Title A Study on military cyber threat cases and countermeasures Category Security
Author Kyung-Sang Sung1, Hyun-Chang Lee 2, Wonshik Na Organigation ICCIT2020
Abstract   Submit Date 2020
As such, countries all over the world are seeking to strengthen their defense capacity and prepare reliable cybersecurity strategies by linking the private, public, and defense sectors at the national strategy level. This paper will look at the concept of the Fourth Industrial Revolution, case studies of intelligent cyber threats, model cases of countering cyber threats, and the status quo of Korea. Based on this, the paper will present countermeasures for the South Korean military that will allow it to actively transform its defense system.

 

Title A Study on the Implementation of a System Providing Reliable Malware Information Service Category Security
Author Kyung-Sang Sung, Wonshik Na Organigation IJEEE
Abstract   Submit Date 2019
Malware can be diagnosed several ways or even pass under the radar at times. This can cause confusion in the users, who do not welcome a flood of unorganized information in general. This paper proposes an extraction method that can provide reliable and established results in order to tackle the issue from the user's point of view. To guarantee the reliability of AVS and AVS against the malware, this paper tested malware that can actually be found in use. Such processes allow this paper to extract and provide the most reliable information to users.
In addition, this paper can help the students who study security establish the concept of malicious code. And research subjects are enough to prepare malicious code countermeasures for security graduate students.
Title A Secure EPC System based on Encryption Key using Matrix Puzzle Category Security
Author In-hwa Choi, Kyung-Sang Sung, Gi-Sung Lee Organigation AGST2016
Abstract   Submit Date 2016
A lot of researches have been in progress about the importance of EPCglobal Network and their encryption technologies, and various systems are presented as well. Nevertheless, regarding to the encryption schema, most of them mention that it is specified in X.509 and there are no concrete usage strategies yet. The study is about proposing and implementing methods of sending messages securely, verifying whether received messages are effective, encrypting for the secure sending and certifying between systems for the web-based service constituting EPCglobal Network. Also, we used Matrix Puzzle methods on the key creation scheme which ensures the messages through safe key management methods.

+ Recent posts