Digital Library

Journal of The Korea Institute of Information Security and Cryptology, Vol. 35, No. 3, Jun. 2025


Analyzing Transaction Patterns of Bitcoin Crime Wallet Networks : A Time-Series and Topological Modeling Approach
, , Vol. 35, No. 3, pp. 463-476, Jun. 2025
10.13089/JKIISC.2025.35.3.463
Keywords:

An Implicit Form of Lightweight Block Cipher PIPO and its White-Box Implementation
, , , , Vol. 35, No. 3, pp. 477-491, Jun. 2025
10.13089/JKIISC.2025.35.3.477
Keywords:

Template-Based Databasse Design and Validation for Dynamic Least Privilege Policy Generation in AWS
, , , , , , Vol. 35, No. 3, pp. 493-504, Jun. 2025
10.13089/JKIISC.2025.35.3.493
Keywords:

Data Collection Methods and Security Threats to Memory Space in Linux Environment Databases
, , Vol. 35, No. 3, pp. 505-512, Jun. 2025
10.13089/JKIISC.2025.35.3.505
Keywords:

A Combined Model of CNN and ViT for Deepfake Image Detection
, , , Vol. 35, No. 3, pp. 513-526, Jun. 2025
10.13089/JKIISC.2025.35.3.513
Keywords:

OCPP Protocol Based Analysis and Design of Electric Vehicle Charger Fuzzers
, , , , , Vol. 35, No. 3, pp. 527-534, Jun. 2025
10.13089/JKIISC.2025.35.3.527
Keywords:

Secure Code Generation Using Retrieval-Augmented Generation for Large Language Models
, , Vol. 35, No. 3, pp. 535-544, Jun. 2025
10.13089/JKIISC.2025.35.3.535
Keywords:

Creating Effective Educational Malware Using ChatGPT
, , Vol. 35, No. 3, pp. 545-554, Jun. 2025
10.13089/JKIISC.2025.35.3.545
Keywords:

CatchAI : Real-Time Audio Deepfake Detection Application
, , Vol. 35, No. 3, pp. 555-562, Jun. 2025
10.13089/JKIISC.2025.35.3.555
Keywords:

Classification of Binary Obfuscation Techniques in Windows Binaries Using a 3D Markov Matrix
, , , , , Vol. 35, No. 3, pp. 563-572, Jun. 2025
10.13089/JKIISC.2025.35.3.563
Keywords:

Research on Dynamic Component Specification for Linux System by Using Runtime Type SBOM
, , , Vol. 35, No. 3, pp. 573-584, Jun. 2025
10.13089/JKIISC.2025.35.3.573
Keywords:

Analysis of Security Vulnerabilities of Multi-modal AI Models via Uni-Modality Backdoor Attacks
, , , Vol. 35, No. 3, pp. 585-599, Jun. 2025
10.13089/JKIISC.2025.35.3.585
Keywords:

Exploring the Framework of Online Investigation and International Cooperation in Criminal Investigation - Insights from the EncroChat and Anom Operation
, , Vol. 35, No. 3, pp. 601-611, Jun. 2025
10.13089/JKIISC.2025.35.3.601
Keywords:

English-Korean Jailbreak Prompt Dataset Construction and Performance Analysis of Jailbreak Prompt Classification Models
, , , , Vol. 35, No. 3, pp. 613-622, Jun. 2025
10.13089/JKIISC.2025.35.3.613
Keywords:

Domain Detector for defending against Longtail Jailbreak Attack
, , , , Vol. 35, No. 3, pp. 623-638, Jun. 2025
10.13089/JKIISC.2025.35.3.623
Keywords:

Study on Security Mechanisms for Interworking Between qSIM-Based 5G Networks and Next-Generation M-BcN
, , , , Vol. 35, No. 3, pp. 639-647, Jun. 2025
10.13089/JKIISC.2025.35.3.639
Keywords:

Study on the Risk of Database Information Leakage Based on Memory Analysis
, , , , , Vol. 35, No. 3, pp. 649-657, Jun. 2025
10.13089/JKIISC.2025.35.3.649
Keywords:

User Protection in Online Games: Research Trends in Cyberbullying Detection
, , Vol. 35, No. 3, pp. 659-679, Jun. 2025
10.13089/JKIISC.2025.35.3.659
Keywords:

Analysis of Risk-Based Cybersecurity management systems in US, UK and Australia and Derivation of an Integrated Cyber Risk Framework
, , , Vol. 35, No. 3, pp. 681-697, Jun. 2025
10.13089/JKIISC.2025.35.3.681
Keywords:

A Study of University Cybersecurity Policy Change Using a Multiple Streams Framework
, , Vol. 35, No. 3, pp. 699-715, Jun. 2025
10.13089/JKIISC.2025.35.3.699
Keywords:

A Study on the Application of K-RMF to Enhance the Cybersecurity of the Command and Control Vessel for Naval Unmanned Systems
, , , , Vol. 35, No. 3, pp. 717-732, Jun. 2025
10.13089/JKIISC.2025.35.3.717
Keywords: