Digital Library[ Search Result ]
Search : "[ keyword: Security ]" (177)
Performance Analysis of Secure Relaying Protocol Against an Untrusted Relay Node in V2V Networks
Inkyu Bang Jong-Hyun Kim Sang-Min Lee Taehoon Kim
Vol. 46, No. 12, pp. 2180-2183, Dec. 2021
10.7840/kics.2021.46.12.2180
Vol. 46, No. 12, pp. 2180-2183, Dec. 2021
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Authentication Scheme for Civil Signals of Navigation Satellites
Taenam Cho Seunglim Yong Wonchan Jung Sanguk Lee Ryu Joon Gyu
Vol. 46, No. 11, pp. 1882-1895, Nov. 2021
10.7840/kics.2021.46.11.1882
Vol. 46, No. 11, pp. 1882-1895, Nov. 2021
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
A Study of Detecting Lateral Movement Using Large-Scale Authentication Log
Shinwoo Shim Sang-soo Kim Sun-Young Im Sung-mo Koo Byoungmo Cho
Kwangsoo Kim Taekyu Kim
Vol. 46, No. 11, pp. 1862-1872, Nov. 2021
10.7840/kics.2021.46.11.1862
Kwangsoo Kim Taekyu Kim
Vol. 46, No. 11, pp. 1862-1872, Nov. 2021
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
A Threat Prioritization Method Using User Behavior Data for Cyber Threat Hunting
Sang-soo Kim Shinwoo Shim Sun-Young Im Sung-mo Koo
Vol. 46, No. 11, pp. 1853-1861, Nov. 2021
10.7840/kics.2021.46.11.1853
Vol. 46, No. 11, pp. 1853-1861, Nov. 2021
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
User Scheduling and Optimal Power Allocation for Artificial Noise in Untrusted Full-Duplex Relay Networks
Inkyu Bang Taehoon Kim Jin-Taek Lim
Vol. 46, No. 11, pp. 1811-1815, Nov. 2021
10.7840/kics.2021.46.11.1811
Vol. 46, No. 11, pp. 1811-1815, Nov. 2021
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Security Resource Throughput-Based Mapping Algorithm for Guaranteeing Quality-of-Service of Traffic
Giwon Sur Jaewon Bae Shun Yuel Ryu JongWon Kim Hyuk Lim
Vol. 46, No. 10, pp. 1632-1645, Oct. 2021
10.7840/kics.2021.46.10.1632
Vol. 46, No. 10, pp. 1632-1645, Oct. 2021
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
A Study on Applications of Information Security in Implementing Cloud-Based Defense Information Systems
Jungha Jin Byeongjun Kim Keunhee Han
Vol. 46, No. 9, pp. 1415-1425, Sep. 2021
10.7840/kics.2021.46.9.1415
Vol. 46, No. 9, pp. 1415-1425, Sep. 2021
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Implementation of Smart Segmentation Framework for Preventing Security Threats Spreading in IoT Networks
Jae-Deok Lim Seon-Gyoung Sohn Jeong-Nyeo Kim
Vol. 46, No. 8, pp. 1321-1331, Aug. 2021
10.7840/kics.2021.46.8.1321
Vol. 46, No. 8, pp. 1321-1331, Aug. 2021
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)