• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 보안 ]" (63)
  1. 31. A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare
  2. 32. A Design and Implementation of Information Security Management and Audit System for Government Agencies
    Yong-Joon Jun, Gi-Hwan Cho, Won-Kyu Kim, Vol. 7, No. 5, pp. 81-94, Oct. 2006
    Keywords: BS7799, ISMS, Control Object
  3. 33. A Study on Improving the Reliability of AI Platforms for Multimodal Battlefield Situational Awareness
    Jongcheon Choi, Sangwoo Park, Bumshik Park, Seungho Baek, Vol. 27, No. 1, pp. 189-200, Feb. 2026
    10.7472/jksii.2026.27.1.189
    Keywords: AI Platform, Artificial intelligence, Multi Modal, System Reliability, Security
  4. 34. A Research for the Composition of K-RMF System Security Plan Applied Research and Development Project
    Suk Ho Seo, Eun Jin Choi, Seungil Noh, Hyeon Ho Lee, Vol. 27, No. 1, pp. 147-155, Feb. 2026
    10.7472/jksii.2026.27.1.147
    Keywords: K-RMF, System security plan, Research and Development, Cyber Security, Weapon System
  5. 35. Malware Image Classification with Dilated Convolution and Channel Attention in ConvNeXt-Tiny
  6. 36. A Data-Driven Study on Deriving Core Provisions for the Enactment of the Seoul Metropolitan Government Cybersecurity Ordinance
    Jiyeong Lee, Dohyun Kim, Vol. 26, No. 6, pp. 171-182, Dec. 2025
    10.7472/jksii.2025.26.6.171
    Keywords: cybersecurity, Research on Ordinance Legislation, Data-Driven Analysis, Derivation of core Provisions
  7. 37. A Survey of Semi-Supervised Learning in Cybersecurity: Methods, Domains, and Guidelines for Fair Evaluation
    Suchul Lee, Vol. 26, No. 6, pp. 1-12, Dec. 2025
    10.7472/jksii.2025.26.6.1
    Keywords: Semi-supervised learning, cybersecurity, Pseudo-labeling, Consistency regularization
  8. 38. Research on the Security Intelligence & Regulation Enforcement Network(SIREN) Model with RAG
    JaeHwan Kwon, JuHo Bai, Gwang-Yong Gim, Vol. 26, No. 3, pp. 135-144, Jun. 2025
    10.7472/jksii.2025.26.3.135
    Keywords: Retrieval Augmented Generation(RAG), Large Language Model(LLM) Agent, Security Guide, Security Intelligence
  9. 39. Cybersecurity Job Market Analysis Using Online Recruitment Information
    Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
    10.7472/jksii.2025.26.3.99
    Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling
  10. 40. Design of a Security Architecture and Prototype Implementation for UxNB in 6G Mobile Networks
    Jong-hyun Kim, Kyung-min Park, Vol. 26, No. 3, pp. 35-46, Jun. 2025
    10.7472/jksii.2025.26.3.35
    Keywords: 6G Mobile Networks, UAV-carried Base Station (UxNB), Security Architecture, Prototype, Proof-of-Concept (PoC)