Digital Library
Search: "[ keyword: Security ]" (88)
-
Suchul Lee, Vol. 26, No. 6, pp. 1-12, Dec. 2025
10.7472/jksii.2025.26.6.1
Keywords: Semi-supervised learning, cybersecurity, Pseudo-labeling, Consistency regularization -
Jiyeong Lee, Dohyun Kim, Vol. 26, No. 6, pp. 171-182, Dec. 2025
10.7472/jksii.2025.26.6.171
Keywords: cybersecurity, Research on Ordinance Legislation, Data-Driven Analysis, Derivation of core Provisions -
Gwang-Hyun Ahn, Dong-kyoo Shin, Vol. 26, No. 4, pp. 161-177, Aug. 2025
10.7472/jksii.2025.26.4.161
Keywords: Cyber Resilience, MITRE D3FEND, risk management, Security Assessment -
Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
10.7472/jksii.2025.26.3.19
Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis -
Jong-hyun Kim, Kyung-min Park, Vol. 26, No. 3, pp. 35-46, Jun. 2025
10.7472/jksii.2025.26.3.35
Keywords: 6G Mobile Networks, UAV-carried Base Station (UxNB), Security Architecture, Prototype, Proof-of-Concept (PoC) -
JaeHwan Kwon, JuHo Bai, Gwang-Yong Gim, Vol. 26, No. 3, pp. 135-144, Jun. 2025
10.7472/jksii.2025.26.3.135
Keywords: Retrieval Augmented Generation(RAG), Large Language Model(LLM) Agent, Security Guide, Security Intelligence -
Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
10.7472/jksii.2025.26.3.99
Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling -
Yoon Kyeongchan, Park Woongjin, An Myoungsik, Jang Junho, Kim Hyukang, Vol. 26, No. 2, pp. 85-95, Apr. 2025
10.7472/jksii.2025.26.2.85
Keywords: Cyber Security, cyber assets identification, AI, Zmap, Zgrab, Asset Information, Inference -
Jihye Park, Sangtae Lee, Hangbae Chang, Vol. 26, No. 2, pp. 147-166, Apr. 2025
10.7472/jksii.2025.26.2.147
Keywords: Digital Financial Security, Personal Information Protection, Personal Information Protection Education, Transfer of Training, Structural Equation Model -
Eunsun Choi, Namje Park, Vol. 26, No. 1, pp. 93-102, Feb. 2025
10.7472/jksii.2025.26.1.93
Keywords: information security, InfoSec Education, Public Sector, Metaverse, case study




