Digital Library
Search: "[ keyword: Security ]" (167)
Implementation of a Static Analyzer for Detecting the PHP File Inclusion Vulnerabilities
Joon Seon Ahn , Seong Chae Lim The KIPS Transactions:PartA,
Vol. 18, No. 5, pp. 193-204,
Oct.
2011
10.3745/KIPSTA.2011.18.5.193
10.3745/KIPSTA.2011.18.5.193
Text Watermarking Based on Syntactic Constituent Movement
Mi Young Kim The KIPS Transactions:PartB ,
Vol. 16, No. 1, pp. 79-84,
Feb.
2009
10.3745/KIPSTB.2009.16.1.79
10.3745/KIPSTB.2009.16.1.79
Development of a String Injection Vulnerability Analyzer for Web Application Programs
Joon Seon Ahn , Yeong Min Kim , Jang Wu Jo The KIPS Transactions:PartA,
Vol. 15, No. 3, pp. 181-188,
Jun.
2008
10.3745/KIPSTA.2008.15.3.181
10.3745/KIPSTA.2008.15.3.181
An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit
Seong Yong Joo , Joon Seon Ahn , Jang Wu Jo The KIPS Transactions:PartA,
Vol. 15, No. 1, pp. 45-52,
Feb.
2008
10.3745/KIPSTA.2008.15.1.45
10.3745/KIPSTA.2008.15.1.45
A Visualization System for Permission Check in Java using Static Analysis
Yun Kyung Kim , Byeong Mo Chang The KIPS Transactions:PartA,
Vol. 13, No. 5, pp. 399-404,
Oct.
2006
10.3745/KIPSTA.2006.13.5.399
10.3745/KIPSTA.2006.13.5.399
Malicious Traffic Classification Using Mitre ATT&CK and Machine Learning Based on UNSW-NB15 Dataset
Yoon Dong Hyun, Koo Ja Hwan, Won Dong Ho KIPS Transactions on Software and Data Engineering,
Vol. 12, No. 2, pp. 99-110,
Feb.
2023
https://doi.org/10.3745/KTSDE.2023.12.2.99
Keywords: Machine Learning, MITRE ATT&CK, UNSW-NB15, Network Traffic Classification, Network Security Monitoring
https://doi.org/10.3745/KTSDE.2023.12.2.99
Keywords: Machine Learning, MITRE ATT&CK, UNSW-NB15, Network Traffic Classification, Network Security Monitoring
Requirements Analysis for Access Control Model on Ubiquitous Computing Environment
Se Jong Oh , Je Ho Park The KIPS Transactions:PartA,
Vol. 11, No. 7, pp. 563-570,
Dec.
2004
10.3745/KIPSTA.2004.11.7.563
10.3745/KIPSTA.2004.11.7.563
Development of Embedded Security Fax Server Supporting Dual Mode
Sang Hak Lee , Tae Choong Chung The KIPS Transactions:PartA,
Vol. 11, No. 3, pp. 129-138,
Jun.
2004
10.3745/KIPSTA.2004.11.3.129
10.3745/KIPSTA.2004.11.3.129
Secure Scheme Between Nodes in Cloud Robotics Platform
Hyungjoo Kim KIPS Transactions on Software and Data Engineering,
Vol. 10, No. 12, pp. 595-602,
Dec.
2021
https://doi.org/10.3745/KTSDE.2021.10.12.595
Keywords: Security, robot, Robot-Human Interaction, Key Management, Cloud Robotics Platform
https://doi.org/10.3745/KTSDE.2021.10.12.595
Keywords: Security, robot, Robot-Human Interaction, Key Management, Cloud Robotics Platform
A Methodology for Integrating Security into the Automotive Development Process
Seungyeon Jeong, Sooyoung Kang, Seungjoo Kim KIPS Transactions on Software and Data Engineering,
Vol. 9, No. 12, pp. 387-402,
Dec.
2020
https://doi.org/10.3745/KTSDE.2020.9.12.387
Keywords: Automotive Development, Evidence-based Standards, Secure SDLC, UNECE Cybersecurity Regulation
https://doi.org/10.3745/KTSDE.2020.9.12.387
Keywords: Automotive Development, Evidence-based Standards, Secure SDLC, UNECE Cybersecurity Regulation