Seungmin Rho, Yangsun Lee, Yanghoon Kim , Jihoon Moon, Bongen Gu*
Yang Yue*, Mahamudul Azim Muied
15 - 23 ... [2] Holochain-based Role-Based Access Control for Collaborative Data Sharing in Zero Trust Environments
Jong-Sub Lee, Seok-Jae Moon*
24 - 44 ... [3] Optimizing Indexing and Search Performance of Elasticsearch for Large -Scale Log Data
Yoonseok Kang, Dongchul Park*
Joonseo Hyeon, Jaehyuk Cho*
61 - 74 ... [5] A Study on a Framework for Identifying and Protecting Victims Infected by Smishing Malware
Lee Dong Ryun, Jung Taek Seo *
75 - 88 ... [6] Simplification Methods for Software Cryptographic Module in IoT Environment
Jun-Sub Kim*
Dongyoon Kang*, Seungneo Son, Wonpyoung Kang, Hyejin Lim, Kihun Jang, Yungsung Cho
101 - 112 ... [8] A Study on Transformer Models for Cross Device Stress Detection Using EDA, ACC, TEMP Signals
Takanobu Abe, Seok-hyung Hwang, Se-Woong Hwang, Young-Ae Jung*
113 - 123 ... [9] A Threat-Based Test Scenario Methodology for Security Verification of Embedded Software
Sangtae Lee, Jihye Park, Hangbae Chang *, Woohyun Jang, Sayeon Kim, Olmi Lee
Sunhee Lee*
Takanobu Abe, Hidetoshi Murayama, Young-Ae Jung, Suk-Hyung Hwang, Se-Woong Hwang*
Wonpyoung Kang, Seungneo Son *, Hyejin Lim, Kihun Jang, Yungsung Cho