Digital Library
Search: "[ keyword: Threat ]" (69)
위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석
강수영,
김승주,
Vol. 29, No. 3, pp. 613-628,
5월.
2019
10.13089/JKIISC.2019.29.3.613
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
데이터센터 물리 보안 수준 향상을 위한 물리보안 위협 분할도(PS-TBS)개발 연구
배춘석,
고승철,
Vol. 29, No. 2, pp. 439-449,
3월.
2019
10.13089/JKIISC.2019.29.2.439
주제어: Threat Breakdown Structure, Data Center Security, Physical Security, Threat Breakdown Structure, Data Center Security, Physical Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat Breakdown Structure, Data Center Security, Physical Security, Threat Breakdown Structure, Data Center Security, Physical Security
전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구
한충희,
박순태,
이상준,
Vol. 29, No. 2, pp. 401-415,
3월.
2019
10.13089/JKIISC.2019.29.2.401
주제어: cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking, cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking, cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking
X-box를 이용한 Session-oriented Cross play에 대한 보안 요구사항 분석
김동우,
강수영,
김승주,
Vol. 29, No. 1, pp. 235-255,
1월.
2019
10.13089/JKIISC.2019.29.1.235
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
위협 모델링을 통한 스마트밴드 보안 요구사항 분석
강수인,
김혜민,
김휘강,
Vol. 28, No. 6, pp. 1355-1369,
11월.
2018
10.13089/JKIISC.2018.28.6.1355
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
AI 스피커의 보안성 평가 및 대응방안 연구
이지섭,
강수영,
김승주,
Vol. 28, No. 6, pp. 1523-1537,
11월.
2018
10.13089/JKIISC.2018.28.6.1523
주제어: AI Speaker, Threat modeling, STRIDE, LINDDUN, AI Speaker, Threat modeling, STRIDE, LINDDUN
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: AI Speaker, Threat modeling, STRIDE, LINDDUN, AI Speaker, Threat modeling, STRIDE, LINDDUN
N-gram을 활용한 DGA-DNS 유사도 분석 및 APT 공격 탐지
김동현,
김강석,
Vol. 28, No. 5, pp. 1141-1151,
9월.
2018
10.13089/JKIISC.2018.28.5.1141
주제어: Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis, Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis, Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis
AHP를 활용한 IP-CCTV 위험 결정 모델(클라우드 컴퓨팅 기반으로)
정성후,
이경호,
Vol. 28, No. 1, pp. 229-239,
2월.
2018
10.13089/JKIISC.2018.28.1.229
주제어: IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP), IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP), IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP)
Threat Modeling을 이용한 PS4와 PC간의 Remote Play 상황 속 위험 분석
김혜민,
김휘강,
Vol. 28, No. 1, pp. 135-143,
2월.
2018
10.13089/JKIISC.2018.28.1.135
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling