• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: 보안" (31)
  1. 1. A Study on the Analysis and Solutions of the Blockchain Security Issues
    Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
    10.7472/jksii.2019.20.4.01
    Keywords: Blockchain, access control, Security, Privacy
  2. 2. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
    Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
    10.7472/jksii.2019.20.1.01
    Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail
  3. 3. A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering
    Heejung Kang, Hye Ri Kim, Seng-phil Hong, Vol. 19, No. 5, pp. 1-11, Oct. 2018
    10.7472/jksii.2018.19.5.1
    Keywords: Blockchain, Smart Contract, AML, Security
  4. 4. Implementation, Security, and Usability Analysis of Accredited Certificate-based Internet Banking
    Hye-Seung Park, Jae-Hyup Lee, Seung-Chul Park, Vol. 18, No. 4, pp. 69-78, Aug. 2017
    10.7472/jksii.2017.18.4.69
    Keywords: Internet banking, banking security, NPKI banking, open banking
  5. 5. Status and Future of Security Techniques in the Internet Banking Service
  6. 6. A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone
    Jong-jin Park, Min-kyong Choi, Jong-chang Ahn, Vol. 18, No. 1, pp. 105-120, Feb. 2017
    10.7472/jksii.2017.18.1.105
    Keywords: Smartphones, information security, Degree of personal risk accepting, Buying intention, Android, iOS
  7. 7. A Detection Model using Labeling based on Inference and Unsupervised Learning Method
  8. 8. VANET Privacy Assurance Architecture Design
    Su-min Park, Man-pyo Hong, Tae-shik Shon, Jin Kwak, Vol. 17, No. 6, pp. 81-92, Dec. 2016
    10.7472/jksii.2016.17.6.81
    Keywords: Cooperative Intelligent Transport Systems, Connected car, VANET, Privacy, Security
  9. 9. Definition of Security Metrics for Software Security-enhanced Development
    Dongsu Seo, Vol. 17, No. 4, pp. 79-86, Aug. 2016
    10.7472/jksii.2016.17.4.79
    Keywords: Security Metric, Secure Coding, Code Quality, Security-enhanced development
  10. 10. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping