¼¼ºÎÇÁ·Î±×·¥
88
.
7
9
---- ¼±Åà ----
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
---- ¼±Åà ----
---- ¼±Åà ----
Track
>
Session :
Emerging Security Issues
>
Secure Coding
¹ßÇ¥Á¦¸ñ :
Secure Coding Guidelines in Korea
¹ßÇ¥ÀÚ :
ÇѱÙÈñ (Àü¹®À§¿ø(¼±â°ü)/ÇàÁ¤¾ÈÀüºÎ)
°¿¬¿ä¾à :
¡Û °¢ ±â°ü¿¡¼ Á¤º¸½Ã½ºÅÛÀ̳ª Á¤º¸¼ºñ½º¸¦ Á¦°øÇϱâ À§ÇØ ¼ÒÇÁÆ®¿þ¾î¸¦ °³¹ßÇÏ´Â °úÁ¤¿¡¼ ±â ȹ ´Ü°èºÎÅÍ ½ÇÁ¦ ¼ºñ½º¸¦ Á¦°øÇÏ´Â ¿î¿µ•À¯Áöº¸¼ö ´Ü°è±îÁö Àüü °úÁ¤»ó¿¡¼ ÇÁ·Î±×·¡¹ÖÀ» À߸ø ÇÏ¿© ¸¸µé¾îÁö´Â Ãë¾à¼º(¿À·ù•°áÁ¡•°áÇÔ•º¸¾ÈÃë¾àÁ¡)À» »çÀü¿¡ ã¾Æ¼ Á¦°ÅÇÏ´Â ÀÛ¾÷À» ¼öÇàÇÏ´Â ...more
Track
>
Session :
Emerging Security Issues
>
Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ :
Device Authentication and More Security: Mobile TPM
¹ßÇ¥ÀÚ :
¹ÚÇöÁÖ (´ëÇ¥ÀÌ»ç/¿¥Å¥¸¯½º)
°¿¬¿ä¾à :
ÇöÀç ±¹³»ÀÇ µð¹ÙÀ̽ºÀÎÁõ¿¡ ´ëÇÑ °³³äÀº ¸Å¿ì ´Ù¾çÇÑ °¡¿îµ¥, Çà¾ÈºÎ¸¦ Áß½ÉÀ¸·Î ÃßÁøÇØ¿Â ±â±âÀÎ Áõ ¹× CCTC, ÀÎÅͳÝÆù Àû¿ëÀ¸·Î ±× ±â¼ú°ú ¼ºñ½º°¡ Á¤¸³µÇ·ÁÇÏ°í ÀÖÀ¸³ª, ÃÖ±Ù º¸¾È±â¼úÀº ½º¸¶Æ® Æù, ½º¸¶Æ®±×¸®µåµîÀÇ ITȯ°æÀÌ ±Þº¯ÇÏ¸ç µð¹ÙÀ̽ºÀÎÁõ¿¡ ´ëÇÑ Àû¿ëÀÎÇÁ¶ó, Àû¿ëµð¹ÙÀ̽º, Àû¿ë¼ ºñ½º°¡ ´Þ¸® ¿ä±¸µÇ...more
Track
>
Session :
Emerging Security Issues
>
Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ :
Smart Phone Security
¹ßÇ¥ÀÚ :
±è±â¿µ (Ã¥ÀÓ/ETRI)
°¿¬¿ä¾à :
½ÃÀåÁ¶»ç±â°üÀÎ IDC¿¡ ÀÇÇϸé 2013³â±îÁö Àü¼¼°èÀûÀ¸·Î ½º¸¶Æ®Æù ÆǸŷ®Àº 40%¸¦ Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹»óÇÏ°í ÀÖ°í, ±¹³» ½º¸¶Æ®Æù ÆǸŷ®(¡®10³â 1¿ù 100¸¸, ¡®5¿ù 185¸¸¡¯ µî)Àº ¿¹ÃøÇϱ⠾î·Á¿ï Á¤µµ·Î ±Þ¼ÓÇÑ ¼Óµµ·Î Áõ°¡ÇÏ°í ÀÖ¾î ½º¸¶Æ®Æù ½ÃÀåÀÇ Æø¹ßÀûÀÎ ¼ºÀåÀÌ ±âÁ¤»ç½Ç·Î ¹Þ¾Æµé¿©Áö°í ÀÖ´Ù. ±¹³»¿¡¼´Â Á¤ºÎÁÖ...more
Track
>
Session :
Emerging Security Issues
>
Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ :
WiFi and FMC Service Security
¹ßÇ¥ÀÚ :
±èȯ±¹ (Ã¥ÀÓ/KISA)
°¿¬¿ä¾à :
FMC(Fixed/Mobile Convergence)´Â ÀÌÅë¸Á°ú À¯¼± ÀÎÅͳݸÁÀÌ ÅëÇÕµÈ À¯¹«¼± ÅëÇÕ È¯°æÀ¸·Î¼ ±¹³»¿¡ ¼´Â ÇϳªÀÇ ÈÞ´ëÆùÀ¸·Î ¿ÜºÎ¿¡¼´Â ÀÌÅë¸ÁÀ¸·Î, Wi-FI°¡ ¼³Ä¡µÈ °÷¿¡¼´Â ÀÎÅͳÝÀüÈ »ç¿ëÇÏ´Â ¼ ºñ½º¸¦ ¸»ÇÑ´Ù. ÃÖ±Ù ½º¸¶Æ®Æù µî WiFi Áö¿ø ¸ð¹ÙÀÏ ±â±â º¸±Þ È®»ê, °³ÀÎÀÇ Åë½Å ºñ¿ë Àý°¨, ±â¾÷¿ë ¸ð¹ÙÀÏ ¿ÀÇǽº ...more
Track
>
Session :
Emerging Security Issues
>
Green IT Security
¹ßÇ¥Á¦¸ñ :
Practical AMI(Advanced Metering Infrastructure) Security
¹ßÇ¥ÀÚ :
³ªÁßÂù (ÆÀÀå/ETRI)
°¿¬¿ä¾à :
The purpose of this presentation is to provide utilities implementing Advanced Metering Infrastructure (AMI) with the knowledge necessary to secure that implementation appropriately. Cyber security is a critical iss ue d ue to the increasing potential of cyber attacks and incidents against thi...more
Track
>
Session :
Emerging Security Issues
>
Green IT Security
¹ßÇ¥Á¦¸ñ :
Security Requirement in Cloud Computing
¹ßÇ¥ÀÚ :
±èÁÖ¿µ (ÆÀÀå/KISA)
°¿¬¿ä¾à :
Ŭ¶ó¿ìµå ÄÄÇ»Æÿ¡¼ÀÇ Áß¿ä À̽´´Â ¼ºñ½º ¾ÈÁ¤È, ½ÃÅ¥¸®Æ¼, ¹ý Àû¿ë ¹®Á¦ µîÀÌ¸ç ±âÁ¸ µ¥ÀÌÅÍ ¼¾ ÅÍÀÇ Ãë¾àÁ¡°ú Ŭ¶ó¿ìµå ÄÄÇ»Æà µ¥ÀÌÅÍ ¼¾Å͵µ À¯»çÇÏ´Ù. ±×·¯³ª Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æÀ¸·Î ÀÎÇÏ ¿© Ãß°¡ À§ÇùÀ̳ª Ãë¾àÁ¡µµ Á¸ÀçÇÑ´Ù. °ø°Ý ´ë»ó ¹× µ¥ÀÌÅÍ ÀúÀå ȯ°æ°ú »õ·Î¿î °ø°ÝÀÌ ¿¹»óµÇ¸ç °¡ »óÈ ¹× ´ë¿ë·® ºÐ...more
Track
>
Session :
Emerging Security Issues
>
Green IT Security
¹ßÇ¥Á¦¸ñ :
Security Implementation using Virtualization Technology
¹ßÇ¥ÀÚ :
±è±â¿µ (»ó¹«ÀÌ»ç/ÀÌ´ÏÅØ)
°¿¬¿ä¾à :
°¡»óÈ ±â¼úÀÇ ¼º¼÷µµ°¡ ³ô¾ÆÁü¿¡ µû¶ó ´Ù¾çÇÑ ºÐ¾ß¿¡¼ °¡»óÈ ±â¼úÀ» ÀÌ¿ëÇÏ¿© º¸¾ÈÀ» °ÈÇÏ·Á ´Â ¿òÁ÷ÀÓÀÌ ÀÖ´Ù. °¡»óÈ°¡ º¸¾È°È¸¦ À§ÇÏ¿© »ç¿ëµÇ´Â »ç·Ê¸¦ °ËÅäÇØ º¸°í ÇâÈÄ ÃâÇöÀÌ ¿¡»óµÇ ´Â °¡»óȸ¦ ÅëÇÑ º¸¾È°È ¹æ¾ÈÀ» ¿¹»óÇØ º»´Ù. ¶ÇÇÑ ÀÌ·¯ÇÑ °¡»óȸ¦ ÅëÇØ ¼ºñ½º°¡ ÀÌ·ç¾îÁú ¶§ ¹ß»ýÇÒ ¼ö ÀÖ´Â À̽´...more
Track
>
Session :
Advanced Topics in Wireless Networks
>
Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ :
Dependable Wireless Networks
¹ßÇ¥ÀÚ :
¿°ÀÍÁØ (±³¼ö/¼º±Õ°ü´ëÇб³)
°¿¬¿ä¾à :
º» °¿¬¿¡¼´Â ¹«¼± ³×Æ®¿öÅ©ÀÇ ½Å·Ú¼º ¹®Á¦¸¦ ´Ù·é´Ù. ¹«¼± ³×Æ®¿öÅ©´Â ³×Æ®¿öÅ© ¸µÅ©°¡ °³¹æµÇ ¾î Àִ Ư¼ºÀ¸·Î ÀÎÇØ, À̱âÀûÀΠȤÀº ¾ÇÀÇÀûÀÎ »ç¿ëÀÚ¿¡ ÀÇÇØ ½±°Ô °ø°Ý´ç ÇÒ À§ÇèÀÌ ÀÖÀ¸¸ç, ÀÌ ¿¡ ´ëÇÑ ´Ù¾çÇÑ ÇØ°á ¹æ¹ýµéÀÌ ¿¬±¸µÇ°í ÀÖ´Ù. º» °¿¬¿¡¼´Â ÀÌ»óÀÇ ¹®Á¦¿¡ ´ëÇÑ ÃÖ±ÙÀÇ ¿¬±¸ ¼º°ú ¸¦ ¾Ë¾Æº»´Ù. - sel...more
Track
>
Session :
Advanced Topics in Wireless Networks
>
Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ :
Exploiting Capture Effect for Performance Enhancement in Wireless Networks
¹ßÇ¥ÀÚ :
¹é»óÇå (±³¼ö/°í·Á´ëÇб³)
°¿¬¿ä¾à :
Capture Effect´Â ¹«¼± ³×Æ®¿öÅ©¿¡¼ µÎ °³ ÀÌ»óÀÇ ÆÐŶÀÌ µ¿½Ã¿¡ Àü¼ÛµÇ¾î ½ÅÈ£°¡ ÁßøµÇ´õ¶óµµ ¼ö ½Å ½Ã°£ ¹× ¼ö½Å °¨µµ¿¡ µû¶ó ÆÐŶÀ» ¿Ã¹Ù¸£°Ô ¼ö½ÅÇÒ ¼ö Àִ Ư¼ºÀ» ¸»ÇÑ´Ù. ÀÌ·¯ÇÑ Æ¯¼ºÀº ALOH A, CSMA/CA µî°ú °°Àº ±âÁ¸ ¹«¼± MAC¿¡¼ÀÇ ÀϹÝÀûÀÎ °¡Á¤¿¡ À§¹èµÇ´Â °ÍÀ¸·Î ´Ù¸¥ À̸¦ ÀÌ¿ëÇÏ ¿© ¹«¼± ³×Æ®¿öÅ©ÀÇ ...more
Track
>
Session :
Advanced Topics in Wireless Networks
>
Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ :
Capacity and Delay of Wireless Networks: Controllable Mobility Perspective
¹ßÇ¥ÀÚ :
±è¼º·û (±³¼ö/¿¬¼¼´ëÇб³)
°¿¬¿ä¾à :
À̵¿¼º ÁöÇâÀÇ ¹«¼±Åë½Å ³×Æ®¿öÅ©¿¡¼ ³ëµå°£ Capacity (Transport vs. Transmission) ¹× Delay ÃÖÀûÈ ¸¦ À§Çؼ À̵¿¼º (Node mobility)¸¦ ¾î¶»°Ô È°¿ëÇØ¾ß ÇÏ´Â Áö¸¦ ¼Ò°³ÇÑ´Ù. À̸¦ ¹ÙÅÁÀ¸·Î À̵¿¼º Á¦ ¾î°¡ °¡´ÉÇÑ Machine (¿¹¸¦µé¾î ·Îº¿ ¹× Â÷·®)°£ÀÇ Á¤º¸ ±³È¯À» À§Çؼ ±âÁ¸ÀÇ ¹«¼±Åë½Å Æз¯´ÙÀÓ ÀÌ ¾î¶»°Ô ¹Ù...more
01
02
03
04
05
06
07
08
09