Digital Library


Search: "[ keyword: Vulnerability Analysis ]" (5)
    Towards Automated Vulnerability Analysis in ARM-based Virtualization
    Dongha Lee, Gyujeong Jin, Geonha Lee, Daehyeon Ko, Jaewon Yang, Hyungyu Oh The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1051-1057, Dec. 2025
    10.3745/TKIPS.2025.14.12.1051
    Keywords: ARM Virtualization, Nested Virtualization, vulnerability Analysis, Fuzzing

    Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems
    Yu Il Seon , Lee Dong Lyeon , O Eun Sug The KIPS Transactions:PartC, Vol. 10, No. 5, pp. 565-574, Oct. 2003
    10.3745/KIPSTC.2003.10.5.565

    A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks
    Il Sun You , Jong Eun Kim , Kyung San Cho The KIPS Transactions:PartC, Vol. 10, No. 1, pp. 1-10, Feb. 2003
    10.3745/KIPSTC.2003.10.1.1

    Study on the Femtocell Vulnerability Analysis Using Threat Modeling
    Jae-ki Kim, Jeong-Hoon Shin, Seung-joo Kim KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 8, pp. 197-210, Aug. 2016
    10.3745/KTCCS.2016.5.8.197
    Keywords: Threat modeling, Femtocell, Vulnerability Analysis

    An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification
    Jun Ho Lee , Kyung Sang Sung , Hea Seok Oh KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 8, pp. 271-276, Aug. 2014
    10.3745/KTCCS.2014.3.8.271