Digital Library
Search: "[ keyword: 보안 ]" (58)
-
Byeong-jun Park, Cheol-jung Kim, Vol. 25, No. 1, pp. 157-166, Feb. 2024
10.7472/jksii.2024.25.1.157
Keywords: Army TIGER, Drone, robot, unmanned vehicle, AI, Cloud Center, Cyber Defense -
Kyu-min Cho, Jae-il Lee, Dong-kyoo Shin, Vol. 25, No. 1, pp. 167-176, Feb. 2024
10.7472/jksii.2024.25.1.167
Keywords: Chatbot, AI Security, Artificial intelligence, Security Requirements, implementation model, security threat analysis, security evaluation criteria -
Chan Ho Shin, Chang-hee Choi, Vol. 23, No. 6, pp. 15-26, Dec. 2022
10.7472/jksii.2022.23.6.15
Keywords: Labeling, Machine Learning, Deep Learning, MITRE ATT&CK, TTP, CIA triad -
Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
10.7472/jksii.2022.23.6.27
Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement -
Kook-jin Kim, Jae-pil Youn, Suk-joon Yoon, Ji-won Kang, Kyung-shin Kim, Dong-kyoo Shin, Vol. 23, No. 5, pp. 87-101, Oct. 2022
10.7472/jksii.2022.23.5.87
Keywords: cybersecurity, Cyber Command & Control, Cyberspace, Cyber Operation, Cyber Situational Awareness, Cyber Common Operational Picture -
Min-goo Kang, Vol. 23, No. 4, pp. 65-72, Aug. 2022
10.7472/jksii.2022.23.4.65
Keywords: Passwordless security, Multi-Factor Authentication(MFA), Zero Trust, FIDO transaction, Secondary user authentication -
47. Deep Learning Based Rescue Requesters Detection Algorithm for Physical Security in Disaster SitesDa-hyeon Kim, Man-bok Park, Jun-ho Ahn, Vol. 23, No. 4, pp. 57-64, Aug. 2022
10.7472/jksii.2022.23.4.57
Keywords: Risk of building, Physical Security, Deep Learning, Disaster sites, Object Detection -
Junhyeok Yun, Mihui Kim, Vol. 23, No. 4, pp. 95-107, Aug. 2022
10.7472/jksii.2022.23.4.95
Keywords: Internet of Things, Information System, Network Security, Big-Data -
Up Chung, Jongsub Moon, Vol. 23, No. 1, pp. 49-68, Feb. 2022
10.7472/jksii.2022.23.1.49
Keywords: Shipping company, Threat modeling, STRIDE, Security requirement -
Kook-jin Kim, Seung-hwan Oh, Dong-hwan Lee, Haeng-rok Oh, Jung-sik Lee, Dong-kyoo Shin, Vol. 22, No. 6, pp. 115-127, Dec. 2021
10.7472/jksii.2021.22.6.115
Keywords: Cyber Operation, Cyber Target, Cyber Security, Pagerank Algorithm




