Digital Library
Search: "[ keyword: Security ]" (198)
Back-Propagation Neural Network Based Face Detection and Pose Estimation
Jae Hoon Lee , In Ja Jun , Jung Hoon Lee , Phill Kyu Rhee The KIPS Transactions:PartB ,
Vol. 9, No. 6, pp. 853-862,
Dec.
2002
10.3745/KIPSTB.2002.9.6.853
10.3745/KIPSTB.2002.9.6.853
Vulnerabilities and Countermeasures of Dynamic Virtual Keyboard in Android Banking Apps
Taenam Cho, SookHee Choi KIPS Transactions on Computer and Communication Systems,
Vol. 8, No. 1, pp. 9-16,
Jan.
2019
https://doi.org/10.3745/KTCCS.2019.8.1.9
Keywords: Android, virtual keyboard, Banking App, Security, Password
https://doi.org/10.3745/KTCCS.2019.8.1.9
Keywords: Android, virtual keyboard, Banking App, Security, Password
Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements
Choi Jung in, Oh Yoon seok, Kim Do won, Choi Eun Young, Seo Seung Hyun KIPS Transactions on Computer and Communication Systems,
Vol. 7, No. 7, pp. 183-194,
Jul.
2018
10.3745/KTCCS.2018.7.7.183
Keywords: IoT Device Class, IoT Security Requirements, IoT Platform, cryptography
10.3745/KTCCS.2018.7.7.183
Keywords: IoT Device Class, IoT Security Requirements, IoT Platform, cryptography
Improved Original Entry Point Detection Method Based on PinDemonium
Kim Gyeong Min, Park Yong Su KIPS Transactions on Computer and Communication Systems,
Vol. 7, No. 6, pp. 155-164,
Jun.
2018
10.3745/KTCCS.2018.7.6.155
Keywords: computer security, Malicious Code Analysis, Unpacking, Reverse engineering, Dynamic Analysis, code obfuscation
10.3745/KTCCS.2018.7.6.155
Keywords: computer security, Malicious Code Analysis, Unpacking, Reverse engineering, Dynamic Analysis, code obfuscation
Interoperable Security Framework for Heterogeneous IoT Platforms
Se-Ra Oh, Young-Gab Kim KIPS Transactions on Computer and Communication Systems,
Vol. 7, No. 3, pp. 81-90,
Mar.
2018
10.3745/KTCCS.2018.7.3.81
Keywords: IoT security, Security Framework, Authentication, Authorization
10.3745/KTCCS.2018.7.3.81
Keywords: IoT security, Security Framework, Authentication, Authorization
Proposal and Implementation of Security Keypad with Dual Touch
Jinseok Song, Myung-Woo Jung, Jung-In Choi, Seung-Hyun Seo KIPS Transactions on Computer and Communication Systems,
Vol. 7, No. 3, pp. 73-80,
Mar.
2018
10.3745/KTCCS.2018.7.3.73
Keywords: Security Keypad, Simple Payment, Dual Touch, Mobile Banking
10.3745/KTCCS.2018.7.3.73
Keywords: Security Keypad, Simple Payment, Dual Touch, Mobile Banking
A Partial Encryption Method for the Efficiency and the Security Enhancement of Massive Data Transmission in the Cloud Environment
Sung-Hwan Jo, Gi-Tae Han KIPS Transactions on Computer and Communication Systems,
Vol. 6, No. 9, pp. 397-406,
Sep.
2017
10.3745/KTCCS.2017.6.9.397
Keywords: Cloud, Data Security, encryption algorithm, Partial Encryption
10.3745/KTCCS.2017.6.9.397
Keywords: Cloud, Data Security, encryption algorithm, Partial Encryption
Enhancing Education Curriculum of Cyber Security Based on NICE
Wonhyung Park, Seongjin Ahn KIPS Transactions on Computer and Communication Systems,
Vol. 6, No. 7, pp. 321-328,
Jul.
2017
10.3745/KTCCS.2017.6.7.321
Keywords: Cybersecurity, Security Education, Security Workforce, Security Knowledge System
10.3745/KTCCS.2017.6.7.321
Keywords: Cybersecurity, Security Education, Security Workforce, Security Knowledge System
A Method of Detecting Real-Time Elevation of Privilege Security Module Using User Credentials
Sim Chul Jun, Kim Won Il, Kim Hyun Jung, Lee Chang Hoon KIPS Transactions on Computer and Communication Systems,
Vol. 6, No. 5, pp. 247-254,
May.
2017
10.3745/KTCCS.2017.6.5.247
Keywords: System security, Elevation of Privilege Attack, Credentials
10.3745/KTCCS.2017.6.5.247
Keywords: System security, Elevation of Privilege Attack, Credentials
Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria
Jisoo Park, Seungjoo Kim KIPS Transactions on Computer and Communication Systems,
Vol. 6, No. 3, pp. 121-134,
Mar.
2017
10.3745/KTCCS.2017.6.3.121
Keywords: SDLC, Threat Modeling, Security Requirements, Traceability
10.3745/KTCCS.2017.6.3.121
Keywords: SDLC, Threat Modeling, Security Requirements, Traceability