|
1 |
An Implementation of Secure boot Using TPM in Embedded System
Kim, Jin-Woo;Lee, Sang-Gil;Ko, Jae-Yong;Lee, Cheol-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.949-960,
|
|
2 |
Implementation of Covert Channel Using Mutex Shared Resources in Virtual Machine
Ko, Ki-Wan;Choi, Hyoung-Kee;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.961-971,
|
|
3 |
A Study on Software Security Vulnerability Detection Using Coding Standard Searching Technique
Jang, Young-Su;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.973-983,
|
|
4 |
Study on Selftest Requirements in Cryptographic Module Validation Program with FIPS-OpenSSL Source Code Analysis
Seo, Seog Chung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.985-996,
|
|
5 |
Implementation and Analysis of Power Analysis Attack Using Multi-Layer Perceptron Method
Kwon, Hongpil;Bae, DaeHyeon;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.997-1006,
|
|
6 |
Rank-level Fusion Method That Improves Recognition Rate by Using Correlation Coefficient
Ahn, Jung-ho;Jeong, Jae Yeol;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1007-1017,
|
|
7 |
Development of Vaccine with Artificial Intelligence: By Analyzing OP Code Features Based on Text and Image Dataset
Choi, Hyo-Kyung;Lee, Se-Eun;Lee, Ju-Hyun;Hong, Rae-Young;Choi, Won-Hyok;Kim, Hyung-Jong;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1019-1026,
|
|
8 |
Detection of System Abnormal State by Cyber Attack
Yoon, Yeo-jeong;Jung, You-jin;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1027-1037,
|
|
9 |
Static Analysis Based on Backward Control Flow Graph Generation Method Model for Program Analysis
Park, Sunghyun;Kim, Yeonsu;Noh, Bongnam;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1039-1048,
|
|
10 |
A Method of Digital Signature Using FIDO2 CTAP
Cho, Han-koo;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1049-1062,
|
|
11 |
Security Threats Analysis and Security Requirement for Industrial Wireless Protocols : ISA 100.11a and WirelessHART
Jeong, Jae-Han;Kwon, Sung-Moon;Shon, Tae-Shik;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1063-1075,
|
|
12 |
Analysis of the Application Method of Cyber Security Control to Develop Regulatory Requirement for Digital Assets in NPP
Kim, In-kyung;Byun, Ye-eun;Kwon, Kook-heui;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1077-1088,
|
|
13 |
Analysis of U.S. Supply Chain Security Management System
Son, Hyo-hyun;Kim, Kwang-jun;Lee, Man-hee;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1089-1097,
|
|
14 |
A study on Communication Robustness Testing for Industrial Control Devices
Park, Kyungmi;Shin, Donghoon;Kim, WooNyon;Kim, SinKyu;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1099-1116,
|
|
15 |
A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection
Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1117-1132,
|
|
16 |
A Proposal for the Definition of Insider (Threat) and Mitigation for the Korea Military Environment
Won, Kyung-Su;Kim, Seung-Joo;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1133-1151,
|
|
17 |
A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System
Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1153-1165,
|
|
18 |
A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database
Hyun, Suk-woo;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1167-1177,
|
|
19 |
Quantitative Cyber Security Scoring System Based on Risk Assessment Model
Kim, Inkyung;Park, Namje;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1179-1189,
|
|
20 |
A Critical Review on Data Localization in the Financial Cloud
Jang, Woo-Kyung;Kim, In-Seok;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1191-1204,
|
|
21 |
A Study on Privacy Protection in Financial Mydata Policy through Comparison of the EU's PSD2
Song, Mi-Jung;Kim, In-Seok;
/
Korea Institute of Information Security and Cryptology
, v.29, no.5, pp.1205-1219,
|
|