1 | Á¦¸ñ(Title) | Analysis of Security Vulnerabilities for IoT Devices | |
---|---|---|---|
ÀúÀÚ(Author) | Hee-Hyun Kim Jinho Yoo | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 18 NO. 04 PP. 0489 ~ 0499 2022. 08 | ||
2 | Á¦¸ñ(Title) | Analysis of Security Vulnerabilities for IoT Devices | |
ÀúÀÚ(Author) | Hee-Hyun Kim Jinho Yoo | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 18 NO. 04 PP. 0489 ~ 0499 2022. 08 | ||
3 | Á¦¸ñ(Title) | A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data | |
ÀúÀÚ(Author) | Weiwei Lin Chaofan Yang Zeqing Zhang Xingsi Xue Reiko Haga | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 12 PP. 4531 ~ 4544 2021. 12 | ||
4 | Á¦¸ñ(Title) | A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement | |
ÀúÀÚ(Author) | Jun-Young Park Eui-Nam Huh | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 01 PP. 0061 ~ 0082 2020. 02 | ||
5 | Á¦¸ñ(Title) | Defending Non-control-data Attacks using Influence Domain Monitoring | |
ÀúÀÚ(Author) | Guimin Zhang Qingbao Li Zhifeng Chen Ping Zhang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 08 PP. 3888 ~ 3910 2018. 08 | ||
6 | Á¦¸ñ(Title) | Service Identification of Internet-Connected Devices Based on Common Platform Enumeration | |
ÀúÀÚ(Author) | Sarang Na Taeeun Kim Hwankuk Kim | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 03 PP. 0740 ~ 0750 2018. 06 | ||
7 | Á¦¸ñ(Title) | Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering | |
ÀúÀÚ(Author) | Jianshan Peng Mi Zhang Qingxian Wang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 10 NO. 10 PP. 4933 ~ 4956 2016. 10 | ||
8 | Á¦¸ñ(Title) | A Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service | |
ÀúÀÚ(Author) | Dae-Woo Park | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 04 PP. 0353 ~ 0357 2011. 08 | ||
9 | Á¦¸ñ(Title) | RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing | |
ÀúÀÚ(Author) | Zhiqiang Wang Yuqing Zhang Qixu Liu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 07 NO. 08 PP. 1989 ~ 2009 2013. 08 | ||
10 | Á¦¸ñ(Title) | Intercepting Filter Approach to Injection Flaws | |
ÀúÀÚ(Author) | Ahmed Salem | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 06 NO. 04 PP. 0563 ~ 0574 2010. 12 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.