Digital Library[ Search Result ]
Search : "[ keyword: Security ]" (177)
Design of Security Architecture for the Cloud-Based Korea Military Command and Control System
Jahoon Koo Young-Gab Kim Sang Hoon Lee
Vol. 45, No. 2, pp. 400-408, Feb. 2020
10.7840/kics.2020.45.2.400
Vol. 45, No. 2, pp. 400-408, Feb. 2020
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Trends and Analysis of Blockchain Privacy Protocols
Sanghyun Lee Yongsu Kim Howon Kim
Vol. 44, No. 12, pp. 2252-2259, Dec. 2019
10.7840/kics.2019.44.12.2252
Vol. 44, No. 12, pp. 2252-2259, Dec. 2019
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Comparative Analysis on Security Protocols of WPA3 Standard for Secure Wireless LAN Environments
Ji-Hyun Nam Ju-yeop Lee Song-hui Kwon Hyoung-Kee Choi
Vol. 44, No. 10, pp. 1878-1887, Oct. 2019
10.7840/kics.2019.44.10.1878
Vol. 44, No. 10, pp. 1878-1887, Oct. 2019
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Implement Detecting Network Attack through Machine Learning in LoRaWAN Environment
Tack-hyun Jung Seung-ho Lee Kee-cheon Kim
Vol. 44, No. 8, pp. 1547-1555, Aug. 2019
10.7840/kics.2019.44.8.1547
Vol. 44, No. 8, pp. 1547-1555, Aug. 2019
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
A Study on a Cybersecurity Evaluation Method for Industrial Control Systems in the 4th Industrial Revolution Era
Woonyon Kim Eung-Ki Park Sin-Kyu Kim
Vol. 44, No. 5, pp. 943-956, May 2019
10.7840/kics.2019.44.5.943
Vol. 44, No. 5, pp. 943-956, May 2019
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)