Search Word(s) in Title, Keywords, Authors, and Abstract: Vulnerabilities

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration
Sarang Na, Taeeun Kim and Hwankuk Kim
Page: 740~750, Vol. 14, No.3, 2018
10.3745/JIPS.03.0098
Keywords: Common Platform Enumeration (CPE), Common Vulnerabilities and Exposures (CVE), OS Fingerprinting, Security Vulnerability Analysis, Service Identification
Show / Hide Abstract

A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions
Nam Yong Kim, Shailendra Rathore, Jung Hyun Ryu, Jin Ho Park and Jong Hyuk Park
Page: 1361~1384, Vol. 14, No.6, 2018
10.3745/JIPS.03.0105
Keywords: Cyber Physical System, Internet of Things, Security Analysis, Security Threats
Show / Hide Abstract

Patch Integrity Verification Method Using Dual Electronic Signatures
JunHee Kim and Yoojae Won
Page: 1516~1526, Vol. 13, No.6, 2017
10.3745/JIPS.03.0084
Keywords: Digital Signature, Electronic Signature, Integrity, Patch Distribution, Patch Management
Show / Hide Abstract

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Page: 689~702, Vol. 13, No.4, 2017
10.3745/JIPS.03.0024
Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Show / Hide Abstract

A Survey of RFID Deployment and Security Issues
Amit Grover and Hal Berghel
Page: 561~580, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.561
Keywords: RFID, RFID Standards, RFID Protocols, RFID Security, EPC structure, RFID Applications, RFID Classification
Show / Hide Abstract