Digital Library
Search: "[ keyword: Security ]" (200)
A Study for Task Detection Acquiring Abnormal Permission in Linux
Won Il Kim , Sang Hyun Yoo , Ju Hyun Kwak , Chang Hoon Lee KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 11, pp. 427-432,
Nov.
2014
10.3745/KTCCS.2014.3.11.427
10.3745/KTCCS.2014.3.11.427
A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment
Jeong Hyo Park , Kim Nak Hyun , Yong Hoon Jung , Moon Seog Jun KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 10, pp. 323-328,
Oct.
2014
10.3745/KTCCS.2014.3.10.323
10.3745/KTCCS.2014.3.10.323
The Moderating Effects of Information Security Policy between Information Security Maturity and Organizational Performance
Jeong Kuk Park , In Jai Kim KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 9, pp. 301-310,
Sep.
2014
10.3745/KTCCS.2014.3.9.301
10.3745/KTCCS.2014.3.9.301
An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification
Jun Ho Lee , Kyung Sang Sung , Hea Seok Oh KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 8, pp. 271-276,
Aug.
2014
10.3745/KTCCS.2014.3.8.271
10.3745/KTCCS.2014.3.8.271
An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems
Hyung Chan Kim , Il Hwan Park KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 2, pp. 31-42,
Feb.
2014
10.3745/KTCCS.2014.3.2.31
10.3745/KTCCS.2014.3.2.31
A Study on the SmartPhone GPS based Graphical Password Approach
Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 525-532,
Dec.
2013
10.3745/KTCCS.2013.2.12.525
10.3745/KTCCS.2013.2.12.525
Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack
Kwang Il Jeong , Joon Ku Lee , Geun Ok Park KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 561-568,
Dec.
2013
10.3745/KTCCS.2013.2.12.561
10.3745/KTCCS.2013.2.12.561
An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone
Myong Hee Kim , Wildan Toyib KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 541-552,
Dec.
2013
10.3745/KTCCS.2013.2.12.541
10.3745/KTCCS.2013.2.12.541
A Proposal for "Security Verification Method for Implementation of Secure Android Mobile Application"
Hur Hwan Seok , Kang Sung Hoon , Kim Seung Joo KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 10, pp. 445-460,
Oct.
2013
10.3745/KTCCS.2013.2.10.445
10.3745/KTCCS.2013.2.10.445
Security Check Scheduling for Detecting Malicious Web Sites
Jae Yeong Choi , Sung Ki Kim , Byoung Joon Min KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 9, pp. 405-412,
Sep.
2013
10.3745/KTCCS.2013.2.9.405
10.3745/KTCCS.2013.2.9.405