Digital Library
Search: "[ keyword: TA ]" (791)
동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구
문주연,
김태규,
김인성,
김휘강,
Vol. 28, No. 2, pp. 485-500,
4월.
2018
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법
김광준,
황규호,
김인경,
오형근,
이만희,
Vol. 28, No. 2, pp. 449-456,
4월.
2018
10.13089/JKIISC.2018.28.2.449
주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
10.13089/JKIISC.2018.28.2.449
주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석
강태운,
김휘강,
Vol. 28, No. 2, pp. 437-447,
4월.
2018
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석
서승희,
김 역,
이창훈,
Vol. 28, No. 2, pp. 407-416,
4월.
2018
10.13089/JKIISC.2018.28.2.407
주제어: digital forensic, Instagram, SNS, Android, Android reverse engineering, digital forensic, Instagram, SNS, Android, Android reverse engineering
10.13089/JKIISC.2018.28.2.407
주제어: digital forensic, Instagram, SNS, Android, Android reverse engineering, digital forensic, Instagram, SNS, Android, Android reverse engineering
거리기반 키스트로크 다이나믹스 스마트폰 인증과 임계값 공식 모델
이신철,
황정연,
이현구,
김동인,
이성훈,
신지선,
Vol. 28, No. 2, pp. 369-383,
4월.
2018
10.13089/JKIISC.2018.28.2.369
주제어: Keystroke Dynamics, Distance-based classifications, Smartphone authentication, Keystroke Dynamics, Distance-based classifications, Smartphone authentication
10.13089/JKIISC.2018.28.2.369
주제어: Keystroke Dynamics, Distance-based classifications, Smartphone authentication, Keystroke Dynamics, Distance-based classifications, Smartphone authentication
파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템
김주환,
최민준,
윤주범,
Vol. 28, No. 2, pp. 357-367,
4월.
2018
10.13089/JKIISC.2018.28.2.357
주제어: Ransomware, data similarity, filter driver, File System, Cloud Storage, Ransomware, data similarity, filter driver, File System, Cloud Storage
10.13089/JKIISC.2018.28.2.357
주제어: Ransomware, data similarity, filter driver, File System, Cloud Storage, Ransomware, data similarity, filter driver, File System, Cloud Storage
비트코인 채굴 수익성 모델 및 분석
이진우,
조국래,
염대현,
Vol. 28, No. 2, pp. 303-310,
4월.
2018
10.13089/JKIISC.2018.28.2.303
주제어: Cryptocurrency, Bitcoin, Mining, Profitability, Cryptocurrency, Bitcoin, Mining, Profitability
10.13089/JKIISC.2018.28.2.303
주제어: Cryptocurrency, Bitcoin, Mining, Profitability, Cryptocurrency, Bitcoin, Mining, Profitability