Digital Library
Search: "[ keyword: Security ]" (82)
-
61. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
10.7472/jksii.2016.17.1.91
Keywords: Mobile Security, android security, permissions, least privilege -
Seong-kee Lee, Tae-in Kang, Vol. 16, No. 5, pp. 1-10, Oct. 2015
10.7472/jksii.2015.16.5.01
Keywords: Cyber Defense, Multi-Layer Security Model, Adaptive Security System -
Hexin Yu, Suaini Sura, Jong-chang Ahn, Vol. 16, No. 3, pp. 79-94, Jun. 2015
10.7472/jksii.2015.16.3.79
Keywords: Cloud service, Persistent usage intention, External variable, Brand influence, Perceived security -
Gwang-Hyun Ahn, Dong-kyoo Shin, Vol. 26, No. 4, pp. 161-177, Aug. 2025
10.7472/jksii.2025.26.4.161
Keywords: Cyber Resilience, MITRE D3FEND, risk management, Security Assessment -
JaeHwan Kwon, JuHo Bai, Gwang-Yong Gim, Vol. 26, No. 3, pp. 135-144, Jun. 2025
10.7472/jksii.2025.26.3.135
Keywords: Retrieval Augmented Generation(RAG), Large Language Model(LLM) Agent, Security Guide, Security Intelligence -
Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
10.7472/jksii.2025.26.3.99
Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling -
Jong-hyun Kim, Kyung-min Park, Vol. 26, No. 3, pp. 35-46, Jun. 2025
10.7472/jksii.2025.26.3.35
Keywords: 6G Mobile Networks, UAV-carried Base Station (UxNB), Security Architecture, Prototype, Proof-of-Concept (PoC) -
Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
10.7472/jksii.2025.26.3.19
Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis -
Jihye Park, Sangtae Lee, Hangbae Chang, Vol. 26, No. 2, pp. 147-166, Apr. 2025
10.7472/jksii.2025.26.2.147
Keywords: Digital Financial Security, Personal Information Protection, Personal Information Protection Education, Transfer of Training, Structural Equation Model -
Yoon Kyeongchan, Park Woongjin, An Myoungsik, Jang Junho, Kim Hyukang, Vol. 26, No. 2, pp. 85-95, Apr. 2025
10.7472/jksii.2025.26.2.85
Keywords: Cyber Security, cyber assets identification, AI, Zmap, Zgrab, Asset Information, Inference




