• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 보안 ]" (58)
  1. 51. The direction of application of the RMF-based risk management system considering interoperability
    Hyuk-Jin Kwon, Sung-Tae Kim, Ye-na Joo, Vol. 22, No. 6, pp. 83-89, Dec. 2021
    10.7472/jksii.2021.22.6.83
    Keywords: CyberSecurity System engineering, Fuzzy, Secure SDLC, RMF
  2. 52. A study on the application of mission-based weapon system cybersecurity test and evaluation
    Ik-jae Kim, Ji-won Kang, Dong-kyoo Shin, Vol. 22, No. 6, pp. 71-81, Dec. 2021
    10.7472/jksii.2021.22.6.71
    Keywords: cybersecurity test and evaluation
  3. 53. Cyber threat Detection and Response Time Modeling
    Han Choong-Hee, Han ChangHee, Vol. 22, No. 3, pp. 53-58, Jun. 2021
    10.7472/jksii.2021.22.3.53
    Keywords:
  4. 54. Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users
    Seonjin Hwang, DongHyun Ko, Taeu Bahk, Yoon-ho Choi, Vol. 21, No. 3, pp. 1-9, Jun. 2020
    10.7472/jksii.2020.21.3.1
    Keywords: blockchain platform, Privacy, Blockchain Securicy, Ethereum
  5. 55. A Study of Machine Learning based Hardware Trojans Detection Mechanisms for FPGAs
    Jaedong Jang, Mingi Cho, Yezee Seo, Seyeon Jeong, Taekyoung Kwon, Vol. 21, No. 2, pp. 109-119, Apr. 2020
    10.7472/jksii.2020.21.2.109
    Keywords: FPGA, Hardware Security, Hardware Trojan
  6. 56. CFI Approach to Defend against GOT Overwrite Attacks
    Seunghoon Jeong, Jaejoon Hwang, Hyukjin Kwon, Dongkyoo Shin, Vol. 21, No. 1, pp. 179-190, Feb. 2020
    10.7472/jksii.2020.21.1.179
    Keywords: Control Flow Integrity, GOT/PLT, linking and loading, Security
  7. 57. A Study on the Analysis and Solutions of the Blockchain Security Issues
    Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
    10.7472/jksii.2019.20.4.01
    Keywords: Blockchain, access control, Security, Privacy
  8. 58. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
    Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
    10.7472/jksii.2019.20.1.01
    Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail