Digital Library
Search: "[ keyword: Security ]" (88)
-
61. A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money launderingHeejung Kang, Hye Ri Kim, Seng-phil Hong, Vol. 19, No. 5, pp. 1-11, Oct. 2018
10.7472/jksii.2018.19.5.1
Keywords: Blockchain, Smart Contract, AML, Security -
Su-min Park, Man-pyo Hong, Tae-shik Shon, Jin Kwak, Vol. 17, No. 6, pp. 81-92, Dec. 2016
10.7472/jksii.2016.17.6.81
Keywords: Cooperative Intelligent Transport Systems, Connected car, VANET, Privacy, Security -
Dongsu Seo, Vol. 17, No. 4, pp. 79-86, Aug. 2016
10.7472/jksii.2016.17.4.79
Keywords: Security Metric, Secure Coding, Code Quality, Security-enhanced development -
Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
10.7472/jksii.2016.17.3.11
Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping -
Younsung Choi, Oh-Geol Kwon, Dongho Won, Vol. 17, No. 2, pp. 77-86, Apr. 2016
10.7472/jksii.2016.17.2.77
Keywords: Internet cookie technology, Personal information security, Privacy, Right to be forgotten -
66. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
10.7472/jksii.2016.17.1.91
Keywords: Mobile Security, android security, permissions, least privilege -
Sunjun Hwang, Vol. 27, No. 1, pp. 201-212, Feb. 2026
10.7472/jksii.2026.27.1.201
Keywords: Quantum Computing, Diffusion models, Adversarial attack, AI Security, Quantum Noise -
Jongcheon Choi, Sangwoo Park, Bumshik Park, Seungho Baek, Vol. 27, No. 1, pp. 189-200, Feb. 2026
10.7472/jksii.2026.27.1.189
Keywords: AI Platform, Artificial intelligence, Multi Modal, System Reliability, Security -
Suk Ho Seo, Eun Jin Choi, Seungil Noh, Hyeon Ho Lee, Vol. 27, No. 1, pp. 147-155, Feb. 2026
10.7472/jksii.2026.27.1.147
Keywords: K-RMF, System security plan, Research and Development, Cyber Security, Weapon System -
Joon-soo Shim, Chan-ho Lee, Jong-geun Choi, Hyuk-jin Kwon, Vol. 27, No. 1, pp. 27-38, Feb. 2026
10.7472/jksii.2026.27.1.27
Keywords: Malware classification, Transfer Learning, Deep Learning, ConvNeXt, Dilated Convolution, channel attention, Low-label Learning, Image-based Malware Detection, Generalization performance, cybersecurity




