A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects
Won-Young Lee, Journal of Internet Computing and Services, Vol. 25, No. 6, pp. 61-69, Dec. 2024
Keywords: K-RMF, RMF, Security plan, Weapon system security plan, Cyber Security
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Lee, W. (2024). A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects. Journal of Internet Computing and Services, 25(6), 61-69. DOI: 10.7472/jksii.2024.25.6.61.
[IEEE Style]
W. Lee, "A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects," Journal of Internet Computing and Services, vol. 25, no. 6, pp. 61-69, 2024. DOI: 10.7472/jksii.2024.25.6.61.
[ACM Style]
Won-Young Lee. 2024. A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects. Journal of Internet Computing and Services, 25, 6, (2024), 61-69. DOI: 10.7472/jksii.2024.25.6.61.

