Digital Library
Search: "[ keyword: cybersecurity ]" (5)
-
Jae-yoon Hwang, Hyuk-jin Kwon, Vol. 25, No. 1, pp. 123-136, Feb. 2024
10.7472/jksii.2024.25.1.123
Keywords: Cybersecurity Audit, Compliance, RMF, CMMC -
Kee Jeong Kim, Lifu Huang, Jin-Hee Cho, Vol. 24, No. 5, pp. 67-73, Oct. 2023
10.7472/jksii.2023.24.5.67
Keywords: Artificial intelligence (AI)-based simulation, Cybergrooming, cybersecurity, Children and Youth -
Kook-jin Kim, Jae-pil Youn, Suk-joon Yoon, Ji-won Kang, Kyung-shin Kim, Dong-kyoo Shin, Vol. 23, No. 5, pp. 87-101, Oct. 2022
10.7472/jksii.2022.23.5.87
Keywords: cybersecurity, Cyber Command & Control, Cyberspace, Cyber Operation, Cyber Situational Awareness, Cyber Common Operational Picture -
4. The direction of application of the RMF-based risk management system considering interoperabilityHyuk-Jin Kwon, Sung-Tae Kim, Ye-na Joo, Vol. 22, No. 6, pp. 83-89, Dec. 2021
10.7472/jksii.2021.22.6.83
Keywords: CyberSecurity System engineering, Fuzzy, Secure SDLC, RMF -
Ik-jae Kim, Ji-won Kang, Dong-kyoo Shin, Vol. 22, No. 6, pp. 71-81, Dec. 2021
10.7472/jksii.2021.22.6.71
Keywords: cybersecurity test and evaluation
Category Search
Publications
-
Vol. 25, 2024
-
Vol. 24, 2023
-
Vol. 23, 2022
-
Vol. 22, 2021
-
Vol. 21, 2020
-
Vol. 20, 2019
-
Vol. 19, 2018
-
Vol. 18, 2017
-
Vol. 17, 2016
-
Vol. 16, 2015
-
Vol. 15, 2014
-
Vol. 14, 2013
-
Vol. 13, 2012
-
Vol. 12, 2011
-
Vol. 11, 2010
-
Vol. 10, 2009
-
Vol. 9, 2008
-
Vol. 8, 2007
-
Vol. 7, 2006
-
Vol. 6, 2005
-
Vol. 5, 2004
-
Vol. 4, 2003
-
Vol. 3, 2002
-
Vol. 2, 2001
-
Vol. 1, 2000