Various threat models to detour the air-gapped systems of network separation
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yoon, Ji Won | - |
dc.date.accessioned | 2021-08-28T23:32:58Z | - |
dc.date.available | 2021-08-28T23:32:58Z | - |
dc.date.created | 2021-04-22 | - |
dc.date.issued | 2015-08-20 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/33419 | - |
dc.publisher | Korea Institute of Information Security and Cryptology | - |
dc.title | Various threat models to detour the air-gapped systems of network separation | - |
dc.title.alternative | Various threat models to detour the air-gapped systems of network separation | - |
dc.type | Conference | - |
dc.contributor.affiliatedAuthor | Yoon, Ji Won | - |
dc.identifier.bibliographicCitation | The 16th International Workshop on Information Security Applications | - |
dc.relation.isPartOf | The 16th International Workshop on Information Security Applications | - |
dc.relation.isPartOf | Lecture Note in Computer Science | - |
dc.citation.title | The 16th International Workshop on Information Security Applications | - |
dc.citation.conferencePlace | KO | - |
dc.citation.conferencePlace | 제주도 | - |
dc.citation.conferenceDate | 2015-08-20 | - |
dc.type.rims | CONF | - |
dc.description.journalClass | 1 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.