Home
Digital Library
Guide for Authors
Information
Aims and Scope
submission rule
Research of Ethics
Journal Correction Guideline
Editorial Board
Submission/Login
Menu
≡
Digital Library
Journal of The Korea Institute of Information Security and Cryptology, Vol. 35, No. 3, Jun. 2025
Analyzing Transaction Patterns of Bitcoin Crime Wallet Networks : A Time-Series and Topological Modeling Approach
,
,
Vol. 35, No. 3, pp. 463-476, Jun. 2025
10.13089/JKIISC.2025.35.3.463
Keywords:
An Implicit Form of Lightweight Block Cipher PIPO and its White-Box Implementation
,
,
,
,
Vol. 35, No. 3, pp. 477-491, Jun. 2025
10.13089/JKIISC.2025.35.3.477
Keywords:
Template-Based Databasse Design and Validation for Dynamic Least Privilege Policy Generation in AWS
,
,
,
,
,
,
Vol. 35, No. 3, pp. 493-504, Jun. 2025
10.13089/JKIISC.2025.35.3.493
Keywords:
Data Collection Methods and Security Threats to Memory Space in Linux Environment Databases
,
,
Vol. 35, No. 3, pp. 505-512, Jun. 2025
10.13089/JKIISC.2025.35.3.505
Keywords:
A Combined Model of CNN and ViT for Deepfake Image Detection
,
,
,
Vol. 35, No. 3, pp. 513-526, Jun. 2025
10.13089/JKIISC.2025.35.3.513
Keywords:
OCPP Protocol Based Analysis and Design of Electric Vehicle Charger Fuzzers
,
,
,
,
,
Vol. 35, No. 3, pp. 527-534, Jun. 2025
10.13089/JKIISC.2025.35.3.527
Keywords:
Secure Code Generation Using Retrieval-Augmented Generation for Large Language Models
,
,
Vol. 35, No. 3, pp. 535-544, Jun. 2025
10.13089/JKIISC.2025.35.3.535
Keywords:
Creating Effective Educational Malware Using ChatGPT
,
,
Vol. 35, No. 3, pp. 545-554, Jun. 2025
10.13089/JKIISC.2025.35.3.545
Keywords:
CatchAI : Real-Time Audio Deepfake Detection Application
,
,
Vol. 35, No. 3, pp. 555-562, Jun. 2025
10.13089/JKIISC.2025.35.3.555
Keywords:
Classification of Binary Obfuscation Techniques in Windows Binaries Using a 3D Markov Matrix
,
,
,
,
,
Vol. 35, No. 3, pp. 563-572, Jun. 2025
10.13089/JKIISC.2025.35.3.563
Keywords:
Research on Dynamic Component Specification for Linux System by Using Runtime Type SBOM
,
,
,
Vol. 35, No. 3, pp. 573-584, Jun. 2025
10.13089/JKIISC.2025.35.3.573
Keywords:
Analysis of Security Vulnerabilities of Multi-modal AI Models via Uni-Modality Backdoor Attacks
,
,
,
Vol. 35, No. 3, pp. 585-599, Jun. 2025
10.13089/JKIISC.2025.35.3.585
Keywords:
Exploring the Framework of Online Investigation and International Cooperation in Criminal Investigation - Insights from the EncroChat and Anom Operation
,
,
Vol. 35, No. 3, pp. 601-611, Jun. 2025
10.13089/JKIISC.2025.35.3.601
Keywords:
English-Korean Jailbreak Prompt Dataset Construction and Performance Analysis of Jailbreak Prompt Classification Models
,
,
,
,
Vol. 35, No. 3, pp. 613-622, Jun. 2025
10.13089/JKIISC.2025.35.3.613
Keywords:
Domain Detector for defending against Longtail Jailbreak Attack
,
,
,
,
Vol. 35, No. 3, pp. 623-638, Jun. 2025
10.13089/JKIISC.2025.35.3.623
Keywords:
Study on Security Mechanisms for Interworking Between qSIM-Based 5G Networks and Next-Generation M-BcN
,
,
,
,
Vol. 35, No. 3, pp. 639-647, Jun. 2025
10.13089/JKIISC.2025.35.3.639
Keywords:
Study on the Risk of Database Information Leakage Based on Memory Analysis
,
,
,
,
,
Vol. 35, No. 3, pp. 649-657, Jun. 2025
10.13089/JKIISC.2025.35.3.649
Keywords:
User Protection in Online Games: Research Trends in Cyberbullying Detection
,
,
Vol. 35, No. 3, pp. 659-679, Jun. 2025
10.13089/JKIISC.2025.35.3.659
Keywords:
Analysis of Risk-Based Cybersecurity management systems in US, UK and Australia and Derivation of an Integrated Cyber Risk Framework
,
,
,
Vol. 35, No. 3, pp. 681-697, Jun. 2025
10.13089/JKIISC.2025.35.3.681
Keywords:
A Study of University Cybersecurity Policy Change Using a Multiple Streams Framework
,
,
Vol. 35, No. 3, pp. 699-715, Jun. 2025
10.13089/JKIISC.2025.35.3.699
Keywords:
A Study on the Application of K-RMF to Enhance the Cybersecurity of the Command and Control Vessel for Naval Unmanned Systems
,
,
,
,
Vol. 35, No. 3, pp. 717-732, Jun. 2025
10.13089/JKIISC.2025.35.3.717
Keywords:
Forms
Author Checklist
Submission form (Submission with Converting PDF)
submission form (Submission with HWP )
Copyright Transfer Agreement Form
Research Ethics Form
Category Search
Title
Author
Abstract
Keywords
Publications
Vol. 35, 2025
Vol. 35, No. 3 (Jun. 2025)
Vol. 35, No. 2 (Apr. 2025)
Vol. 35, No. 1 (Feb. 2025)
Vol. 34, 2024
Vol. 34, No. 6 (Dec. 2024)
Vol. 34, No. 5 (Oct. 2024)
Vol. 34, No. 4 (Aug. 2024)
Vol. 34, No. 3 (Jun. 2024)
Vol. 34, No. 2 (Apr. 2024)
Vol. 34, No. 1 (Feb. 2024)
Vol. 33, 2023
Vol. 33, No. 6 (Dec. 2023)
Vol. 33, No. 5 (Oct. 2023)
Vol. 33, No. 4 (Aug. 2023)
Vol. 33, No. 3 (Jun. 2023)
Vol. 33, No. 2 (Apr. 2023)
Vol. 33, No. 1 (Feb. 2023)
Vol. 32, 2022
Vol. 32, No. 6 (Dec. 2022)
Vol. 32, No. 5 (Oct. 2022)
Vol. 32, No. 4 (Aug. 2022)
Vol. 32, No. 3 (Jun. 2022)
Vol. 32, No. 2 (Apr. 2022)
Vol. 32, No. 1 (Feb. 2022)
Vol. 31, 2021
Vol. 31, No. 6 (Dec. 2021)
Vol. 31, No. 5 (Oct. 2021)
Vol. 31, No. 4 (Aug. 2021)
Vol. 31, No. 3 (Jun. 2021)
Vol. 31, No. 2 (Apr. 2021)
Vol. 31, No. 1 (Feb. 2021)
Vol. 30, 2020
Vol. 30, No. 6 (Dec. 2020)
Vol. 30, No. 5 (Oct. 2020)
Vol. 30, No. 4 (Aug. 2020)
Vol. 30, No. 3 (Jun. 2020)
Vol. 30, No. 2 (Apr. 2020)
Vol. 30, No. 1 (Feb. 2020)
Vol. 29, 2019
Vol. 29, No. 6 (Dec. 2019)
Vol. 29, No. 5 (Oct. 2019)
Vol. 29, No. 4 (Aug. 2019)
Vol. 29, No. 3 (May. 2019)
Vol. 29, No. 2 (Mar. 2019)
Vol. 29, No. 1 (Jan. 2019)
Vol. 28, 2018
Vol. 28, No. 6 (Nov. 2018)
Vol. 28, No. 5 (Sep. 2018)
Vol. 28, No. 4 (Jul. 2018)
Vol. 28, No. 3 (May. 2018)
Vol. 28, No. 2 (Apr. 2018)
Vol. 28, No. 1 (Feb. 2018)
Vol. 27, 2017
Vol. 27, No. 6 (Dec. 2017)
Vol. 27, No. 5 (Oct. 2017)
Vol. 27, No. 4 (Aug. 2017)
Vol. 27, No. 3 (Jun. 2017)
Vol. 27, No. 2 (Apr. 2017)
Vol. 27, No. 1 (Feb. 2017)
Vol. 26, 2016
Vol. 26, No. 6 (Dec. 2016)
Vol. 26, No. 5 (Oct. 2016)
Vol. 26, No. 4 (Aug. 2016)
Vol. 26, No. 3 (Jun. 2016)
Vol. 26, No. 2 (Apr. 2016)
Vol. 26, No. 1 (Feb. 2016)
Vol. 25, 2015
Vol. 25, No. 6 (Dec. 2015)
Vol. 25, No. 5 (Oct. 2015)
Vol. 25, No. 4 (Aug. 2015)
Vol. 25, No. 3 (Jun. 2015)
Vol. 25, No. 2 (Apr. 2015)
Vol. 25, No. 1 (Feb. 2015)
Vol. 24, 2014
Vol. 24, No. 6 (Dec. 2014)
Vol. 24, No. 5 (Oct. 2014)
Vol. 24, No. 4 (Aug. 2014)
Vol. 24, No. 3 (Jun. 2014)
Vol. 24, No. 2 (Apr. 2014)
Vol. 24, No. 1 (Feb. 2014)
Vol. 23, 2013
Vol. 23, No. 6 (Dec. 2013)
Vol. 23, No. 5 (Oct. 2013)
Vol. 23, No. 4 (Aug. 2013)
Vol. 23, No. 3 (Jun. 2013)
Vol. 23, No. 2 (Apr. 2013)
Vol. 23, No. 1 (Feb. 2013)
Vol. 22, 2012
Vol. 22, No. 6 (Dec. 2012)
Vol. 22, No. 5 (Oct. 2012)
Vol. 22, No. 4 (Aug. 2012)
Vol. 22, No. 3 (Jun. 2012)
Vol. 22, No. 2 (Apr. 2012)
Vol. 22, No. 1 (Feb. 2012)
Vol. 21, 2011
Vol. 21, No. 6 (Dec. 2011)
Vol. 21, No. 5 (Oct. 2011)
Vol. 21, No. 4 (Aug. 2011)
Vol. 21, No. 3 (Jun. 2011)
Vol. 21, No. 2 (Apr. 2011)
Vol. 21, No. 1 (Feb. 2011)
Vol. 20, 2010
Vol. 20, No. 6 (Dec. 2010)
Vol. 20, No. 5 (Oct. 2010)
Vol. 20, No. 4 (Aug. 2010)
Vol. 20, No. 3 (Jun. 2010)
Vol. 20, No. 2 (Apr. 2010)
Vol. 20, No. 1 (Feb. 2010)
Vol. 19, 2009
Vol. 19, No. 6 (Dec. 2009)
Vol. 19, No. 5 (Oct. 2009)
Vol. 19, No. 4 (Aug. 2009)
Vol. 19, No. 3 (Jun. 2009)
Vol. 19, No. 2 (Apr. 2009)
Vol. 19, No. 1 (Feb. 2009)
Vol. 18, 2008
Vol. 18, No. 6 (Oct. 2008)
Vol. 18, No. 5 (Oct. 2008)
Vol. 18, No. 4 (Aug. 2008)
Vol. 18, No. 3 (Jun. 2008)
Vol. 18, No. 2 (Apr. 2008)
Vol. 18, No. 1 (Feb. 2008)
Vol. 17, 2007
Vol. 17, No. 6 (Dec. 2007)
Vol. 17, No. 5 (Oct. 2007)
Vol. 17, No. 4 (Aug. 2007)
Vol. 17, No. 3 (Jun. 2007)
Vol. 17, No. 2 (Apr. 2007)
Vol. 17, No. 1 (Feb. 2007)
Vol. 16, 2006
Vol. 16, No. 6 (Dec. 2006)
Vol. 16, No. 5 (Oct. 2006)
Vol. 16, No. 4 (Aug. 2006)
Vol. 16, No. 3 (Jun. 2006)
Vol. 16, No. 2 (Apr. 2006)
Vol. 16, No. 1 (Feb. 2006)
Vol. 15, 2005
Vol. 15, No. 6 (Dec. 2005)
Vol. 15, No. 5 (Oct. 2005)
Vol. 15, No. 4 (Aug. 2005)
Vol. 15, No. 3 (Jun. 2005)
Vol. 15, No. 2 (Apr. 2005)
Vol. 15, No. 1 (Feb. 2005)
Vol. 14, 2004
Vol. 14, No. 6 (Dec. 2004)
Vol. 14, No. 5 (Oct. 2004)
Vol. 14, No. 4 (Aug. 2004)
Vol. 14, No. 3 (Jun. 2004)
Vol. 14, No. 2 (Apr. 2004)
Vol. 14, No. 1 (Feb. 2004)
Vol. 13, 2003
Vol. 13, No. 6 (Dec. 2003)
Vol. 13, No. 5 (Oct. 2003)
Vol. 13, No. 4 (Aug. 2003)
Vol. 13, No. 3 (Jun. 2003)
Vol. 13, No. 2 (Apr. 2003)
Vol. 13, No. 1 (Feb. 2003)
Vol. 12, 2002
Vol. 12, No. 6 (Dec. 2002)
Vol. 12, No. 5 (Oct. 2002)
Vol. 12, No. 4 (Aug. 2002)
Vol. 12, No. 3 (Jun. 2002)
Vol. 12, No. 2 (Apr. 2002)
Vol. 12, No. 1 (Feb. 2002)
Vol. 11, 2001
Vol. 11, No. 6 (Dec. 2001)
Vol. 11, No. 5 (Oct. 2001)
Vol. 11, No. 4 (Aug. 2001)
Vol. 11, No. 3 (Jun. 2001)
Vol. 11, No. 2 (Apr. 2001)
Vol. 11, No. 1 (Feb. 2001)
Vol. 10, 2000
Vol. 10, No. 4 (Aug. 2000)
Vol. 10, No. 3 (Jun. 2000)
Vol. 10, No. 2 (Apr. 2000)
Vol. 10, No. 1 (Feb. 2000)
Vol. 9, 1999
Vol. 9, No. 4 (Aug. 1999)
Vol. 9, No. 3 (Jun. 1999)
Vol. 9, No. 2 (Apr. 1999)
Vol. 9, No. 1 (Feb. 1999)
Vol. 8, 1998
Vol. 8, No. 4 (Aug. 1998)
Vol. 8, No. 3 (Jun. 1998)
Vol. 8, No. 2 (Apr. 1998)
Vol. 8, No. 1 (Feb. 1998)
Vol. 7, 1997
Vol. 7, No. 4 (Aug. 1997)
Vol. 7, No. 3 (Jun. 1997)
Vol. 7, No. 2 (Apr. 1997)
Vol. 7, No. 1 (Feb. 1997)
Vol. 6, 1996
Vol. 6, No. 4 (Aug. 1996)
Vol. 6, No. 3 (Jun. 1996)
Vol. 6, No. 1 (Feb. 1996)
Vol. 5, 1995
Vol. 5, No. 1 (Feb. 1995)
Vol. 4, 1994
Vol. 4, No. 2 (Apr. 1994)
Vol. 2, 1992
Vol. 2, No. 1 (Feb. 1992)
Vol. 1, 1991
Vol. 1, No. 1 (Feb. 1991)