Digital Library
Search: "[ keyword: RF ]" (93)
Anti-Virus 성능 시험을 위한 평가 기준 수립 연구
이정호,
신강식,
정동재,
조호묵,
유영락,
Vol. 33, No. 5, pp. 847-859,
10월.
2023
10.13089/JKIISC.2023.33.5.847
주제어: Anti-Virus, Malware, Performance Evaluation
주제어: Anti-Virus, Malware, Performance Evaluation
Rust와 C/C++간 안전한 상호작용에 관한 연구의 맹점과 개선 모델 연구
노태현,
이호준,
Vol. 33, No. 2, pp. 345-351,
4월.
2023
10.13089/JKIISC.2023.33.2.345
주제어: Rust, C/C++, Foreign Function Interface, Software Security, Memory Safety
주제어: Rust, C/C++, Foreign Function Interface, Software Security, Memory Safety
IoT 환경에서의 네트워크 보안 프로토콜 성능 분석
강동희,
임재덕,
Vol. 32, No. 5, pp. 955-963,
10월.
2022
10.13089/JKIISC.2022.32.5.955
주제어: IoT security, TLS 1.2, TLS 1.3, Performance Analysis, system overhead estimation
주제어: IoT security, TLS 1.2, TLS 1.3, Performance Analysis, system overhead estimation
Performance Counter Monitor를 이용한 머신 러닝 기반 캐시 부채널 공격 탐지
황종배,
배대현,
하재철,
Vol. 30, No. 6, pp. 1237-1246,
12월.
2020
10.13089/JKIISC.2020.30.6.1237
주제어: Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP, Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP
주제어: Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP, Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP
방화벽 접근정책의 계층적 가시화 방법에 대한 연구
김태용,
권태웅,
이준,
이윤수,
송중석,
Vol. 30, No. 6, pp. 1087-1101,
12월.
2020
10.13089/JKIISC.2020.30.6.1087
주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly
주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly
개인정보 오남용 예방을 위한 정보보호정책 개선에 관한연구 : 금융회사의 개인정보 오남용 모니터링 결과 중심으로
김영호,
김인석,
Vol. 29, No. 6, pp. 1437-1446,
12월.
2019
10.13089/JKIISC.2019.29.6.1437
주제어: Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies, Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies
주제어: Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies, Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies
국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구
최재혁,
김완주,
임재성,
Vol. 29, No. 5, pp. 1153-1165,
10월.
2019
10.13089/JKIISC.2019.29.5.1153
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
사회공학 사이버작전 개념정립 연구
신규용,
강정호,
유진철,
김지원,
강성록,
임현명,
김용주,
Vol. 28, No. 3, pp. 707-716,
6월.
2018
10.13089/JKIISC.2018.28.3.707
주제어: Social Engineering, Cyber Operations, cyber warfare, Social Engineering, Cyber Operations, cyber warfare
주제어: Social Engineering, Cyber Operations, cyber warfare, Social Engineering, Cyber Operations, cyber warfare
차세대 보안리더 양성프로그램의 성과평가 지표 개발
박성규,
김태성,
김진석,
유성재,
Vol. 28, No. 2, pp. 501-511,
4월.
2018
10.13089/JKIISC.2018.28.2.501
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP