• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 사이버보안 ]" (9)
  1. 1. A Data-Driven Study on Deriving Core Provisions for the Enactment of the Seoul Metropolitan Government Cybersecurity Ordinance
    Jiyeong Lee, Dohyun Kim, Vol. 26, No. 6, pp. 171-182, Dec. 2025
    10.7472/jksii.2025.26.6.171
    Keywords: cybersecurity, Research on Ordinance Legislation, Data-Driven Analysis, Derivation of core Provisions
  2. 2. A Survey of Semi-Supervised Learning in Cybersecurity: Methods, Domains, and Guidelines for Fair Evaluation
    Suchul Lee, Vol. 26, No. 6, pp. 1-12, Dec. 2025
    10.7472/jksii.2025.26.6.1
    Keywords: Semi-supervised learning, cybersecurity, Pseudo-labeling, Consistency regularization
  3. 3. Cybersecurity Job Market Analysis Using Online Recruitment Information
    Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
    10.7472/jksii.2025.26.3.99
    Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling
  4. 4. A Study of Overlay for Security Controls of K-RMF on Space System
    Sukjoon Yoon, Cheol-gyu Yi, Jiwon Kang, Vol. 26, No. 1, pp. 211-220, Feb. 2025
    10.7472/jksii.2025.26.1.211
    Keywords: Space system, Cyber Security, K-RMF, Space Overlays, security controls
  5. 5. A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects
    Won-Young Lee, Vol. 25, No. 6, pp. 61-69, Dec. 2024
    10.7472/jksii.2024.25.6.61
    Keywords: K-RMF, RMF, Security plan, Weapon system security plan, Cyber Security
  6. 6. Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack
    Byeong-jun Park, Cheol-jung Kim, Vol. 25, No. 1, pp. 157-166, Feb. 2024
    10.7472/jksii.2024.25.1.157
    Keywords: Army TIGER, Drone, robot, unmanned vehicle, AI, Cloud Center, Cyber Defense
  7. 7. A study on the cyber common operation picture for situational awareness in cyberspace
  8. 8. The direction of application of the RMF-based risk management system considering interoperability
    Hyuk-Jin Kwon, Sung-Tae Kim, Ye-na Joo, Vol. 22, No. 6, pp. 83-89, Dec. 2021
    10.7472/jksii.2021.22.6.83
    Keywords: CyberSecurity System engineering, Fuzzy, Secure SDLC, RMF
  9. 9. A study on the application of mission-based weapon system cybersecurity test and evaluation
    Ik-jae Kim, Ji-won Kang, Dong-kyoo Shin, Vol. 22, No. 6, pp. 71-81, Dec. 2021
    10.7472/jksii.2021.22.6.71
    Keywords: cybersecurity test and evaluation