• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: Security" (54)
  1. 11. A Detection Model using Labeling based on Inference and Unsupervised Learning Method
  2. 12. VANET Privacy Assurance Architecture Design
    Su-min Park, Man-pyo Hong, Tae-shik Shon, Jin Kwak, Vol. 17, No. 6, pp. 81-92, Dec. 2016
    10.7472/jksii.2016.17.6.81
    Keywords: Cooperative Intelligent Transport Systems, Connected car, VANET, Privacy, Security
  3. 13. Definition of Security Metrics for Software Security-enhanced Development
    Dongsu Seo, Vol. 17, No. 4, pp. 79-86, Aug. 2016
    10.7472/jksii.2016.17.4.79
    Keywords: Security Metric, Secure Coding, Code Quality, Security-enhanced development
  4. 14. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping
  5. 15. A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology
    Younsung Choi, Oh-Geol Kwon, Dongho Won, Vol. 17, No. 2, pp. 77-86, Apr. 2016
    10.7472/jksii.2016.17.2.77
    Keywords: Internet cookie technology, Personal information security, Privacy, Right to be forgotten
  6. 16. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -
    Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
    10.7472/jksii.2016.17.1.91
    Keywords: Mobile Security, android security, permissions, least privilege
  7. 17. Adaptive Multi-Layer Security Approach for Cyber Defense
    Seong-kee Lee, Tae-in Kang, Vol. 16, No. 5, pp. 1-10, Oct. 2015
    10.7472/jksii.2015.16.5.01
    Keywords: Cyber Defense, Multi-Layer Security Model, Adaptive Security System
  8. 18. An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service
    Hexin Yu, Suaini Sura, Jong-chang Ahn, Vol. 16, No. 3, pp. 79-94, Jun. 2015
    10.7472/jksii.2015.16.3.79
    Keywords: Cloud service, Persistent usage intention, External variable, Brand influence, Perceived security
  9. 19. OTACUS: Parameter-Tampering Prevention Techniques using Clean URL
    Guiseok Kim, Seungjoo Kim, Vol. 15, No. 6, pp. 55-64, Dec. 2014
    10.7472/jksii.2014.15.6.55
    Keywords: Web service Security, URL Parameter, OWASP
  10. 20. A Framework for Making Decision on Optimal Security Investment to the Proactive and Reactive Security Solutions management
    Yoon-Ho Choi, Vol. 15, No. 3, pp. 91-100, Jun. 2014
    10.7472/jksii.2014.15.3.91
    Keywords: Decision Making, mathematical analysis, investment on security solutions, optimal security investment