• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 보안 ]" (58)
  1. 31. Cybersecurity Job Market Analysis Using Online Recruitment Information
    Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
    10.7472/jksii.2025.26.3.99
    Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling
  2. 32. Design of a Security Architecture and Prototype Implementation for UxNB in 6G Mobile Networks
    Jong-hyun Kim, Kyung-min Park, Vol. 26, No. 3, pp. 35-46, Jun. 2025
    10.7472/jksii.2025.26.3.35
    Keywords: 6G Mobile Networks, UAV-carried Base Station (UxNB), Security Architecture, Prototype, Proof-of-Concept (PoC)
  3. 33. Cybersecurity Risk Assessment: An Asset-Based Approach to Pre-Attack Threat Analysis
    Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
    10.7472/jksii.2025.26.3.19
    Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis
  4. 34. A Comparative Study of Deep Learning Models for Inferring Unidentified Information of External Cyber Assets
    Yoon Kyeongchan, Park Woongjin, An Myoungsik, Jang Junho, Kim Hyukang, Vol. 26, No. 2, pp. 85-95, Apr. 2025
    10.7472/jksii.2025.26.2.85
    Keywords: Cyber Security, cyber assets identification, AI, Zmap, Zgrab, Asset Information, Inference
  5. 35. A Study of Overlay for Security Controls of K-RMF on Space System
    Sukjoon Yoon, Cheol-gyu Yi, Jiwon Kang, Vol. 26, No. 1, pp. 211-220, Feb. 2025
    10.7472/jksii.2025.26.1.211
    Keywords: Space system, Cyber Security, K-RMF, Space Overlays, security controls
  6. 36. A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects
    Won-Young Lee, Vol. 25, No. 6, pp. 61-69, Dec. 2024
    10.7472/jksii.2024.25.6.61
    Keywords: K-RMF, RMF, Security plan, Weapon system security plan, Cyber Security
  7. 37. Research on Cyber Resilience Assessment Metrics Through the Integrated Implementation of Zero Trust and MITRE ATT&CK
    Gwang-Hyun Ahn, Ji-su Jang, Hanhee Lee, Ji-Won Kang, Dong-kyoo Shin, Vol. 25, No. 6, pp. 107-129, Dec. 2024
    10.7472/jksii.2024.25.6.107
    Keywords: Cyber Resilience, Zero Trust, MITRE ATT&CK, Security Assessment, risk management
  8. 38. Research on DNS DRDoS Detection Methods Using CNN
  9. 39. Analysis of Electronic Wallet Types and Security Features
    Moonseong Kim, Hyung-Jin Lim, Vol. 25, No. 6, pp. 81-86, Dec. 2024
    10.7472/jksii.2024.25.6.81
    Keywords: Digital wallets, Digital ID wallets, Digital payment wallets, Digital assets, Security
  10. 40. A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity
    Jae-yoon Hwang, Hyuk-jin Kwon, Vol. 25, No. 1, pp. 123-136, Feb. 2024
    10.7472/jksii.2024.25.1.123
    Keywords: Cybersecurity Audit, Compliance, RMF, CMMC