Browse > Article List

논문
1 An Implementation of Secure boot Using TPM in Embedded System
Kim, Jin-Woo;Lee, Sang-Gil;Ko, Jae-Yong;Lee, Cheol-Hoon; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.949-960,
2 Implementation of Covert Channel Using Mutex Shared Resources in Virtual Machine
Ko, Ki-Wan;Choi, Hyoung-Kee; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.961-971,
3 A Study on Software Security Vulnerability Detection Using Coding Standard Searching Technique
Jang, Young-Su; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.973-983,
4 Study on Selftest Requirements in Cryptographic Module Validation Program with FIPS-OpenSSL Source Code Analysis
Seo, Seog Chung; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.985-996,
5 Implementation and Analysis of Power Analysis Attack Using Multi-Layer Perceptron Method
Kwon, Hongpil;Bae, DaeHyeon;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.997-1006,
6 Rank-level Fusion Method That Improves Recognition Rate by Using Correlation Coefficient
Ahn, Jung-ho;Jeong, Jae Yeol;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1007-1017,
7 Development of Vaccine with Artificial Intelligence: By Analyzing OP Code Features Based on Text and Image Dataset
Choi, Hyo-Kyung;Lee, Se-Eun;Lee, Ju-Hyun;Hong, Rae-Young;Choi, Won-Hyok;Kim, Hyung-Jong; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1019-1026,
8 Detection of System Abnormal State by Cyber Attack
Yoon, Yeo-jeong;Jung, You-jin; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1027-1037,
9 Static Analysis Based on Backward Control Flow Graph Generation Method Model for Program Analysis
Park, Sunghyun;Kim, Yeonsu;Noh, Bongnam; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1039-1048,
10 A Method of Digital Signature Using FIDO2 CTAP
Cho, Han-koo;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1049-1062,
11 Security Threats Analysis and Security Requirement for Industrial Wireless Protocols : ISA 100.11a and WirelessHART
Jeong, Jae-Han;Kwon, Sung-Moon;Shon, Tae-Shik; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1063-1075,
12 Analysis of the Application Method of Cyber Security Control to Develop Regulatory Requirement for Digital Assets in NPP
Kim, In-kyung;Byun, Ye-eun;Kwon, Kook-heui; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1077-1088,
13 Analysis of U.S. Supply Chain Security Management System
Son, Hyo-hyun;Kim, Kwang-jun;Lee, Man-hee; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1089-1097,
14 A study on Communication Robustness Testing for Industrial Control Devices
Park, Kyungmi;Shin, Donghoon;Kim, WooNyon;Kim, SinKyu; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1099-1116,
15 A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection
Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1117-1132,
16 A Proposal for the Definition of Insider (Threat) and Mitigation for the Korea Military Environment
Won, Kyung-Su;Kim, Seung-Joo; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1133-1151,
17 A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System
Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1153-1165,
18 A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database
Hyun, Suk-woo;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1167-1177,
19 Quantitative Cyber Security Scoring System Based on Risk Assessment Model
Kim, Inkyung;Park, Namje; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1179-1189,
20 A Critical Review on Data Localization in the Financial Cloud
Jang, Woo-Kyung;Kim, In-Seok; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1191-1204,
21 A Study on Privacy Protection in Financial Mydata Policy through Comparison of the EU's PSD2
Song, Mi-Jung;Kim, In-Seok; / Korea Institute of Information Security and Cryptology , v.29, no.5, pp.1205-1219,