Digital Library
Search: "[ keyword: model ]" (90)
위험 평가 모델 기반의 정량적 사이버 보안 평가 체계
김인경,
박남제,
Vol. 29, No. 5, pp. 1179-1189,
10월.
2019
10.13089/JKIISC.2019.29.5.1179
주제어: Risk Assessment, Cyber security Scoring System, Quantitative Risk Model, Risk Assessment, Cyber security Scoring System, Quantitative Risk Model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Risk Assessment, Cyber security Scoring System, Quantitative Risk Model, Risk Assessment, Cyber security Scoring System, Quantitative Risk Model
국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구
최재혁,
김완주,
임재성,
Vol. 29, No. 5, pp. 1153-1165,
10월.
2019
10.13089/JKIISC.2019.29.5.1153
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구
이영상,
박원환,
신동선,
원유재,
Vol. 29, No. 5, pp. 1117-1132,
10월.
2019
10.13089/JKIISC.2019.29.5.1117
주제어: Personal Data Use and Protection, Data Governance, Data Governance Maturity Model, Personal Data Use and Protection, Data Governance, Data Governance Maturity Model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Personal Data Use and Protection, Data Governance, Data Governance Maturity Model, Personal Data Use and Protection, Data Governance, Data Governance Maturity Model
정형 기법을 이용한 하드웨어 AES 모듈 백도어 탐색 연구
박재현,
김승주,
Vol. 29, No. 4, pp. 739-751,
8월.
2019
10.13089/JKIISC.2019.29.4.739
주제어: hardware backdoor, formal method, model checker
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: hardware backdoor, formal method, model checker
위협 모델링을 이용한 선박 사이버보안 요구사항 연구
조용현,
차영균,
Vol. 29, No. 3, pp. 657-673,
5월.
2019
10.13089/JKIISC.2019.29.3.657
주제어: Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis, Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis, Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis
위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석
강수영,
김승주,
Vol. 29, No. 3, pp. 613-628,
5월.
2019
10.13089/JKIISC.2019.29.3.613
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
AI 환경에서 모델 전도 공격에 안전한 차분 프라이버시 기술
박철희,
홍도원,
Vol. 29, No. 3, pp. 589-598,
5월.
2019
10.13089/JKIISC.2019.29.3.589
주제어: Differential privacy, model inversion attack, privacy-preserving neural network, Differential privacy, model inversion attack, privacy-preserving neural network
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Differential privacy, model inversion attack, privacy-preserving neural network, Differential privacy, model inversion attack, privacy-preserving neural network
정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구
김근혜,
박규동,
심미나,
Vol. 29, No. 2, pp. 451-463,
3월.
2019
10.13089/JKIISC.2019.29.2.451
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
X-box를 이용한 Session-oriented Cross play에 대한 보안 요구사항 분석
김동우,
강수영,
김승주,
Vol. 29, No. 1, pp. 235-255,
1월.
2019
10.13089/JKIISC.2019.29.1.235
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
기계학습 기반 비트코인 채굴 난이도 예측 연구
이준원,
권태경,
Vol. 29, No. 1, pp. 225-234,
1월.
2019
10.13089/JKIISC.2019.29.1.225
주제어: Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning, Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning, Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning