• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Threat ]" (13)
  1. 1. Analysis of the Security Requirements of the Chatbot Service Implementation Model
  2. 2. Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data
  3. 3. Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling
    Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
    10.7472/jksii.2022.23.6.27
    Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement
  4. 4. An Encrypted Botnet C&C Communication Method in Bitcoin Network
    Kibeom Kim, Youngho Cho, Vol. 23, No. 5, pp. 103-110, Oct. 2022
    10.7472/jksii.2022.23.5.103
    Keywords: Bitcoin Network, Botnet C&C Communication, Encryption, Cyber Threat
  5. 5. Consideration for defense preparedness against non-traditional security threats(focused on the threat of infectious diseases)
  6. 6. Study on security requirements for the web based operation system of a shipping company
    Up Chung, Jongsub Moon, Vol. 23, No. 1, pp. 49-68, Feb. 2022
    10.7472/jksii.2022.23.1.49
    Keywords: Shipping company, Threat modeling, STRIDE, Security requirement
  7. 7. A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection
  8. 8. A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain
  9. 9. Automatic Malware Detection Rule Generation and Verification System
    Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
    10.7472/jksii.2019.20.2.9
    Keywords: Malware, Detection rule, SNORT, LDA, network threat
  10. 10. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature