• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 보안 ]" (48)
  1. 11. A research on cyber target importance ranking using PageRank algorithm
    Kook-jin Kim, Seung-hwan Oh, Dong-hwan Lee, Haeng-rok Oh, Jung-sik Lee, Dong-kyoo Shin, Vol. 22, No. 6, pp. 115-127, Dec. 2021
    10.7472/jksii.2021.22.6.115
    Keywords: Cyber Operation, Cyber Target, Cyber Security, Pagerank Algorithm
  2. 12. The direction of application of the RMF-based risk management system considering interoperability
    Hyuk-Jin Kwon, Sung-Tae Kim, Ye-na Joo, Vol. 22, No. 6, pp. 83-89, Dec. 2021
    10.7472/jksii.2021.22.6.83
    Keywords: CyberSecurity System engineering, Fuzzy, Secure SDLC, RMF
  3. 13. A study on the application of mission-based weapon system cybersecurity test and evaluation
    Ik-jae Kim, Ji-won Kang, Dong-kyoo Shin, Vol. 22, No. 6, pp. 71-81, Dec. 2021
    10.7472/jksii.2021.22.6.71
    Keywords: cybersecurity test and evaluation
  4. 14. Cyber threat Detection and Response Time Modeling
    Han Choong-Hee, Han ChangHee, Vol. 22, No. 3, pp. 53-58, Jun. 2021
    10.7472/jksii.2021.22.3.53
    Keywords:
  5. 15. Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users
    Seonjin Hwang, DongHyun Ko, Taeu Bahk, Yoon-ho Choi, Vol. 21, No. 3, pp. 1-9, Jun. 2020
    10.7472/jksii.2020.21.3.1
    Keywords: blockchain platform, Privacy, Blockchain Securicy, Ethereum
  6. 16. A Study of Machine Learning based Hardware Trojans Detection Mechanisms for FPGAs
    Jaedong Jang, Mingi Cho, Yezee Seo, Seyeon Jeong, Taekyoung Kwon, Vol. 21, No. 2, pp. 109-119, Apr. 2020
    10.7472/jksii.2020.21.2.109
    Keywords: FPGA, Hardware Security, Hardware Trojan
  7. 17. CFI Approach to Defend against GOT Overwrite Attacks
    Seunghoon Jeong, Jaejoon Hwang, Hyukjin Kwon, Dongkyoo Shin, Vol. 21, No. 1, pp. 179-190, Feb. 2020
    10.7472/jksii.2020.21.1.179
    Keywords: Control Flow Integrity, GOT/PLT, linking and loading, Security
  8. 18. A Study on the Analysis and Solutions of the Blockchain Security Issues
    Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
    10.7472/jksii.2019.20.4.01
    Keywords: Blockchain, access control, Security, Privacy
  9. 19. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
    Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
    10.7472/jksii.2019.20.1.01
    Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail
  10. 20. A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering
    Heejung Kang, Hye Ri Kim, Seng-phil Hong, Vol. 19, No. 5, pp. 1-11, Oct. 2018
    10.7472/jksii.2018.19.5.1
    Keywords: Blockchain, Smart Contract, AML, Security