최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기韓國컴퓨터情報學會論文誌 = Journal of the Korea Society of Computer and Information, v.28 no.4, 2023년, pp.75 - 81
Hea-Jun Kim (Dept. of Information Security, Daejeon University) , Young-Bok Cho (School of Information Security, Daejeon University)
Since the introduction of smartphones, the introduction of charging cable infrastructure that can be used for public use is underway. Thanks to this, people use public cables comfortably without doubt, but most people are not aware of the dangers of public cables. These public cables can lead to inf...
GallupReport, 2012-2022 Smartphone Usage & Brand, Smartwatch,?Wireless Earphone Survey on Wireless Earphones, https://www.gallup.co.kr/gallupdb/reportContent.asp?seqNo1309
H. Lee, "Is there a safe zone?" 8 ways for Smartphone hacking,?https://www.ciokorea.com/t/21989/%EB%9E%9C%EC%84%AC%EC%9B%A8%EC%96%B4/213594.
Hak5, O.MG CABLE, https://shop.hak5.org/products/omg-cable
S. Vouteva "Feasibility and Deployment of Bad USB", System?and Network Engineering Master Research project, February 2015.?https://rp.os3.nl/2014-2015/p49/report.pdf
J. Jo, H. Yang, and B. Lee, "Implementation of screen key-logger?for virtual keyboard and its countermeasures", Journal of the?Society for Information Protection, June 2013.
Manage Engine, What is BadUSB Attack and How to Prevent,?https://www.manageengine.com/device-control/badusb.html
A. Kishore, Prevent Access to the Command Prompt in Windows,?https://helpdeskgeek.com/how-to/disable-command-prompt-in-windows/, April 2011.
S. Nam, I. Oh, K. Lee, and K. Yim, "Study on BAD USB?Detection Technique based on User Cognition", Proceedings of?the Korean Society of Computer Information Conference, 24, 2,?pp. 93-94, July 2016. https://koreascience.kr/article/CFKO201623070249541.page
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.