Digital Library
Search: "[ keyword: Vulnerability ]" (7)
-
Min-jeong Kim, Jae-cheol Ryou, Vol. 20, No. 4, pp. 13-19, Aug. 2019
10.7472/jksii.2019.20.4.13
Keywords: iOS, vulnerability Analysis, debugger, LLDB -
Jung-Gyu Lee, Seung-Ryul Jeong, Vol. 18, No. 5, pp. 113-121, Oct. 2017
10.7472/jksii.2017.18.5.113
Keywords: Dashboard, Key Performance Indicator, Vulnerability, Service Performance, internet security -
Mi-Young Park, Hyen-Woo Seung, Yang-Mi Lim, Vol. 14, No. 3, pp. 23-34, Jun. 2013
10.7472/jksii.2013.14.3.23
Keywords: virtulaization environment, Vulnerability, risk model -
Kyong-Jin Kim, Dong-Su Seo, Seng-Phil Hong, Vol. 13, No. 3, pp. 127-0, Jun. 2012
10.7472/jksii.2012.13.3.127
Keywords: Framework, Financial services, Privacy, Security, Vulnerability -
Kyung-Roul Lee, Kang-Bin Yim, Vol. 12, No. 5, pp. 39-46, Oct. 2011
Keywords: USB keyboard, Vulnerability Assessment, secure keyboard software, keyboard sniffing, password authentication -
Hyung-Jong Kim, Vol. 9, No. 6, pp. 49-62, Dec. 2008
Keywords: Meaning-based Vulnerability Identification, Vulnerability Assessment, Atomic vulnerability, Vulnerability Description Analysis -
Kim In-Jung, Chung Yoon-Jung, Koh Jae-Young, Won Dong-Ho, Vol. 7, No. 1, pp. 31-38, Feb. 2006
Keywords: Risk Analysis, Asset, Threat, Vulnerability, Safeguard
Category Search
Publications
-
Vol. 25, 2024
-
Vol. 24, 2023
-
Vol. 23, 2022
-
Vol. 22, 2021
-
Vol. 21, 2020
-
Vol. 20, 2019
-
Vol. 19, 2018
-
Vol. 18, 2017
-
Vol. 17, 2016
-
Vol. 16, 2015
-
Vol. 15, 2014
-
Vol. 14, 2013
-
Vol. 13, 2012
-
Vol. 12, 2011
-
Vol. 11, 2010
-
Vol. 10, 2009
-
Vol. 9, 2008
-
Vol. 8, 2007
-
Vol. 7, 2006
-
Vol. 6, 2005
-
Vol. 5, 2004
-
Vol. 4, 2003
-
Vol. 3, 2002
-
Vol. 2, 2001
-
Vol. 1, 2000