• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Security ]" (82)
  1. 61. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -
    Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
    10.7472/jksii.2016.17.1.91
    Keywords: Mobile Security, android security, permissions, least privilege
  2. 62. Adaptive Multi-Layer Security Approach for Cyber Defense
    Seong-kee Lee, Tae-in Kang, Vol. 16, No. 5, pp. 1-10, Oct. 2015
    10.7472/jksii.2015.16.5.01
    Keywords: Cyber Defense, Multi-Layer Security Model, Adaptive Security System
  3. 63. An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service
    Hexin Yu, Suaini Sura, Jong-chang Ahn, Vol. 16, No. 3, pp. 79-94, Jun. 2015
    10.7472/jksii.2015.16.3.79
    Keywords: Cloud service, Persistent usage intention, External variable, Brand influence, Perceived security
  4. 64. Research on a Technology-Centric Evaluation Framework for Cyber Resilience based on MITRE D3FEND: Supplementing the Practical Application of Assessment Guidelines for Financial Institutions
    Gwang-Hyun Ahn, Dong-kyoo Shin, Vol. 26, No. 4, pp. 161-177, Aug. 2025
    10.7472/jksii.2025.26.4.161
    Keywords: Cyber Resilience, MITRE D3FEND, risk management, Security Assessment
  5. 65. Research on the Security Intelligence & Regulation Enforcement Network(SIREN) Model with RAG
    JaeHwan Kwon, JuHo Bai, Gwang-Yong Gim, Vol. 26, No. 3, pp. 135-144, Jun. 2025
    10.7472/jksii.2025.26.3.135
    Keywords: Retrieval Augmented Generation(RAG), Large Language Model(LLM) Agent, Security Guide, Security Intelligence
  6. 66. Cybersecurity Job Market Analysis Using Online Recruitment Information
    Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
    10.7472/jksii.2025.26.3.99
    Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling
  7. 67. Design of a Security Architecture and Prototype Implementation for UxNB in 6G Mobile Networks
    Jong-hyun Kim, Kyung-min Park, Vol. 26, No. 3, pp. 35-46, Jun. 2025
    10.7472/jksii.2025.26.3.35
    Keywords: 6G Mobile Networks, UAV-carried Base Station (UxNB), Security Architecture, Prototype, Proof-of-Concept (PoC)
  8. 68. Cybersecurity Risk Assessment: An Asset-Based Approach to Pre-Attack Threat Analysis
    Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
    10.7472/jksii.2025.26.3.19
    Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis
  9. 69. An Analysis of Transfer of Training Effects in Personal Information Protection Education for Financial Institutions
  10. 70. A Comparative Study of Deep Learning Models for Inferring Unidentified Information of External Cyber Assets
    Yoon Kyeongchan, Park Woongjin, An Myoungsik, Jang Junho, Kim Hyukang, Vol. 26, No. 2, pp. 85-95, Apr. 2025
    10.7472/jksii.2025.26.2.85
    Keywords: Cyber Security, cyber assets identification, AI, Zmap, Zgrab, Asset Information, Inference