Browse > Article List

논문
1 A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation)
Jong-Hyoun Kim;Sang-Jun Ahn; / Korea convergence Security Association , v.22, no.4, pp.3-9,
2 Control measures in Cyberspace in the light of Rimland theory
Dong-hyun Kim;Soo-jin Lee;Wan-ju Kim;Jae Sung Lim; / Korea convergence Security Association , v.22, no.4, pp.11-16,
3 Attack Detection and Classification Method Using PCA and LightGBM in MQTT-based IoT Environment
Lee Ji Gu;Lee Soo Jin;Kim Young Won; / Korea convergence Security Association , v.22, no.4, pp.17-24,
4 Secret Sharing based Node Authentication in FANET
Yang Ji Hun;Lee Soo Jin; / Korea convergence Security Association , v.22, no.4, pp.25-34,
5 A Redesign of the Military Education Structure of General Universities based on Defense Innovation 4.0 -Focused on Capabilities of Tech-Intensive Junior Officers based on Advanced S&T-
Jung-Ho Eom;Keun-Seog Park;Sang-Pil Chun; / Korea convergence Security Association , v.22, no.4, pp.35-44,
6 A Study on the Selection Interview for Army Officers
JaeKeak Jung; / Korea convergence Security Association , v.22, no.4, pp.45-51,
7 A Study on the development plan for the smooth fixation of the RNTC
Eung-woo Nam;Jong-Hyun Park; / Korea convergence Security Association , v.22, no.4, pp.53-63,
8 A Study on Operational Element Identification and Integrated Time Series Analysis for Cyber Battlefield Recognition
Son-yong Kim;Koo-hyung Kwon;Hyun-jin Lee;Jae-yeon Lee;Jang-hyuk Kauh;Haeng-rok Oh; / Korea convergence Security Association , v.22, no.4, pp.65-73,
9 A Study on the Application of the 4th Industrial Drone to the Military Field
Lee Young Uk; / Korea convergence Security Association , v.22, no.4, pp.75-84,
10 A study on the policy of de-identifying unstructured data for the medical data industry
Sun-Jin Lee;Tae-Rim Park;So-Hui Kim;Young-Eun Oh;Il-Gu Lee; / Korea convergence Security Association , v.22, no.4, pp.85-97,
11 Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices
Yoo Young Hwan; / Korea convergence Security Association , v.22, no.4, pp.99-107,
12 A study on the application of PbD considering the GDPR principle
Youngcheon Yoo;Soonbeom Kwon;Hwansoo Lee; / Korea convergence Security Association , v.22, no.4, pp.109-118,
13 A Study on MMIP Data Service providing additional Information of multiple Movie Information Programs
Kwangil KO; / Korea convergence Security Association , v.22, no.4, pp.119-127,
14 A Comparative Analysis of Deep Learning Frameworks for Image Learning
jong-min Kim;Dong-Hwi Lee; / Korea convergence Security Association , v.22, no.4, pp.129-133,
15 Development of Environmental Security Engineering Through Delphi Survey
Heon-Wook Lim; / Korea convergence Security Association , v.22, no.4, pp.135-140,
16 Enhancement of Iris Masking Security using DNN and Blurring
Seungmin Baek;Younghae Choi;Chanwoo Hong;Wonhyung Park; / Korea convergence Security Association , v.22, no.4, pp.141-146,
17 A Study on the Trend of Technology Development Related to Smart Car Security ; Based on Patent Analysis
Lee Kang Hyun;Jung Yu Han; / Korea convergence Security Association , v.22, no.4, pp.147-159,
18 The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data)
Jang Mook KANG; / Korea convergence Security Association , v.22, no.4, pp.161-168,
19 Study on Visualization of Multi-domain Network Topology
Beom-Hwan Chang; / Korea convergence Security Association , v.22, no.4, pp.169-178,
20 Vulnerability Attack for Mutual Password Authentication Scheme with Session Key agreement
Seo Han Na;Choi Youn Sung; / Korea convergence Security Association , v.22, no.4, pp.179-188,