• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Security ]" (82)
  1. 71. A Study of Overlay for Security Controls of K-RMF on Space System
    Sukjoon Yoon, Cheol-gyu Yi, Jiwon Kang, Vol. 26, No. 1, pp. 211-220, Feb. 2025
    10.7472/jksii.2025.26.1.211
    Keywords: Space system, Cyber Security, K-RMF, Space Overlays, security controls
  2. 72. A Comprehensive Case Study of Security Education for Information Security Personnel
    Eunsun Choi, Namje Park, Vol. 26, No. 1, pp. 93-102, Feb. 2025
    10.7472/jksii.2025.26.1.93
    Keywords: information security, InfoSec Education, Public Sector, Metaverse, case study
  3. 73. A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects
    Won-Young Lee, Vol. 25, No. 6, pp. 61-69, Dec. 2024
    10.7472/jksii.2024.25.6.61
    Keywords: K-RMF, RMF, Security plan, Weapon system security plan, Cyber Security
  4. 74. Analysis of Electronic Wallet Types and Security Features
    Moonseong Kim, Hyung-Jin Lim, Vol. 25, No. 6, pp. 81-86, Dec. 2024
    10.7472/jksii.2024.25.6.81
    Keywords: Digital wallets, Digital ID wallets, Digital payment wallets, Digital assets, Security
  5. 75. Research on DNS DRDoS Detection Methods Using CNN
  6. 76. Research on Cyber Resilience Assessment Metrics Through the Integrated Implementation of Zero Trust and MITRE ATT&CK
    Gwang-Hyun Ahn, Ji-su Jang, Hanhee Lee, Ji-Won Kang, Dong-kyoo Shin, Vol. 25, No. 6, pp. 107-129, Dec. 2024
    10.7472/jksii.2024.25.6.107
    Keywords: Cyber Resilience, Zero Trust, MITRE ATT&CK, Security Assessment, risk management
  7. 77. A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity
    Jae-yoon Hwang, Hyuk-jin Kwon, Vol. 25, No. 1, pp. 123-136, Feb. 2024
    10.7472/jksii.2024.25.1.123
    Keywords: Cybersecurity Audit, Compliance, RMF, CMMC
  8. 78. Analysis of the Security Requirements of the Chatbot Service Implementation Model
  9. 79. An AI-Based Prevention Program to Protect Youth from Cybergrooming
    Kee Jeong Kim, Lifu Huang, Jin-Hee Cho, Vol. 24, No. 5, pp. 67-73, Oct. 2023
    10.7472/jksii.2023.24.5.67
    Keywords: Artificial intelligence (AI)-based simulation, Cybergrooming, cybersecurity, Children and Youth
  10. 80. Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy
    Gee-hee Yun, Kyoung-jin Kim, Vol. 24, No. 4, pp. 15-24, Aug. 2023
    10.7472/jksii.2023.24.4.15
    Keywords: DTx (Digital Therapeutics), MITRE ATT&CK Mobile, Mobile App Security, Privacy