Digital Library
Search: "[ keyword: model ]" (90)
사회공학 사이버작전 분석모델 정립연구
신규용,
김지원,
임현명,
김용주,
유진철,
Vol. 28, No. 6, pp. 1595-1606,
11월.
2018
10.13089/JKIISC.2018.28.6.1595
주제어: Social Engineering, Cyberspace Operations, Analysis Model, Social Engineering, Cyberspace Operations, Analysis Model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Social Engineering, Cyberspace Operations, Analysis Model, Social Engineering, Cyberspace Operations, Analysis Model
보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구
이상규,
김인석,
Vol. 28, No. 6, pp. 1585-1594,
11월.
2018
10.13089/JKIISC.2018.28.6.1585
주제어: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
위협 모델링을 통한 스마트밴드 보안 요구사항 분석
강수인,
김혜민,
김휘강,
Vol. 28, No. 6, pp. 1355-1369,
11월.
2018
10.13089/JKIISC.2018.28.6.1355
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Security requirement, Smart band, Threat modeling, Security requirement, Smart band, Threat modeling
AI 스피커의 보안성 평가 및 대응방안 연구
이지섭,
강수영,
김승주,
Vol. 28, No. 6, pp. 1523-1537,
11월.
2018
10.13089/JKIISC.2018.28.6.1523
주제어: AI Speaker, Threat modeling, STRIDE, LINDDUN, AI Speaker, Threat modeling, STRIDE, LINDDUN
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: AI Speaker, Threat modeling, STRIDE, LINDDUN, AI Speaker, Threat modeling, STRIDE, LINDDUN
Zorro의 연관키 차분특성을 이용한 키 복구 공격 및 PGV-Zorro의 충돌쌍 공격
김기윤,
박은후,
이종혁,
장성우,
김지훈,
김한기,
김종성,
Vol. 28, No. 5, pp. 1059-1070,
9월.
2018
10.13089/JKIISC.2018.28.5.1059
주제어: block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks, block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks, block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks
금융기관 클라우드 시스템 도입을 위한 의사결정 모델에 대한 연구
이희석,
김인석,
Vol. 28, No. 3, pp. 743-763,
5월.
2018
10.13089/JKIISC.2018.28.3.743
주제어: Cloud system, Decision making model. Financial institutions, Cloud system, Decision making model. Financial institutions
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Cloud system, Decision making model. Financial institutions, Cloud system, Decision making model. Financial institutions
AHP를 활용한 IP-CCTV 위험 결정 모델(클라우드 컴퓨팅 기반으로)
정성후,
이경호,
Vol. 28, No. 1, pp. 229-239,
2월.
2018
10.13089/JKIISC.2018.28.1.229
주제어: IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP), IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP), IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP)
개인정보유출 피해 비용 산출 모델에 관한 연구
임규건,
류미나,
이정미,
Vol. 28, No. 1, pp. 215-227,
2월.
2018
10.13089/JKIISC.2018.28.1.215
주제어: Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model, Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model, Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model
패스워드 보안행위의도에 영향을 미치는 요인
이동희,
김태성,
전효정,
Vol. 28, No. 1, pp. 187-198,
2월.
2018
10.13089/JKIISC.2018.28.1.187
주제어: Password, Security behavior intention, health belief model, Password, Security behavior intention, health belief model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Password, Security behavior intention, health belief model, Password, Security behavior intention, health belief model
Threat Modeling을 이용한 PS4와 PC간의 Remote Play 상황 속 위험 분석
김혜민,
김휘강,
Vol. 28, No. 1, pp. 135-143,
2월.
2018
10.13089/JKIISC.2018.28.1.135
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling