권호기사보기
| 기사명 | 저자명 | 페이지 | 원문 | 기사목차 |
|---|
| 대표형(전거형, Authority) | 생물정보 | 이형(異形, Variant) | 소속 | 직위 | 직업 | 활동분야 | 주기 | 서지 | |
|---|---|---|---|---|---|---|---|---|---|
| 연구/단체명을 입력해주세요. | |||||||||
|
|
|
|
|
|
* 주제를 선택하시면 검색 상세로 이동합니다.
| 번호 | 참고문헌 | 국회도서관 소장유무 |
|---|---|---|
| 1 | WHO, “COVID 19 Public Health Emergency of International Concern,”GLOPID-R, Feb. 2020. | 미소장 |
| 2 | UN High Commissioner, “The coronavirus outbreak is a test of our systems, values and humanity,” UNHCR, Mar. 2020. | 미소장 |
| 3 | National Human Rights Chairman, “Corona19 Crisis, a test stand to verify human rights capabilities in our society,”National Human Rights Commission, Apr. 2020. | 미소장 |
| 4 | Jung Yeon-je, “South korea is reporting intimate details of covid-19 cases: has it helped?,” Nature, Mar. 2020. | 미소장 |
| 5 | Seo Hangi. “If the public announcement of the movement about Corona 19 is invading privacy? Can be corrected by appealing,”yunhap news, Mar. 2020. | 미소장 |
| 6 | Lambert S, Ostwald T, Shostack A, Hernan, S. “Threat modeling uncover security design flaws using the stride approach,”MSDN Magazine-Louisville, pp. 68-75. Nov. 2016. | 미소장 |
| 7 | Marco M, Tony U. “Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis,” pp. 1-696. John Wiley Sons, May. 2015. | 미소장 |
| 8 | James S, Carol W, Christopher A, Audrey D. “Introduction to the OCTAVE Approach,” SEI, pp. 1-37. Sep. 2003. | 미소장 |
| 9 | “ETSI TS 102 165-1 v4.2.3 -Telecommunications and Internet converged Services and Protocols for Advanced Networking(TISPAN);Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis,” pp. 1-79. Mar. 2011. | 미소장 |
| 10 | James S, Carol W, Christopher A, Audrey D. “Systems thinking for safety and security,” Proceedings of the 29th Annual Computer Security Applications Conference, pp. 1-8. Dec. 2013. | 미소장 |
| 11 | Joosen W, Wuyts K. “LINDDUN privacy threat modeling: a tutorial,” pp. 1-38. Jul. 2015. | 미소장 |
| 12 | Bradley Potteiger, Goncalo Martins, Xenofon Koutsoukos. “Software and attack centric integrated threat modeling for quantitative risk assessment,” In Proceedings of the Symposium and Bootcamp on the Science of Security, pp. 99-108. Potteiger, Apr. 2016. | 미소장 |
| 13 | Tadayoshi K, Tamara D, Batya F. Poster, “The security cards: a security threat brainstorming toolkit,”University of Washington, 2013. | 미소장 |
| 14 | Shull F, Vemuru K, Villadsen O, Mead N. “A Hybrid Threat Modeling Method,”Carnegie Mellon University - Software Engineering Institute, pp. 1-53. Mar. 2018. | 미소장 |
| 15 | Larcom B, Eddington M, Saitta, P. “Trike v1 methodology document,” pp. 1-17. Jul. 2005. | 미소장 |
| 16 | A. Agarwal. “Vast methodology: Visual, agile, and simple threat modeling,”Prescott Valley, 2016. | 미소장 |
| 17 | Microsoft, “Microsoft threat modeling tool threats,” microsoft docs. Aug. 2017. | 미소장 |
| 18 | Kristian Beckers, “Comparing Privacy Requirements Engineering Approaches,” 2012 7th IEEE International Conference on Availability, Reliability and Security(ARES), pp. 574-581, Aug. 2012. | 미소장 |
| 19 | Hojun Lee, Seungjoo Kim, Sangjin Lee. “Evaluation Criteria for COVID-19Contact Tracing Technology and Security Analysis,” Korea Institute Of Information Security & Cryptology, Dec. 2020. | 미소장 |
| 20 | Carmela Troncoso. “Decentralized Privacy-Preserving Proximity Tracing,”Arxiv, Apr. 2020. | 미소장 |
| 21 | Serge Vaudenay. “Analysis of DP3T Between Scylla and Charybdis,” IACR, Apr. 2020. | 미소장 |
| 22 | Apple, Google, “Privacy-Preserving Contact Tracing ver 1.2 BY APPLE INC. AND GOOGLE INC,” Apr. 2020. | 미소장 |
| 23 | Yaron Gvili. “SECURITY ANALYSIS OF THE COVID-19 CONTACT TRACING SPECIFICATIONS BY APPLE INC. AND GOOGLE INC,” Arxiv, https://eprint.iacr.org/2020/428 Apr. 2020. | 미소장 |
| 24 | Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, and Li Li. “Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach,” Arxiv, Jul. 2020. | 미소장 |
| 25 | E. Ben-Sasson, A. Chiesa, E. Tromer, and M. Virza, “Succinct non-interactive zero knowledge for a von neumann architecture.” USENIX Security Symposium, pp. 781–796. 2014. | 미소장 |
| 26 | W. Diffie, E. Hellman, “New Directions in Cryptography,” IEEE Transaction on theory, Nov. 1976. | 미소장 |
| 27 | Bluetooth SIG. “Core Specification,”https://www.bluetooth.com/specifications/bluetooth-core-specification 5.2, Dec. 2019. | 미소장 |
| 28 | Nist, “CVE-2020-6616,” https://nvd.nis t.gov/vuln/detail/ CVE-2020-6616, Aug. 2020. | 미소장 |
| 29 | Nist, “CVE-2020-0022,” https://nvd.nis t.gov/vuln/detail/ CVE-2020-0022, Feb. 2020. | 미소장 |
| 30 | Nist, “CVE-2020-9770,” https://nvd.nis t.gov/vuln/detail/ CVE-2020-9770, Apr. 2020. | 미소장 |
| 31 | Nist, “CVE-2020-9023,” https://nvd.nist.gov/vuln/detail/ CVE-2020-9023, Feb. 2020. | 미소장 |
| 32 | Depoux A, Martin S, Karafillakis E, Preet R, Wilder-Smith A, Larson H. “The pandemic of social media panic travels faster than the COVID-19 outbreak,”J Travel Med. May. 2020. | 미소장 |
| 33 | Becker, Johannes & Li, David &Starobinski, David. “Tracking Anonymized Bluetooth Devices,”Proceedings on Privacy Enhancing Technologies. Jul. 2019. | 미소장 |
| 34 | Jide S. Edu, Jose M. Such, and Guillermo Suarez-Tangil. “Smart Home Personal Assistants: A Security and Privacy Review,” ACM Comput, Dec. 2020. | 미소장 |
| 35 | Thomas Willingham, Cody Henderson, Blair Kiel, Md Shariful Haque, and Travis Atkison. “Testing vulnerabilities in bluetooth low energy,” ACMSE, Mar. 2018. | 미소장 |
| 36 | Or Ami, Yuval Elovici, and Danny Hendler. “Ransomware prevention using application authentication-based file access control,” SAC, Apr. 2018. | 미소장 |
| 37 | Hyman, David A. and Kovacic, William E., “Implementing Privacy Policy: Who Should Do What?,” GWU Legal Studies Research Paper, Feb. 2018. | 미소장 |
| 38 | L. Scripcariu, F. Diaconu, P. D. Mătăsaru and L. Gafencu, "AES Vulnerabilities Study," ECAI, Jun. 2018. | 미소장 |
| 39 | ARMIS, “Exploiting BlueBorne,”https://www.armis.com/blueborne/Blackhat, Sep. 2017. | 미소장 |
| 40 | Veelasha Moonsamy, Lynn Batten, “Mitigating man-in-the-middle attacks on smartphones,” Australian Information Security Management Conference, Jan. 2014. | 미소장 |
| 41 | Slawomir Jasek, “GATTacking Bluetooth Smart Devices,” Black hat USA conference, 2016. | 미소장 |
| 42 | Sam Bowne, “Making an SSL Auditing Proxy with a Mac and Burp,” samsclass, 2015. | 미소장 |
| 43 | CheckPoint, “CallJam,” https://blog.che ckpoint.com/2016/09/08/calljam-androi d-malware-found-on-google-play/, Sep. 2016. | 미소장 |
| 44 | Grant Bugher, “CRNG Cracked,” http://perimetergrid.com/wp/2008/05/17/ubu ntudebian-crng-cracked-ssh-vulnerabl e/, May. 2008. | 미소장 |
*표시는 필수 입력사항입니다.
| 전화번호 |
|---|
| 기사명 | 저자명 | 페이지 | 원문 | 기사목차 |
|---|
| 번호 | 발행일자 | 권호명 | 제본정보 | 자료실 | 원문 | 신청 페이지 |
|---|
도서위치안내: 정기간행물실(524호) / 서가번호: 국내09
2021년 이전 정기간행물은 온라인 신청(원문 구축 자료는 원문 이용)
우편복사 목록담기를 완료하였습니다.
*표시는 필수 입력사항입니다.
저장 되었습니다.