Digital Library
Search: "[ keyword: Modeling ]" (28)
위협 모델링을 이용한 선박 사이버보안 요구사항 연구
조용현,
차영균,
Vol. 29, No. 3, pp. 657-673,
5월.
2019
10.13089/JKIISC.2019.29.3.657
주제어: Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis, Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis, Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis
위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석
강수영,
김승주,
Vol. 29, No. 3, pp. 613-628,
5월.
2019
10.13089/JKIISC.2019.29.3.613
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구
김근혜,
박규동,
심미나,
Vol. 29, No. 2, pp. 451-463,
3월.
2019
10.13089/JKIISC.2019.29.2.451
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
X-box를 이용한 Session-oriented Cross play에 대한 보안 요구사항 분석
김동우,
강수영,
김승주,
Vol. 29, No. 1, pp. 235-255,
1월.
2019
10.13089/JKIISC.2019.29.1.235
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
위협 모델링을 통한 스마트밴드 보안 요구사항 분석
강수인,
김혜민,
김휘강,
Vol. 28, No. 6, pp. 1355-1369,
11월.
2018
10.13089/JKIISC.2018.28.6.1355
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
AI 스피커의 보안성 평가 및 대응방안 연구
이지섭,
강수영,
김승주,
Vol. 28, No. 6, pp. 1523-1537,
11월.
2018
10.13089/JKIISC.2018.28.6.1523
주제어: AI Speaker, Threat modeling, STRIDE, LINDDUN, AI Speaker, Threat modeling, STRIDE, LINDDUN
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: AI Speaker, Threat modeling, STRIDE, LINDDUN, AI Speaker, Threat modeling, STRIDE, LINDDUN
위협 모델링 분석 및 국제공통평가기준을 통한 스마트홈 허브의 보안요구사항에 관한 연구
박재현,
강수영,
김승주,
Vol. 28, No. 2, pp. 513-528,
4월.
2018
10.13089/JKIISC.2018.28.2.513
주제어: Smart Home, Privacy, Threat modeling, LINDDUN, criteria, Smart Home, Privacy, Threat modeling, LINDDUN, criteria
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Smart Home, Privacy, Threat modeling, LINDDUN, criteria, Smart Home, Privacy, Threat modeling, LINDDUN, criteria
VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석
강태운,
김휘강,
Vol. 28, No. 2, pp. 437-447,
4월.
2018
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
AHP를 활용한 IP-CCTV 위험 결정 모델(클라우드 컴퓨팅 기반으로)
정성후,
이경호,
Vol. 28, No. 1, pp. 229-239,
2월.
2018
10.13089/JKIISC.2018.28.1.229
주제어: IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP), IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP), IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP)
Threat Modeling을 이용한 PS4와 PC간의 Remote Play 상황 속 위험 분석
김혜민,
김휘강,
Vol. 28, No. 1, pp. 135-143,
2월.
2018
10.13089/JKIISC.2018.28.1.135
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling