|
1 |
A Study of the DEVOPS Test Automation Module for Integrated Development Environment
Jung Kwang Lak;Kim Sun Joo;
/
Korea convergence Security Association
, v.22, no.1, pp.3-9,
|
|
2 |
A Study on the Framework of Integrated Vulnerability Analysis of Domestic Nuclear Facilities
Mi-Joo Shin;Seong-su Yoon;Ieck-chae Euom;
/
Korea convergence Security Association
, v.22, no.1, pp.11-17,
|
|
3 |
A Study on Threat Detection Model using Cyber Strongholds
Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon;
/
Korea convergence Security Association
, v.22, no.1, pp.19-27,
|
|
4 |
Design and development of non-contact locks including face recognition function based on machine learning
Yeo Hoon Yoon;Ki Chang Kim;Whi Jin Jo;Hongjun Kim;
/
Korea convergence Security Association
, v.22, no.1, pp.29-38,
|
|
5 |
A Study on Cybersecurity Data Sharing System Model with a Hierarchical Structure for Effective Data Sharing
Ho-jei Yu;Chan-hee Kim;Ye-rim Cho;Sung-sik Im;Soo-hyun Oh;
/
Korea convergence Security Association
, v.22, no.1, pp.39-54,
|
|
6 |
Renewable energy trends and relationship structure by SNS big data analysis
Jong-Min Kim;
/
Korea convergence Security Association
, v.22, no.1, pp.55-60,
|
|
7 |
An Qualification Level Model for Efficient Management of Cyber Security Workforce
Jung-Ho Eom;Hong-Jun Kim;Youn-Sung Choi;
/
Korea convergence Security Association
, v.22, no.1, pp.61-69,
|
|
8 |
A User Authentication Scheme using Blockchain in Smart Grid-based Edge Computing Environments
Hakjun Lee;Youngsook Lee;
/
Korea convergence Security Association
, v.22, no.1, pp.71-79,
|
|
9 |
ZigBee Authentication Protocol with Enhanced User Convenience and Safety
Ho-jei Yu;Chan-hee Kim;Sung-sik Im;Soo-hyun Oh;
/
Korea convergence Security Association
, v.22, no.1, pp.81-92,
|
|
10 |
Study on Security Policy Distribute Methodology for Zero Trust Environment
Sung-Hwa Han;Hoo-Ki Lee;
/
Korea convergence Security Association
, v.22, no.1, pp.93-98,
|
|
11 |
Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System
Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee;
/
Korea convergence Security Association
, v.22, no.1, pp.99-111,
|
|
12 |
A Study on the Effects of Information Security Policy Types and Information Security Stress on Information Security Behavior
Lee Kwang Ho;Jung Chan gi;
/
Korea convergence Security Association
, v.22, no.1, pp.113-120,
|
|
13 |
Windows Artifacts Analysis for Collecting Cryptocurrency Mining Evidence
Si-Hyeon Park;Seong-Hun Han;Won-hyung Park;
/
Korea convergence Security Association
, v.22, no.1, pp.121-127,
|
|
14 |
A Study on the Security Threat Response in Smart Integrated Platforms
Seung Jae Yoo;
/
Korea convergence Security Association
, v.22, no.1, pp.129-134,
|
|
15 |
A Study on Smart Fitness Models for Active Senior
Seungae Kang;
/
Korea convergence Security Association
, v.22, no.1, pp.135-140,
|
|
16 |
A Study on the Improvement Plan of ROK Army's ROTC System in the Aspect of Strategic Human Resource Management -Focusing on the Organizational Structure and Operation System-
Myung-Lyul Kim;Choong-Kwan Kim;
/
Korea convergence Security Association
, v.22, no.1, pp.141-148,
|
|
17 |
A Study on the Characteristics of the New Generation of Soldiers and the Ways to Cultivate the Leadership of Marine Corps Officers
Kim Ho Chun;
/
Korea convergence Security Association
, v.22, no.1, pp.149-158,
|
|
18 |
The Effect of Security Major University Students' Major Selection Motivation on Major Satisfaction and Career Decision
Ye-Jin Jang;Jeong-Il Choi;
/
Korea convergence Security Association
, v.22, no.1, pp.159-166,
|
|