Digital Library
Search: "[ keyword: TA ]" (798)
빅데이터 활용에 영향을 미치는 개인정보 규제요인과 데이터 결합요인의 탐색
김상광,
김선경,
Vol. 30, No. 2, pp. 287-304,
4월.
2020
10.13089/JKIISC.2020.30.2.287
주제어: Personal Information, Big data utilization, Regulation factors, data combination, Delphi analysis, Personal Information, Big data utilization, Regulation factors, data combination, Delphi analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Personal Information, Big data utilization, Regulation factors, data combination, Delphi analysis, Personal Information, Big data utilization, Regulation factors, data combination, Delphi analysis
근거이론을 통한 아동 개인정보 유출에 대한 질적연구
전창욱,
유진호,
Vol. 30, No. 2, pp. 263-277,
4월.
2020
10.13089/JKIISC.2020.30.2.263
주제어: Children Personal Information, Leakage, Ground Theory, qualitative Research, Children Personal Information, Leakage, Ground Theory, qualitative Research
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Children Personal Information, Leakage, Ground Theory, qualitative Research, Children Personal Information, Leakage, Ground Theory, qualitative Research
가명 데이터 활용연구- 기술적 처리방법 및 기업의 활용방향을 중심으로 -
김정선,
Vol. 30, No. 2, pp. 253-261,
4월.
2020
10.13089/JKIISC.2020.30.2.253
주제어: Data Economy, De-Identification, Pseudonym, Data Economy, De-Identification, Pseudonym
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Data Economy, De-Identification, Pseudonym, Data Economy, De-Identification, Pseudonym
바이트 평균의 Gray-Scale화를 통한 Signature가 존재하지 않는 멀티미디어 데이터 조각 파일 타입 분류 연구
윤현호,
김재헌,
조현수,
원종은,
김견우,
조재현,
Vol. 30, No. 2, pp. 189-196,
4월.
2020
10.13089/JKIISC.2020.30.2.189
주제어: CNN, Digital Forensics, Data Fragment Classification, CNN, Digital Forensics, Data Fragment Classification
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: CNN, Digital Forensics, Data Fragment Classification, CNN, Digital Forensics, Data Fragment Classification
참조 테이블 기반 스칼라 곱 알고리즘에 대한 충돌 특성을 이용한 향상된 수평상관분석
박동준,
이상엽,
조성민,
김희석,
홍석희,
Vol. 30, No. 2, pp. 179-187,
4월.
2020
10.13089/JKIISC.2020.30.2.179
주제어: Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis, Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis, Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis
보안로그 빅데이터 분석 효율성 향상을 위한 방화벽 로그 데이터 표준 포맷 제안
배춘석,
고승철,
Vol. 30, No. 1, pp. 157-167,
2월.
2020
10.13089/JKIISC.2020.30.1.157
주제어: Logdata Standard, Firewall Logdata, Security Bigdata Analysis, Logdata Standard, Firewall Logdata, Security Bigdata Analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Logdata Standard, Firewall Logdata, Security Bigdata Analysis, Logdata Standard, Firewall Logdata, Security Bigdata Analysis
로컬 차분 프라이버시 실제 적용 사례연구 : 프라이버시 보존형 설문조사
정수용,
홍도원,
서창호,
Vol. 30, No. 1, pp. 141-156,
2월.
2020
10.13089/JKIISC.2020.30.1.141
주제어: Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis, Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis, Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis
저작권 침해 사이트 생애 주기 모델 개발
김득훈,
정해선,
곽진,
Vol. 30, No. 1, pp. 101-121,
2월.
2020
10.13089/JKIISC.2020.30.1.101
주제어: Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate, Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate, Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate
위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅
쿠미산드라,
임채호,
이상곤,
Vol. 30, No. 1, pp. 59-74,
2월.
2020
10.13089/JKIISC.2020.30.1.59
주제어: Security Management, Cyber Attack, Vulnerability, OWASP, MITRE, BITSCAN, Security Management, Cyber Attack, Vulnerability, OWASP, MITRE, BITSCAN
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Security Management, Cyber Attack, Vulnerability, OWASP, MITRE, BITSCAN, Security Management, Cyber Attack, Vulnerability, OWASP, MITRE, BITSCAN
블록 암호 SM4에 대한 부채널 공격 및 마스킹 기반 대응기법 분석
배대현,
남승현,
하재철,
Vol. 30, No. 1, pp. 39-49,
2월.
2020
10.13089/JKIISC.2020.30.1.39
주제어: Side-Channel Analysis, Power Analysis Attack, DPA, CPA, Data Masking, MLP, Side-Channel Analysis, Power Analysis Attack, DPA, CPA, Data Masking, MLP
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Side-Channel Analysis, Power Analysis Attack, DPA, CPA, Data Masking, MLP, Side-Channel Analysis, Power Analysis Attack, DPA, CPA, Data Masking, MLP