• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 보안 ]" (58)
  1. 41. Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack
    Byeong-jun Park, Cheol-jung Kim, Vol. 25, No. 1, pp. 157-166, Feb. 2024
    10.7472/jksii.2024.25.1.157
    Keywords: Army TIGER, Drone, robot, unmanned vehicle, AI, Cloud Center, Cyber Defense
  2. 42. Analysis of the Security Requirements of the Chatbot Service Implementation Model
  3. 43. Cyberattack Goal Classification Based on MITRE ATT&CK: CIA Labeling
    Chan Ho Shin, Chang-hee Choi, Vol. 23, No. 6, pp. 15-26, Dec. 2022
    10.7472/jksii.2022.23.6.15
    Keywords: Labeling, Machine Learning, Deep Learning, MITRE ATT&CK, TTP, CIA triad
  4. 44. Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling
    Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
    10.7472/jksii.2022.23.6.27
    Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement
  5. 45. A study on the cyber common operation picture for situational awareness in cyberspace
  6. 46. FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication
    Min-goo Kang, Vol. 23, No. 4, pp. 65-72, Aug. 2022
    10.7472/jksii.2022.23.4.65
    Keywords: Passwordless security, Multi-Factor Authentication(MFA), Zero Trust, FIDO transaction, Secondary user authentication
  7. 47. Deep Learning Based Rescue Requesters Detection Algorithm for Physical Security in Disaster Sites
    Da-hyeon Kim, Man-bok Park, Jun-ho Ahn, Vol. 23, No. 4, pp. 57-64, Aug. 2022
    10.7472/jksii.2022.23.4.57
    Keywords: Risk of building, Physical Security, Deep Learning, Disaster sites, Object Detection
  8. 48. Development of Internet of Things Sensor-based Information System Robust to Security Attack
    Junhyeok Yun, Mihui Kim, Vol. 23, No. 4, pp. 95-107, Aug. 2022
    10.7472/jksii.2022.23.4.95
    Keywords: Internet of Things, Information System, Network Security, Big-Data
  9. 49. Study on security requirements for the web based operation system of a shipping company
    Up Chung, Jongsub Moon, Vol. 23, No. 1, pp. 49-68, Feb. 2022
    10.7472/jksii.2022.23.1.49
    Keywords: Shipping company, Threat modeling, STRIDE, Security requirement
  10. 50. A research on cyber target importance ranking using PageRank algorithm
    Kook-jin Kim, Seung-hwan Oh, Dong-hwan Lee, Haeng-rok Oh, Jung-sik Lee, Dong-kyoo Shin, Vol. 22, No. 6, pp. 115-127, Dec. 2021
    10.7472/jksii.2021.22.6.115
    Keywords: Cyber Operation, Cyber Target, Cyber Security, Pagerank Algorithm