Digital Library
Search: "[ keyword: 보안 ]" (63)
-
Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
10.7472/jksii.2025.26.3.19
Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis -
Yoon Kyeongchan, Park Woongjin, An Myoungsik, Jang Junho, Kim Hyukang, Vol. 26, No. 2, pp. 85-95, Apr. 2025
10.7472/jksii.2025.26.2.85
Keywords: Cyber Security, cyber assets identification, AI, Zmap, Zgrab, Asset Information, Inference -
Sukjoon Yoon, Cheol-gyu Yi, Jiwon Kang, Vol. 26, No. 1, pp. 211-220, Feb. 2025
10.7472/jksii.2025.26.1.211
Keywords: Space system, Cyber Security, K-RMF, Space Overlays, security controls -
Moonseong Kim, Hyung-Jin Lim, Vol. 25, No. 6, pp. 81-86, Dec. 2024
10.7472/jksii.2024.25.6.81
Keywords: Digital wallets, Digital ID wallets, Digital payment wallets, Digital assets, Security -
Gwang-Hyun Ahn, Ji-su Jang, Hanhee Lee, Ji-Won Kang, Dong-kyoo Shin, Vol. 25, No. 6, pp. 107-129, Dec. 2024
10.7472/jksii.2024.25.6.107
Keywords: Cyber Resilience, Zero Trust, MITRE ATT&CK, Security Assessment, risk management -
Hoon Shin, Jaeyeong Jeong, Kyu-min Cho, Jae-il Lee, Dong-kyoo Shin, Vol. 25, No. 6, pp. 131-145, Dec. 2024
10.7472/jksii.2024.25.6.131
Keywords: AI Security, Artificial intelligence, Machine Learning, Deep Learning, CNN, DDoS, DrDoS, image processing, Image Classification -
Won-Young Lee, Vol. 25, No. 6, pp. 61-69, Dec. 2024
10.7472/jksii.2024.25.6.61
Keywords: K-RMF, RMF, Security plan, Weapon system security plan, Cyber Security -
Jae-yoon Hwang, Hyuk-jin Kwon, Vol. 25, No. 1, pp. 123-136, Feb. 2024
10.7472/jksii.2024.25.1.123
Keywords: Cybersecurity Audit, Compliance, RMF, CMMC -
Byeong-jun Park, Cheol-jung Kim, Vol. 25, No. 1, pp. 157-166, Feb. 2024
10.7472/jksii.2024.25.1.157
Keywords: Army TIGER, Drone, robot, unmanned vehicle, AI, Cloud Center, Cyber Defense -
Kyu-min Cho, Jae-il Lee, Dong-kyoo Shin, Vol. 25, No. 1, pp. 167-176, Feb. 2024
10.7472/jksii.2024.25.1.167
Keywords: Chatbot, AI Security, Artificial intelligence, Security Requirements, implementation model, security threat analysis, security evaluation criteria




