A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects
Won-Young Lee, Journal of Internet Computing and Services, Vol. 25, No. 6, pp. 61-69, Dec. 2024
10.7472/jksii.2024.25.6.61, Full Text:
Keywords: K-RMF, RMF, Security plan, Weapon system security plan, Cyber Security
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Lee, W. (2024). A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects. Journal of Internet Computing and Services, 25(6), 61-69. DOI: 10.7472/jksii.2024.25.6.61.
[IEEE Style]
W. Lee, "A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects," Journal of Internet Computing and Services, vol. 25, no. 6, pp. 61-69, 2024. DOI: 10.7472/jksii.2024.25.6.61.
[ACM Style]
Won-Young Lee. 2024. A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects. Journal of Internet Computing and Services, 25, 6, (2024), 61-69. DOI: 10.7472/jksii.2024.25.6.61.