Digital Library


Search: "[ keyword: Structure ]" (27)
    Analysis of National Critical Information Infrastructure (NCII) Protection Policy Promotion System Based on Modified Policy Model Theory
    , Vol. 34, No. 2, pp. 347-363, Apr. 2024
    10.13089/JKIISC.2024.34.2.347

    IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Frameworkfor Cyber Defense Training
    , , , Vol. 33, No. 3, pp. 527-535, Jun. 2023
    10.13089/JKIISC.2023.33.3.527

    Optimized Implementation of Lightweight Block Cipher PIPO Using T-Table
    , , , , , , Vol. 33, No. 3, pp. 391-399, Jun. 2023
    10.13089/JKIISC.2023.33.3.391

    , , Vol. 31, No. 4, pp. 853-862, Aug. 2021
    10.13089/JKIISC.2021.31.4.853

    An Study on the Analysis of Design Criteria for S-Box Based on Deep Learning
    Dong-hoon Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong, Vol. 30, No. 3, pp. 337-347, Jun. 2020
    10.13089/JKIISC.2020.30.3.337
    Keywords: cryptanalysis, deep-learning, Symmetric key, S-box structure

    A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure
    , Vol. 29, No. 4, pp. 907-918, Aug. 2019
    10.13089/JKIISC.2019.29.4.907

    On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up
    배춘석, 고승철, Vol. 29, No. 2, pp. 439-449, Mar. 2019
    10.13089/JKIISC.2019.29.2.439
    Keywords: Threat Breakdown Structure, Data Center Security, Physical Security, Threat Breakdown Structure, Data Center Security, Physical Security

    Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry
    한충희, 박순태, 이상준, Vol. 29, No. 2, pp. 401-415, Mar. 2019
    10.13089/JKIISC.2019.29.2.401
    Keywords: cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking, cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking

    A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling
    Ye-Seul Cha, Seung-joo Kim, Vol. 27, No. 6, pp. 1441-1455, Dec. 2017
    10.13089/JKIISC.2017.27.6.1441
    Keywords: Threat-Modeling, Electric Vehicle Charging Infrastructure, Threat Analysis

    Cyber Security Framework for Critical Infrastructure
    Sungmoon Kwon, Seokcheol Lee, Jiwoong Jang, Taeshik Shon, Vol. 27, No. 2, pp. 241-250, Apr. 2017
    10.13089/JKIISC.2017.27.2.241
    Keywords: Cybersecurity Guideline, Cybersecurity Framework, Critical Infrastructure