Browse > Article List

논문
1 The research of Decision Matrix design methodologies for business data protection and protection by data leveling
Shin, Dong Hyuk;Choi, Jin-Gu; / Korea convergence Security Association , v.16, no.4, pp.3-15,
2 A DDoS Attack Detection of private mobile network using Time Series Analysis
Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho; / Korea convergence Security Association , v.16, no.4, pp.17-24,
3 A Study on the Improvement Model for Invigorating Cyber Threat Information Sharing
Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae; / Korea convergence Security Association , v.16, no.4, pp.25-34,
4 Study on the college curriculum for systematic education of the domestic information security
Jeon, Jeong Hoon; / Korea convergence Security Association , v.16, no.4, pp.35-41,
5 Verification Methods of OWASP TOP 10 Security Vulnerability under Multi-Tenancy Web Site's Environments
Lee, Do Hyeon;Lee, Jong Wook;Kim, Jeom Goo; / Korea convergence Security Association , v.16, no.4, pp.43-51,
6 Developing Reference Model for National Cybersecurity Strategy Establishment and Improvement
YUN, Jaesuk; / Korea convergence Security Association , v.16, no.4, pp.53-61,
7 Status and promoting of fitness IT
Kang, Sunyoung;Kang, Seungae;Jung, Hyungsu; / Korea convergence Security Association , v.16, no.4, pp.63-68,
8 Procedures of Coping with Each Type of Infringement using Live Forensic Technology
Yoon, Ju Hee;Kim, Mi Sun;Lee, DongHwi; / Korea convergence Security Association , v.16, no.4, pp.69-78,
9 Effective Vitalization Plan of Electronic Cash using Bitcoin
Lee, Jun Hyung;Lee, Seong Hun;Lee, Do Eun;Kim, Woo Cheol;Kim, Minsu; / Korea convergence Security Association , v.16, no.4, pp.79-90,