 보안 기법 연구
이동혁,
박남제,
Vol. 28, No. 2, pp. 417-428,
4월.
2018
10.13089/JKIISC.2018.28.2.417
주제어: video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security, video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security
10.13089/JKIISC.2018.28.2.417
주제어: video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security, video surveillance, Privacy Protection, COP-Transformation, CCTV Video Security
디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석
서승희,
김 역,
이창훈,
Vol. 28, No. 2, pp. 407-416,
4월.
2018
10.13089/JKIISC.2018.28.2.407
주제어: digital forensic, Instagram, SNS, Android, Android reverse engineering, digital forensic, Instagram, SNS, Android, Android reverse engineering
10.13089/JKIISC.2018.28.2.407
주제어: digital forensic, Instagram, SNS, Android, Android reverse engineering, digital forensic, Instagram, SNS, Android, Android reverse engineering
macOS 운영체제에서 화이트리스트 구축을 위한 신뢰 프로세스 수집 연구
윤정무,
류재철,
Vol. 28, No. 2, pp. 397-405,
4월.
2018
10.13089/JKIISC.2018.28.2.397
주제어: Whitelist, Detection, Ransomware, Whitelist, Detection, Ransomware
10.13089/JKIISC.2018.28.2.397
주제어: Whitelist, Detection, Ransomware, Whitelist, Detection, Ransomware