Consideration of New Convergence Security Threats and Countermeasures in the Zero-Contact Era |
Yu, Dong-Hyun
(R.O.K Army, Security Management Engineering, Graduate School, MyongJi University)
Kim, Yong-Uk (R.O.K Army, Security Management Engineering, Graduate School, MyongJi University) Ha, Young-Jae (R.O.K Army, Security Management Engineering, Graduate School, MyongJi University) Ryu, Yeon-Seung (Department of Security Management Engineering, MyongJi University) |
1 | J. W. Seok & I. S. Oh. (2020). Political and Social Changes and Risk Management Since Corona19. Korean Security Journal, (64), 117-136. DOI: 10.36623/kssr.2020.64.5 DOI |
2 | D. H. Lee & H. A. Kim. (2020). A Study on Security through Case Analysis of Corona19 Related Cyber Attacks. Korean Society of Information and Communication, 24(1), 548-550. |
3 | H. G. Oh. (2020). Analysis of major social changes and information security issues after COVID-19. Communications of the Korean Institute of Information Scientists and Engineer, 38(9), 48-56. |
4 | D. W. Kim & K. B. Lee. (2019). A Study on the Classifying the Type of Social Engineering Attacks, Korean Journal of Industrial Security, 9(2), 9-21. DOI: 10.33388/kais.2019.9.2.009 DOI |
5 | M. S. Jung & H. B. Jang. (2020). The Case Study of Technology Leakage in Cyber-Physical Space, Korean Journal of Industrial Security, 10(2), 151-179. DOI: 10.33388/kais.2020.10.2.151 DOI |
6 | H. J. Lim. (2020) The Impact of COVID-19 on Crime -Focused on 112 Report Data, Korean Security Journal, (Special), 233-254. DOI: 10.36623/kssr.2020.pandemic.233 DOI |
7 | B. K. Koo. (2019. 10. 3). Deepfake detection technology, will you become a fake news troubleshooter?, The Hankyoreh, Retrieved from http://www.hani.co.kr/arti/science/future/911878.html |
8 | T. H. Kim. (2020. 11. 19.). "850 new confirmed cases?"... Ask the police to investigate Fake News. Segye news. Retrieved from https://www.segye.com/newsView/20201119509842 |
9 | Korea Internet Security Agency. (2020. 6. 24). Security Guide for Introduction and Operation of Zero-Contact Work Environment[Guide and Manual]. Retrieved from https://www.boho.or.kr/data/guideView.do?bulletin_writing_sequence=35467 |
10 | H. J. Son. (2020. 11. 12). No saving of thermal imaging camera pictures..." Violation of regulations? I don't know." YTN. Retrieved from https://www.ytn.co.kr/_ln/0103_202011120543155750 |
11 | S. K. Bae. (2020) A Study on Criminal Regulations against Deepfake porn, Law Research Institute Center for International Area Studies Hankuk University of Foreign Studies, 43(3), 169-187. DOI: 10.17257/hufslr.2019.43.3.169 DOI |
12 | J. Y. Jung & Y. H. Kim. (2020) South Korean Cyber Security Threats, Governance Measures, and Implications for SMEs, Korean Journal of Industrial Security, 10(1), 81-109. DOI: 10.33388/kais.2020.10.1.081 DOI |
13 | N. R. Jang. (2018. 10. 2). How do foreign countries respond to fake news with hate speech?. The Hankyoreh,. Retrieved from http://www.hani.co.kr/arti/society/society_general/864204.html |
14 | Smartgrid. (2020. 4. 14) 'How long will the stamp vote last? Will block-chain voting be the solution?[Online Blog]. Retrieved from https://bloodkorea.com/bl_news/1001769 |
15 | M. S. Kim. & B. R. Kang. (2015) Generalization of Zero-Knowledge Proof of Polynomial Equality, The Journal of the KICS, 40(5), 833-840. DOI: 10.7840/kics.2015.40.5.833 DOI |