• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Security ]" (69)
  1. 1. Analysis of the Security Requirements of the Chatbot Service Implementation Model
  2. 2. A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity
    Jae-yoon Hwang, Hyuk-jin Kwon, Vol. 25, No. 1, pp. 123-136, Feb. 2024
    10.7472/jksii.2024.25.1.123
    Keywords: Cybersecurity Audit, Compliance, RMF, CMMC
  3. 3. An AI-Based Prevention Program to Protect Youth from Cybergrooming
    Kee Jeong Kim, Lifu Huang, Jin-Hee Cho, Vol. 24, No. 5, pp. 67-73, Oct. 2023
    10.7472/jksii.2023.24.5.67
    Keywords: Artificial intelligence (AI)-based simulation, Cybergrooming, cybersecurity, Children and Youth
  4. 4. Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy
    Gee-hee Yun, Kyoung-jin Kim, Vol. 24, No. 4, pp. 15-24, Aug. 2023
    10.7472/jksii.2023.24.4.15
    Keywords: DTx (Digital Therapeutics), MITRE ATT&CK Mobile, Mobile App Security, Privacy
  5. 5. Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling
    Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
    10.7472/jksii.2022.23.6.27
    Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement
  6. 6. A study on the cyber common operation picture for situational awareness in cyberspace
  7. 7. Development of Internet of Things Sensor-based Information System Robust to Security Attack
    Junhyeok Yun, Mihui Kim, Vol. 23, No. 4, pp. 95-107, Aug. 2022
    10.7472/jksii.2022.23.4.95
    Keywords: Internet of Things, Information System, Network Security, Big-Data
  8. 8. FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication
    Min-goo Kang, Vol. 23, No. 4, pp. 65-72, Aug. 2022
    10.7472/jksii.2022.23.4.65
    Keywords: Passwordless security, Multi-Factor Authentication(MFA), Zero Trust, FIDO transaction, Secondary user authentication
  9. 9. Deep Learning Based Rescue Requesters Detection Algorithm for Physical Security in Disaster Sites
    Da-hyeon Kim, Man-bok Park, Jun-ho Ahn, Vol. 23, No. 4, pp. 57-64, Aug. 2022
    10.7472/jksii.2022.23.4.57
    Keywords: Risk of building, Physical Security, Deep Learning, Disaster sites, Object Detection
  10. 10. Study on security requirements for the web based operation system of a shipping company
    Up Chung, Jongsub Moon, Vol. 23, No. 1, pp. 49-68, Feb. 2022
    10.7472/jksii.2022.23.1.49
    Keywords: Shipping company, Threat modeling, STRIDE, Security requirement