Digital Library
Search: "[ keyword: Performance ]" (22)
Machine Learning-Based Detection of Cache Side Channel Attack Using Performance Counter Monitor of CPU
황종배,
배대현,
하재철,
Vol. 30, No. 6, pp. 1237-1246,
Dec.
2020
10.13089/JKIISC.2020.30.6.1237
Keywords: Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP, Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP
10.13089/JKIISC.2020.30.6.1237
Keywords: Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP, Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP
A Study on the Improvement of Information Protection Policy to Prevent the Misuse of Personal Information : Based on the Results of the Monitoring Personal Information Misuse in Financial Companies
김영호,
김인석,
Vol. 29, No. 6, pp. 1437-1446,
Dec.
2019
10.13089/JKIISC.2019.29.6.1437
Keywords: Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies, Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies
10.13089/JKIISC.2019.29.6.1437
Keywords: Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies, Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies
Deriving Performance Evaluation Indicator of Program for Developing the Next Generation of Top Security Leaders
Sung-Kyu Park,
Tae-Sung Kim,
Jin-Seog Kim,
Seong-Jae Yu,
Vol. 28, No. 2, pp. 501-511,
Apr.
2018
10.13089/JKIISC.2018.28.2.501
Keywords: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
10.13089/JKIISC.2018.28.2.501
Keywords: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
A Case Study on Program Outcomes Assessment of Information Security Program for Engineering Education Accreditation
Weonil Chung,
Soo-Hyun Oh,
Hwankoo Kim,
Vol. 26, No. 3, pp. 777-786,
Jun.
2016
10.13089/JKIISC.2016.26.3.777
Keywords: Engineering Education, Program outcomes, Performance criteria, Rubric, Assessment tool
10.13089/JKIISC.2016.26.3.777
Keywords: Engineering Education, Program outcomes, Performance criteria, Rubric, Assessment tool
Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident
Jae-Ha Eom,
Min-Jeong Kim,
Vol. 26, No. 2, pp. 463-474,
Apr.
2016
10.13089/JKIISC.2016.26.2.463
Keywords: Personal information leakage, Stock Return, Valuation, Investors trading behavior and Performance
10.13089/JKIISC.2016.26.2.463
Keywords: Personal information leakage, Stock Return, Valuation, Investors trading behavior and Performance
An empirical study on the performance factors of the BSC perspectives on government support regional innovation clusters in the management consulting
Soon-mo Park,
Vol. 25, No. 6, pp. 1583-1594,
Dec.
2015
10.13089/JKIISC.2015.25.6.1583
Keywords: regional innovation clusters, consulting satisfaction, government support management consulting, BSC performance factors
10.13089/JKIISC.2015.25.6.1583
Keywords: regional innovation clusters, consulting satisfaction, government support management consulting, BSC performance factors
A Study on SQL Performance-Based IT Application Change Management Process to Prevent Failures of Online Transactions
Jeong-Hwan Kim,
Moo-Seong Ko,
Kyung-Ho Lee,
Vol. 24, No. 5, pp. 817-838,
Oct.
2014
10.13089/JKIISC.2014.24.5.817
Keywords: SQL Access Path, SQL Performance-based IT Application Change Management Process, Test and Production Environments, SQL Performance Tuning, Reputational Risk
10.13089/JKIISC.2014.24.5.817
Keywords: SQL Access Path, SQL Performance-based IT Application Change Management Process, Test and Production Environments, SQL Performance Tuning, Reputational Risk
A case study on the performance of encrypted data
Jung Hwa Hong,
Ik Rae Jeong,
Vol. 22, No. 6, pp. 1301-1314,
Dec.
2012
10.13089/JKIISC.2012.22.6.1301
Keywords: performance of encrypted data
10.13089/JKIISC.2012.22.6.1301
Keywords: performance of encrypted data