Search Word(s) in Title, Keywords, Authors, and Abstract: Vulnerability

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration
Sarang Na, Taeeun Kim and Hwankuk Kim
Page: 740~750, Vol. 14, No.3, 2018
10.3745/JIPS.03.0098

Keywords: Common Platform Enumeration (CPE), Common Vulnerabilities and Exposures (CVE), OS Fingerprinting, Security Vulnerability Analysis, Service Identification
Show / Hide Abstract

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering
Woon-hae Jeong, Se-jun Kim, Doo-soon Park and Jin Kwak
Page: 157~172, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.157
Keywords: Collaborative Filtering, Movie Recommendation System, Personal Propensity, Security, Push Stack
Show / Hide Abstract

Intercepting Filter Approach to Injection Flaws
Ahmed Salem
Page: 563~574, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.563
Keywords: Injection Flaws, SQL Injection, Intercepting Filter, Cross-site Scripting Vulnerability
Show / Hide Abstract

A Practical Security Risk Analysis Process and Tool for Information System
YoonJung Chung, InJung Kim and DoHoon Lee
Page: 95~100, Vol. 2, No.2, 2006
None
Keywords: Risk Management, Asset, Threats, Vulnerability, Countermeasure
Show / Hide Abstract

The Plan and Tools for Vulnerability Testing in Information Software-Based System
Injung Kim, Younggyo Lee and Dongho Won
Page: 75~78, Vol. 1, No.1, 2005
None
Keywords: Risk Analysis, Vulnerability, Asset, Threat
Show / Hide Abstract