최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기사물인터넷융복합논문지 = Journal of internet of things and convergence, v.9 no.3, 2023년, pp.55 - 60
The IoT environment is very vulnerable to security threats, and if an intrusion occurs, it can cause great damage. In order to strengthen the security of the IoT environment, a curriculum that considers the characteristics of the IoT environment is needed. In this paper, we propose a curriculum mode...
H.W.Kim. "Intrusion response methods in the Internet of Things (IoT) environment". Journal of the Korea Institute of Information Security and Cryptology, Vol.28, No.4, 739-749, 2018.?
J.H.Lee, "Security threats and response methods in the Internet of Things (IoT) environment". Journal of the Korea Institute of Information Security and Cryptology, Vol.27, No.4, 697-706. 2017.?
Y.M.Park, "Training program model for intrusion response in the Internet of Things (IoT) environment". Journal of the Korea Institute of Information Security and Cryptology, Vol.29, No.4, 795-804. 2019.?
"The Internet of Things (IoT): A Security Perspective", by Andrew S. Tanenbaum and Maarten van Steen, in "The New Internet", edited by Andrew S. Tanenbaum and Maarten van Steen, 2010.?
"Security in the Internet of Things", by Richard E. Smith, in "The Internet of Things: A Systems Perspective", edited by Richard E. Smith, 2015.?
"Security for the Internet of Things", by David A. Wheeler and Richard E. Smith, 2016.?
Korea Internet & Security Agency, a study on estimating the economic and social costs of cyber infringement accidents(2021.12)?
Ministry of Science and ICT, number of cyber infringement incidents by year (2022.11)?
K.H.Lee, "A Study on a Project-based Blockchain Web Developer Education Model Customized for Companies", Journal of Internet of Things and Convergence, Vol.8, No.4, pp.77-83, 2022.?
N. Asokan, S. Sadeh, and A. Sadeh, "A Survey on Security Issues in the Internet of Things", Proceedings of the 2009 IEEE Security and Privacy Symposium, Vol.23, No.5, pp.71-82, 2009.?
M. Conti, S. Dehghantanha, S. Jajodia, and H. Hu,, "Security and Privacy in the Internet of Things", Computer, Vol.49, No.2, pp.84-91, 2016.?
S. M. Rahman, M. A. Khan, and S. K. Das, "A Survey on Security and Privacy Challenges in the Internet of Things", IEEE Access, Vol.6, pp.17684-17707, 2018.?
J.Park, H.Lee and M.Seo, "The 4th Industrial Revolution and the Future of Advertising and Public Relations Curriculum : Focusing on Academic and Industry Perspectives", Korean Journal of Advertising, 115, pp.120-142. 2019.?
S.B.Kang, S.J.Lee and J.I.Lim, "A Study on the Effective Countermeasures for Preventing Computer Security Incidents", Journal of The Korea Institute of Information Security and Cryptology, Vol.22, No.1, pp.107-115, 2012.?
M.G.Lee, "A Development of Curriculum for Information Security Professional Manpower Training", Journal of the Institute of Electronics and Information Engineers, Vol.54, No.1, pp.46-52, 2017.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.