• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 보안 ]" (63)
  1. 51. Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling
    Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
    10.7472/jksii.2022.23.6.27
    Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement
  2. 52. Cyberattack Goal Classification Based on MITRE ATT&CK: CIA Labeling
    Chan Ho Shin, Chang-hee Choi, Vol. 23, No. 6, pp. 15-26, Dec. 2022
    10.7472/jksii.2022.23.6.15
    Keywords: Labeling, Machine Learning, Deep Learning, MITRE ATT&CK, TTP, CIA triad
  3. 53. A study on the cyber common operation picture for situational awareness in cyberspace
  4. 54. Development of Internet of Things Sensor-based Information System Robust to Security Attack
    Junhyeok Yun, Mihui Kim, Vol. 23, No. 4, pp. 95-107, Aug. 2022
    10.7472/jksii.2022.23.4.95
    Keywords: Internet of Things, Information System, Network Security, Big-Data
  5. 55. FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication
    Min-goo Kang, Vol. 23, No. 4, pp. 65-72, Aug. 2022
    10.7472/jksii.2022.23.4.65
    Keywords: Passwordless security, Multi-Factor Authentication(MFA), Zero Trust, FIDO transaction, Secondary user authentication
  6. 56. Deep Learning Based Rescue Requesters Detection Algorithm for Physical Security in Disaster Sites
    Da-hyeon Kim, Man-bok Park, Jun-ho Ahn, Vol. 23, No. 4, pp. 57-64, Aug. 2022
    10.7472/jksii.2022.23.4.57
    Keywords: Risk of building, Physical Security, Deep Learning, Disaster sites, Object Detection
  7. 57. Study on security requirements for the web based operation system of a shipping company
    Up Chung, Jongsub Moon, Vol. 23, No. 1, pp. 49-68, Feb. 2022
    10.7472/jksii.2022.23.1.49
    Keywords: Shipping company, Threat modeling, STRIDE, Security requirement
  8. 58. A research on cyber target importance ranking using PageRank algorithm
    Kook-jin Kim, Seung-hwan Oh, Dong-hwan Lee, Haeng-rok Oh, Jung-sik Lee, Dong-kyoo Shin, Vol. 22, No. 6, pp. 115-127, Dec. 2021
    10.7472/jksii.2021.22.6.115
    Keywords: Cyber Operation, Cyber Target, Cyber Security, Pagerank Algorithm
  9. 59. The direction of application of the RMF-based risk management system considering interoperability
    Hyuk-Jin Kwon, Sung-Tae Kim, Ye-na Joo, Vol. 22, No. 6, pp. 83-89, Dec. 2021
    10.7472/jksii.2021.22.6.83
    Keywords: CyberSecurity System engineering, Fuzzy, Secure SDLC, RMF
  10. 60. A study on the application of mission-based weapon system cybersecurity test and evaluation
    Ik-jae Kim, Ji-won Kang, Dong-kyoo Shin, Vol. 22, No. 6, pp. 71-81, Dec. 2021
    10.7472/jksii.2021.22.6.71
    Keywords: cybersecurity test and evaluation