• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Security ]" (88)
  1. 71. A Survey of Semi-Supervised Learning in Cybersecurity: Methods, Domains, and Guidelines for Fair Evaluation
    Suchul Lee, Vol. 26, No. 6, pp. 1-12, Dec. 2025
    10.7472/jksii.2025.26.6.1
    Keywords: Semi-supervised learning, cybersecurity, Pseudo-labeling, Consistency regularization
  2. 72. A Data-Driven Study on Deriving Core Provisions for the Enactment of the Seoul Metropolitan Government Cybersecurity Ordinance
    Jiyeong Lee, Dohyun Kim, Vol. 26, No. 6, pp. 171-182, Dec. 2025
    10.7472/jksii.2025.26.6.171
    Keywords: cybersecurity, Research on Ordinance Legislation, Data-Driven Analysis, Derivation of core Provisions
  3. 73. Research on a Technology-Centric Evaluation Framework for Cyber Resilience based on MITRE D3FEND: Supplementing the Practical Application of Assessment Guidelines for Financial Institutions
    Gwang-Hyun Ahn, Dong-kyoo Shin, Vol. 26, No. 4, pp. 161-177, Aug. 2025
    10.7472/jksii.2025.26.4.161
    Keywords: Cyber Resilience, MITRE D3FEND, risk management, Security Assessment
  4. 74. Cybersecurity Risk Assessment: An Asset-Based Approach to Pre-Attack Threat Analysis
    Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
    10.7472/jksii.2025.26.3.19
    Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis
  5. 75. Design of a Security Architecture and Prototype Implementation for UxNB in 6G Mobile Networks
    Jong-hyun Kim, Kyung-min Park, Vol. 26, No. 3, pp. 35-46, Jun. 2025
    10.7472/jksii.2025.26.3.35
    Keywords: 6G Mobile Networks, UAV-carried Base Station (UxNB), Security Architecture, Prototype, Proof-of-Concept (PoC)
  6. 76. Research on the Security Intelligence & Regulation Enforcement Network(SIREN) Model with RAG
    JaeHwan Kwon, JuHo Bai, Gwang-Yong Gim, Vol. 26, No. 3, pp. 135-144, Jun. 2025
    10.7472/jksii.2025.26.3.135
    Keywords: Retrieval Augmented Generation(RAG), Large Language Model(LLM) Agent, Security Guide, Security Intelligence
  7. 77. Cybersecurity Job Market Analysis Using Online Recruitment Information
    Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
    10.7472/jksii.2025.26.3.99
    Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling
  8. 78. A Comparative Study of Deep Learning Models for Inferring Unidentified Information of External Cyber Assets
    Yoon Kyeongchan, Park Woongjin, An Myoungsik, Jang Junho, Kim Hyukang, Vol. 26, No. 2, pp. 85-95, Apr. 2025
    10.7472/jksii.2025.26.2.85
    Keywords: Cyber Security, cyber assets identification, AI, Zmap, Zgrab, Asset Information, Inference
  9. 79. An Analysis of Transfer of Training Effects in Personal Information Protection Education for Financial Institutions
  10. 80. A Comprehensive Case Study of Security Education for Information Security Personnel
    Eunsun Choi, Namje Park, Vol. 26, No. 1, pp. 93-102, Feb. 2025
    10.7472/jksii.2025.26.1.93
    Keywords: information security, InfoSec Education, Public Sector, Metaverse, case study