Digital Library
Search: "[ keyword: model ]" (113)
정형 기법을 이용한 하드웨어 AES 모듈 백도어 탐색 연구
박재현,
김승주,
Vol. 29, No. 4, pp. 739-751,
8월.
2019
10.13089/JKIISC.2019.29.4.739
주제어: hardware backdoor, formal method, model checker
주제어: hardware backdoor, formal method, model checker
위협 모델링을 이용한 선박 사이버보안 요구사항 연구
조용현,
차영균,
Vol. 29, No. 3, pp. 657-673,
6월.
2019
10.13089/JKIISC.2019.29.3.657
주제어: Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis, Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis
주제어: Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis, Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis
위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석
강수영,
김승주,
Vol. 29, No. 3, pp. 613-628,
6월.
2019
10.13089/JKIISC.2019.29.3.613
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
AI 환경에서 모델 전도 공격에 안전한 차분 프라이버시 기술
박철희,
홍도원,
Vol. 29, No. 3, pp. 589-598,
6월.
2019
10.13089/JKIISC.2019.29.3.589
주제어: Differential privacy, model inversion attack, privacy-preserving neural network, Differential privacy, model inversion attack, privacy-preserving neural network
주제어: Differential privacy, model inversion attack, privacy-preserving neural network, Differential privacy, model inversion attack, privacy-preserving neural network
정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구
김근혜,
박규동,
심미나,
Vol. 29, No. 2, pp. 451-463,
4월.
2019
10.13089/JKIISC.2019.29.2.451
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
X-box를 이용한 Session-oriented Cross play에 대한 보안 요구사항 분석
김동우,
강수영,
김승주,
Vol. 29, No. 1, pp. 235-255,
2월.
2019
10.13089/JKIISC.2019.29.1.235
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
기계학습 기반 비트코인 채굴 난이도 예측 연구
이준원,
권태경,
Vol. 29, No. 1, pp. 225-234,
2월.
2019
10.13089/JKIISC.2019.29.1.225
주제어: Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning, Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning
주제어: Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning, Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning
K-RMF 적용 시 기존 보안평가 증거물의 재활용 방안
조광수,
김승주,
조현석,
신영섭,
최유정,
박준혁,
Vol. 36, No. 1, pp. 359-376,
2월.
2026
10.13089/JKIISC.2025.35.6.359
주제어: K-RMF (Korean Risk Management Framework), CMMC (Cybersecurity Maturity Model Certification), CC (Common Criteria), KCMVP (Korea Cryptographic Module Validation Program), reciprocity
주제어: K-RMF (Korean Risk Management Framework), CMMC (Cybersecurity Maturity Model Certification), CC (Common Criteria), KCMVP (Korea Cryptographic Module Validation Program), reciprocity
연합학습에서 미세조정 기법 기반 소형 언어 모델 효율성 및 강건성 분석
김승한,
김현일,
임창훈,
Vol. 36, No. 1, pp. 165-176,
2월.
2026
10.13089/JKIISC.2025.35.6.165
주제어: Federated learning, System robustness of AI, Efficient model update
주제어: Federated learning, System robustness of AI, Efficient model update
스트립 바이너리에서 보안 취약점 탐지를 위한 LLM 기반 프레임워크
최영호,
최두호,
조금환,
Vol. 36, No. 1, pp. 127-138,
2월.
2026
10.13089/JKIISC.2025.35.6.127
주제어: Binary Code Analysis, Memory Vulnerability Detection, Large Language Model
주제어: Binary Code Analysis, Memory Vulnerability Detection, Large Language Model