|
1 |
Enhanced Security Measurement of Web Application Testing by Outsourcing
Choi, Kyong-Ho;Lee, DongHwi;
/
Korea convergence Security Association
, v.15, no.4, pp.3-9,
|
|
2 |
Software Engineering Research Trends Meta Analyzing for Safety Software Development on IoT Environment
Kim, Yanghoon;Park, Wonhyung;Kim, Guk-boh;
/
Korea convergence Security Association
, v.15, no.4, pp.11-18,
|
|
3 |
A Method for Describing the Information of the Broadcasting Program's Time-Slots and Its Application to a Data Service
KO, Kwangil;
/
Korea convergence Security Association
, v.15, no.4, pp.19-25,
|
|
4 |
Analysis of Information Security Technology Development for ICT Convergence Services
Kim, Dong-Chul;
/
Korea convergence Security Association
, v.15, no.4, pp.27-33,
|
|
5 |
A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration
Noh, SiChoon;Kim, Jeom goo;
/
Korea convergence Security Association
, v.15, no.4, pp.35-41,
|
|
6 |
The Enhancement Strategy on National Cyber Capability Using Hybrid Methodology of AHP and TOPSIS
Bae, Sunha;Park, SangDon;Kim, So Jeong;
/
Korea convergence Security Association
, v.15, no.4, pp.43-55,
|
|
7 |
A Study on the Implementation of the Privacy Impact Assessment Management System for Enterprise
Sun, Jae Hoon;Kim, Yong Ho;
/
Korea convergence Security Association
, v.15, no.4, pp.57-63,
|
|
8 |
A Study on Measures for Strengthening Cybersecurity through Analysis of Cyberattack Response
Yoon, Oh Jun;Bae, Kwang Yong;Kim, Jae Hong;Seo, Hyung Jun;Shin, Yong Tae;
/
Korea convergence Security Association
, v.15, no.4, pp.65-72,
|
|
9 |
A study on Activation Measures of Local Mobile Easy-to-use Payment
Jeong, Gi Seog;
/
Korea convergence Security Association
, v.15, no.4, pp.73-82,
|
|
10 |
Naming Scheme for Standardization of Detection Rule on Security Monitoring Threat Event
Park, Wonhyung;Kim, Yanghoon;Lim, YoungWhan;Ahn, Sungjin;
/
Korea convergence Security Association
, v.15, no.4, pp.83-90,
|
|
11 |
Design of the secure data management system using homomorphic encryption
Cha, Hyun-Jong;Yang, Ho-Kyung;Choi, Kang-Im;Ryou, Hwang-Bin;Shin, Hyo-Young;
/
Korea convergence Security Association
, v.15, no.4, pp.91-97,
|
|
12 |
A Study on Selecting and Operating Educational Department in Cyber Security Major by Analyzing Workforce Framework
Lim, Won Gyu;Shin, Hyuk;Ahn, Seong Jin;
/
Korea convergence Security Association
, v.15, no.4, pp.99-105,
|
|
13 |
Study of applicable security tunneling technique for military wireless network
Kim, Yun-young;Namkung, Seung-Pil;
/
Korea convergence Security Association
, v.15, no.4, pp.107-112,
|
|
14 |
A study of Big-data analysis for relationship between students
Hwang, Deuk-Young;Kim, Jin-Mook;
/
Korea convergence Security Association
, v.15, no.4, pp.113-119,
|
|
15 |
A Study on Information Security Consulting Method according to Type of Company
Lee, Su-youn;
/
Korea convergence Security Association
, v.15, no.4, pp.121-126,
|
|
16 |
A Reanalysis and Evaluation of the Chuncheon District Battle In the Early Part of the Korean War
LEE, SUNG CHOON;
/
Korea convergence Security Association
, v.15, no.4, pp.127-139,
|
|
17 |
Study on the Korea Information System of Criminal Justice Services
Shin, Sung Shik;
/
Korea convergence Security Association
, v.15, no.4, pp.141-147,
|
|
18 |
Behavior and Motor Skill of Children with Intellectual Disabilities Participating Functional Games
Kang, Sunyoung;
/
Korea convergence Security Association
, v.15, no.4, pp.149-154,
|
|