|
1 |
A Study on Security Metrics and Research Trend Analysis on Cyber Resilence
Lee, Sujin;Ahn, Seongjin;
/
Korea convergence Security Association
, v.18, no.1, pp.3-11,
|
|
2 |
Efficiency Improvement Using Two Balanced Subsets
Kim, HongTae;
/
Korea convergence Security Association
, v.18, no.1, pp.13-18,
|
|
3 |
Implementation of the Large-scale Data Signature System Using Hash Tree Replication Approach
Park, Seung Kyu;
/
Korea convergence Security Association
, v.18, no.1, pp.19-31,
|
|
4 |
Development of Integrated Computational Fluid Dynamics(CFD) Environment using Opensource Code
Kang, Seunghoon;Son, Sungman;Oh, Se-Hong;Park, Wonman;Choi, Choengryul;
/
Korea convergence Security Association
, v.18, no.1, pp.33-42,
|
|
5 |
A Study on the Design of Re-training Courses for Nurturing Cybersecurity Professionals from Other Occupational Groups
Ji, Juyeon;Park, Sangho;Yu, Harang;Chang, Hangbae;
/
Korea convergence Security Association
, v.18, no.1, pp.43-60,
|
|
6 |
An Analysis of Research Trends in IoT Security
Yu, Woo Young;
/
Korea convergence Security Association
, v.18, no.1, pp.61-67,
|
|
7 |
Role of Management and Protection Motivation's influence on the Intention of Compliance with Information Security Policies: Based on the Theory of Planned Behavior
Shin, Hyuk;Kang, Min Hyung;Lee, Cheol Gyu;
/
Korea convergence Security Association
, v.18, no.1, pp.69-84,
|
|
8 |
Improvement of Satellite Ocean Information Service for Offshore Marine Industry
Cho, Bo-Hyun;Lee, Gun-Wook;Kim, Dong-Chun;Yang, Keum-Cheol;Kim, SG;Yo, Seung-jae;
/
Korea convergence Security Association
, v.18, no.1, pp.85-91,
|
|
9 |
A Study on Drug trading countermeasures via internet and sns
Park, Ho Jeong;
/
Korea convergence Security Association
, v.18, no.1, pp.93-102,
|
|
10 |
The College Reputation System using Public Data and Sentiment Analysis
Kim, Eun-Ah;Lee, Yon-Sik;
/
Korea convergence Security Association
, v.18, no.1, pp.103-110,
|
|
11 |
Military Vulnerability Management Plan based on Military IT Asset Management System for Cyber Threat Response
Kim, Jong Hwa;Lim, Jae Sung;
/
Korea convergence Security Association
, v.18, no.1, pp.111-116,
|
|
12 |
North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory
Yoon, Taeyoung;Woo, Jeongmin;
/
Korea convergence Security Association
, v.18, no.1, pp.117-128,
|
|
13 |
(A) Study on the Effectiveness of Preventive Attacks in the Process of Nuclear Development : Focusing on Israel's Attacks on Iraq and Syria
Han, Seung Jo;
/
Korea convergence Security Association
, v.18, no.1, pp.129-141,
|
|
14 |
The attribution of the security guard failure and grope for efficient operational measures of security guard through the analysis of failures : propensity eduction of failure-factors of security guard and patterns of danger and injury
Kim, Sang Jin;
/
Korea convergence Security Association
, v.18, no.1, pp.143-155,
|
|
15 |
Study Recognizing the Explosives Detection Service of Explosive Detection Dog Handlers
Kim, Jae Yup;Kim, Il Gon;
/
Korea convergence Security Association
, v.18, no.1, pp.157-166,
|
|