• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 보안 ]" (48)
  1. 21. Implementation, Security, and Usability Analysis of Accredited Certificate-based Internet Banking
    Hye-Seung Park, Jae-Hyup Lee, Seung-Chul Park, Vol. 18, No. 4, pp. 69-78, Aug. 2017
    10.7472/jksii.2017.18.4.69
    Keywords: Internet banking, banking security, NPKI banking, open banking
  2. 22. Status and Future of Security Techniques in the Internet Banking Service
  3. 23. A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone
    Jong-jin Park, Min-kyong Choi, Jong-chang Ahn, Vol. 18, No. 1, pp. 105-120, Feb. 2017
    10.7472/jksii.2017.18.1.105
    Keywords: Smartphones, information security, Degree of personal risk accepting, Buying intention, Android, iOS
  4. 24. A Detection Model using Labeling based on Inference and Unsupervised Learning Method
  5. 25. VANET Privacy Assurance Architecture Design
    Su-min Park, Man-pyo Hong, Tae-shik Shon, Jin Kwak, Vol. 17, No. 6, pp. 81-92, Dec. 2016
    10.7472/jksii.2016.17.6.81
    Keywords: Cooperative Intelligent Transport Systems, Connected car, VANET, Privacy, Security
  6. 26. Definition of Security Metrics for Software Security-enhanced Development
    Dongsu Seo, Vol. 17, No. 4, pp. 79-86, Aug. 2016
    10.7472/jksii.2016.17.4.79
    Keywords: Security Metric, Secure Coding, Code Quality, Security-enhanced development
  7. 27. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping
  8. 28. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -
    Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
    10.7472/jksii.2016.17.1.91
    Keywords: Mobile Security, android security, permissions, least privilege
  9. 29. Adaptive Multi-Layer Security Approach for Cyber Defense
    Seong-kee Lee, Tae-in Kang, Vol. 16, No. 5, pp. 1-10, Oct. 2015
    10.7472/jksii.2015.16.5.01
    Keywords: Cyber Defense, Multi-Layer Security Model, Adaptive Security System
  10. 30. OTACUS: Parameter-Tampering Prevention Techniques using Clean URL
    Guiseok Kim, Seungjoo Kim, Vol. 15, No. 6, pp. 55-64, Dec. 2014
    10.7472/jksii.2014.15.6.55
    Keywords: Web service Security, URL Parameter, OWASP