Digital Library


Search: "[ keyword: PC ]" (19)
    A Study on the Human Vulnerability Classification System for People-Centric Security
    , , Vol. 33, No. 3, pp. 561-575, Jun. 2023
    10.13089/JKIISC.2023.33.3.561

    A Study on Authentication Process in Smartphone Electronic Financial Services
    김한우, 이근영, 임종인, 권헌영, Vol. 28, No. 3, pp. 579-590, May. 2018
    10.13089/JKIISC.2018.28.3.579
    Keywords: authentication, appcard, identity proofing, electronic financial services, authentication, appcard, identity proofing, electronic financial services

    Efficient Outsourced Multiparty Computations Based on Partially Homomorphic Encryption
    Hasoo Eun, Ubaidullah Ubaidullah, Heekuck Oh, Vol. 27, No. 3, pp. 477-488, Jun. 2017
    10.13089/JKIISC.2017.27.3.477
    Keywords: Multiparty Computations, Outsourced MPCs, Proxy Re-Encryptions, Delegating Computations

    Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network
    Jae-Yoon Shim, June-Kyoung Lee, Vol. 26, No. 5, pp. 1305-1312, Oct. 2016
    10.13089/JKIISC.2016.26.5.1305
    Keywords: Smart Factory, DPI(Deep Packet Inspection), OPC-UA, Protocol Gateway, Convergence Security

    Threatening privacy by identifying appliances and the pattern of the usage from electric signal data
    Jae yeon Cho, Ji Won Yoon, Vol. 25, No. 5, pp. 1001-1010, Oct. 2015
    10.13089/JKIISC.2015.25.5.1001
    Keywords: Smart Meter, Privacy, PCA, k-NN Classifier, 10-fold Cross Validation

    Study on Disaster Recovery Efficiency of Terminal PC in Financial Company
    Seung-Chul Yi, Joon-Seob Yoon, Kyung-Ho Lee, Vol. 25, No. 1, pp. 211-224, Feb. 2015
    10.13089/JKIISC.2015.25.1.211
    Keywords: Terminal, PC, desktop, disaster, Recovery, Cyber Attack, malcode, APT, BCP, DRP

    Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)
    Hyun Tak Chae, Sang-Jin Lee, Vol. 24, No. 5, pp. 961-968, Oct. 2014
    10.13089/JKIISC.2014.24.5.961
    Keywords: Personal Information, PC security solution, log analysis

    The Analysis of Face Recognition Rate according to Distance and Interpolation using PCA in Surveillance System
    Hae-Min Moon, Keun-Chang Kwak, Sung-Bum Pan, Vol. 21, No. 6, pp. 153-160, Dec. 2011
    10.13089/JKIISC.2011.21.6.153
    Keywords: PCA, interpolation, Face Recongnition

    Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis
    Jung-Woo Ha, Huy-Kang Kim, Jong-In Lim, Vol. 21, No. 4, pp. 61-76, Aug. 2011
    10.13089/JKIISC.2011.21.4.61
    Keywords: Zomebie PC, Worm, Virus

    Study for Tracing Zombie PCS and Botnet Using an Email Spam Trap
    Hyun-Cheol Jeong, Huy-Kang Kim, Sang-Jin Lee, Joo-Hyung Oh, Vol. 21, No. 3, pp. 101-116, Jun. 2011
    10.13089/JKIISC.2011.21.3.101
    Keywords: Botnet, Zombie PC, Spam botnet