Cybersecurity and cyber forensics for smart cities: a comprehensive literature review and survey

K Kim, IM Alshenaifi, S Ramachandran, J Kim, T Zia… - Sensors, 2023 - mdpi.com
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial
intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart …

[PDF][PDF] Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis.

D Kim, N Kim, J Ahn - Computers, Materials & Continua, 2024 - cdn.techscience.cn
This research aims to propose a practical framework designed for the automatic analysis of
a product's comprehensive functionality and security vulnerabilities, generating applicable …

A study on threat modeling in smart greenhouses

SH Cho, DS Kang, MS Kang, HS Kim, JW Bae, CI Lee… - 2020 - repository.nauss.edu.sa
In the era of agriculture 4.0, cutting-edge technologies including Information and
communication technology (ICT) is being introduced into traditional agriculture. As farm …

Derivation of Security Requirements for Cloud Managing Security Services System by Threat Modeling Analysis

H Jang - KIPS Transactions on Computer and Communication …, 2021 - koreascience.kr
Recently, the introduction of Cloud Managing Security Services System to respond to
security threats in cloud computing environments is increasing. Accordingly, it is necessary …

webOS 기반스마트TV 아티팩트분석

송경식, 임재혁, 전민재, 손태식 - 디지털포렌식연구, 2022 - dbpia.co.kr
IoT 기술의 발전에 따라 스마트 가전제품들의 사용 빈도도 늘어나고 있다. 특히 스마트 TV 의
경우 'COVID-19'의 영향으로 실내 활동이 증가함에 따라 그 수요 또한 높아지고 있다. 특히 …

Steer-By-Wire System 의Systematic TARA 수행및Practical Mitigation Solution 에대한연구

원우석, 김동규, 김대성, 이진환 - 한국자동차공학회추계학술대회및 …, 2021 - dbpia.co.kr
Steer-By-Wire system has been in the research phase and stage for years due to
fundamental safety weakness that there is no mechanical linkage between driver's steering …

[PDF][PDF] 위협모델링분석에의한클라우드보안관제시스템보안요구사항도출

장환 - 정보처리학회논문지/컴퓨터및통신시스템제, 2021 - ktccs.kips.or.kr
요 약최근 클라우드 컴퓨팅 환경의 보안 위협에 대응하기 위한 클라우드 보안관제시스템
도입이 증가하고 있다. 이에 따라 클라우드 보안관제시스템에대한 보안 요구 사항 분석이 …