Browse > Article List

논문
1 Enhanced Security Measurement of Web Application Testing by Outsourcing
Choi, Kyong-Ho;Lee, DongHwi; / Korea convergence Security Association , v.15, no.4, pp.3-9,
2 Software Engineering Research Trends Meta Analyzing for Safety Software Development on IoT Environment
Kim, Yanghoon;Park, Wonhyung;Kim, Guk-boh; / Korea convergence Security Association , v.15, no.4, pp.11-18,
3 A Method for Describing the Information of the Broadcasting Program's Time-Slots and Its Application to a Data Service
KO, Kwangil; / Korea convergence Security Association , v.15, no.4, pp.19-25,
4 Analysis of Information Security Technology Development for ICT Convergence Services
Kim, Dong-Chul; / Korea convergence Security Association , v.15, no.4, pp.27-33,
5 A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration
Noh, SiChoon;Kim, Jeom goo; / Korea convergence Security Association , v.15, no.4, pp.35-41,
6 The Enhancement Strategy on National Cyber Capability Using Hybrid Methodology of AHP and TOPSIS
Bae, Sunha;Park, SangDon;Kim, So Jeong; / Korea convergence Security Association , v.15, no.4, pp.43-55,
7 A Study on the Implementation of the Privacy Impact Assessment Management System for Enterprise
Sun, Jae Hoon;Kim, Yong Ho; / Korea convergence Security Association , v.15, no.4, pp.57-63,
8 A Study on Measures for Strengthening Cybersecurity through Analysis of Cyberattack Response
Yoon, Oh Jun;Bae, Kwang Yong;Kim, Jae Hong;Seo, Hyung Jun;Shin, Yong Tae; / Korea convergence Security Association , v.15, no.4, pp.65-72,
9 A study on Activation Measures of Local Mobile Easy-to-use Payment
Jeong, Gi Seog; / Korea convergence Security Association , v.15, no.4, pp.73-82,
10 Naming Scheme for Standardization of Detection Rule on Security Monitoring Threat Event
Park, Wonhyung;Kim, Yanghoon;Lim, YoungWhan;Ahn, Sungjin; / Korea convergence Security Association , v.15, no.4, pp.83-90,
11 Design of the secure data management system using homomorphic encryption
Cha, Hyun-Jong;Yang, Ho-Kyung;Choi, Kang-Im;Ryou, Hwang-Bin;Shin, Hyo-Young; / Korea convergence Security Association , v.15, no.4, pp.91-97,
12 A Study on Selecting and Operating Educational Department in Cyber Security Major by Analyzing Workforce Framework
Lim, Won Gyu;Shin, Hyuk;Ahn, Seong Jin; / Korea convergence Security Association , v.15, no.4, pp.99-105,
13 Study of applicable security tunneling technique for military wireless network
Kim, Yun-young;Namkung, Seung-Pil; / Korea convergence Security Association , v.15, no.4, pp.107-112,
14 A study of Big-data analysis for relationship between students
Hwang, Deuk-Young;Kim, Jin-Mook; / Korea convergence Security Association , v.15, no.4, pp.113-119,
15 A Study on Information Security Consulting Method according to Type of Company
Lee, Su-youn; / Korea convergence Security Association , v.15, no.4, pp.121-126,
16 A Reanalysis and Evaluation of the Chuncheon District Battle In the Early Part of the Korean War
LEE, SUNG CHOON; / Korea convergence Security Association , v.15, no.4, pp.127-139,
17 Study on the Korea Information System of Criminal Justice Services
Shin, Sung Shik; / Korea convergence Security Association , v.15, no.4, pp.141-147,
18 Behavior and Motor Skill of Children with Intellectual Disabilities Participating Functional Games
Kang, Sunyoung; / Korea convergence Security Association , v.15, no.4, pp.149-154,