Digital Library
Search: "[ keyword: security vulnerability ]" (5)
A Study on the Application Method of Fuzz Testing to Domestic Weapon Systems Considering the Software Development Life Cycle (SDLC)
조현석,
강수진,
신영섭,
조규태,
Vol. 31, No. 2, pp. 279-289,
Apr.
2021
10.13089/JKIISC.2021.31.2.279
Keywords: Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis, Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis
10.13089/JKIISC.2021.31.2.279
Keywords: Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis, Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis
A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database
현석우,
권태경,
Vol. 29, No. 5, pp. 1167-1177,
Oct.
2019
10.13089/JKIISC.2019.29.5.1167
Keywords: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
10.13089/JKIISC.2019.29.5.1167
Keywords: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
Refining software vulnerbility Analysis under ISO/IEC 15408 and 18045
Jae-Woo Im,
Vol. 24, No. 5, pp. 969-974,
Oct.
2014
10.13089/JKIISC.2014.24.5.969
Keywords: Common Criteria, security vulnerability, Security Quality, penetration test
10.13089/JKIISC.2014.24.5.969
Keywords: Common Criteria, security vulnerability, Security Quality, penetration test
Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism
Young-Dong Kim,
Ikhwan Kim,
Taehyoun Kim,
Vol. 22, No. 5, pp. 1145-1158,
Oct.
2012
10.13089/JKIISC.2012.22.5.1145
Keywords: Android, permission, broadcast intent, security vulnerability
10.13089/JKIISC.2012.22.5.1145
Keywords: Android, permission, broadcast intent, security vulnerability
A Study on the Design of Security Metrics for Source Code
Dong-Su Seo,
Vol. 20, No. 6, pp. 147-156,
Dec.
2010
10.13089/JKIISC.2010.20.6.147
Keywords: security metrics, Static Analysis, security vulnerability, source code vulnerability
10.13089/JKIISC.2010.20.6.147
Keywords: security metrics, Static Analysis, security vulnerability, source code vulnerability
Category Search
Publications
-
Vol. 34, 2024
-
Vol. 33, 2023
-
Vol. 32, 2022
-
Vol. 31, 2021
-
Vol. 30, 2020
-
Vol. 29, 2019
-
Vol. 28, 2018
-
Vol. 27, 2017
-
Vol. 26, 2016
-
Vol. 25, 2015
-
Vol. 24, 2014
-
Vol. 23, 2013
-
Vol. 22, 2012
-
Vol. 21, 2011
-
Vol. 20, 2010
-
Vol. 19, 2009
-
Vol. 18, 2008
-
Vol. 17, 2007
-
Vol. 16, 2006
-
Vol. 15, 2005
-
Vol. 14, 2004
-
Vol. 13, 2003
-
Vol. 12, 2002
-
Vol. 11, 2001
-
Vol. 10, 2000
-
Vol. 9, 1999
-
Vol. 8, 1998
-
Vol. 7, 1997
-
Vol. 6, 1996
-
Vol. 5, 1995
-
Vol. 4, 1994
-
Vol. 2, 1992
-
Vol. 1, 1991