Digital Library
Search: "[ keyword: Structure ]" (27)
An Study on the Analysis of Design Criteria for S-Box Based on Deep Learning
Dong-hoon Kim,
Seonggyeom Kim,
Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Vol. 30, No. 3, pp. 337-347,
Jun.
2020
10.13089/JKIISC.2020.30.3.337
Keywords: cryptanalysis, deep-learning, Symmetric key, S-box structure
10.13089/JKIISC.2020.30.3.337
Keywords: cryptanalysis, deep-learning, Symmetric key, S-box structure
On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up
배춘석,
고승철,
Vol. 29, No. 2, pp. 439-449,
Mar.
2019
10.13089/JKIISC.2019.29.2.439
Keywords: Threat Breakdown Structure, Data Center Security, Physical Security, Threat Breakdown Structure, Data Center Security, Physical Security
10.13089/JKIISC.2019.29.2.439
Keywords: Threat Breakdown Structure, Data Center Security, Physical Security, Threat Breakdown Structure, Data Center Security, Physical Security
Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry
한충희,
박순태,
이상준,
Vol. 29, No. 2, pp. 401-415,
Mar.
2019
10.13089/JKIISC.2019.29.2.401
Keywords: cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking, cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking
10.13089/JKIISC.2019.29.2.401
Keywords: cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking, cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking
A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling
Ye-Seul Cha,
Seung-joo Kim,
Vol. 27, No. 6, pp. 1441-1455,
Dec.
2017
10.13089/JKIISC.2017.27.6.1441
Keywords: Threat-Modeling, Electric Vehicle Charging Infrastructure, Threat Analysis
10.13089/JKIISC.2017.27.6.1441
Keywords: Threat-Modeling, Electric Vehicle Charging Infrastructure, Threat Analysis
Cyber Security Framework for Critical Infrastructure
Sungmoon Kwon,
Seokcheol Lee,
Jiwoong Jang,
Taeshik Shon,
Vol. 27, No. 2, pp. 241-250,
Apr.
2017
10.13089/JKIISC.2017.27.2.241
Keywords: Cybersecurity Guideline, Cybersecurity Framework, Critical Infrastructure
10.13089/JKIISC.2017.27.2.241
Keywords: Cybersecurity Guideline, Cybersecurity Framework, Critical Infrastructure