facebook
·Î±×ÀÎ
INDEX
·Î±×ÀÎ
Àλ縻
Á¶Á÷
Á¶Á÷
ÁÖ°ü±â°ü
À§¿øȸ ±¸¼º
ÇÁ·Î±×·¥
ÇÁ·Î±×·¥
ÇÁ·Î±×·¥À϶÷
¼¼ºÎÇÁ·Î±×·¥
µî·Ï/Çà»ç¾È³»
µî·Ï/Çà»ç¾È³»
»çÀüµî·Ï
µî·ÏÈ®ÀÎ
Âü°¡ ¾È³»
°Ô½ÃÆÇ
°Ô½ÃÆÇ
°øÁö»çÇ×
Photo Gallery
Past KRnet
¼¼ºÎÇÁ·Î±×·¥
ÇÁ·Î±×·¥
¼¼ºÎÇÁ·Î±×·¥
¼¼ºÎÇÁ·Î±×·¥
114
.
5
12
---- ¼±Åà ----
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
---- ¼±Åà ----
---- ¼±Åà ----
Track>Session :
Cyber Security > Software-defined Security
¹ßÇ¥Á¦¸ñ :
°í¼Ó ½ºÆ®¸µ ÆÐÅÏ ¸ÅĪÀ» »ç¿ëÇÑ DPI ±â¹ÝÀÇ Network Function °í¼ÓÈ
¹ßÇ¥ÀÚ :
Çѵ¿¼ö (±³¼ö/KAIST)
°¿¬¿ä¾à :
Middlebox services that inspect packet payloads have become commonplace. Today, anyone can sign up for cloudbased Web application firewall with a single click. These...
Track>Session :
Cyber Security > Software-defined Security
¹ßÇ¥Á¦¸ñ :
Ŭ¶ó¿ìµå±â¹Ý º¸¾È¼ºñ½º¿Í Software-defined Security ±â¼ú
¹ßÇ¥ÀÚ :
±èÀÍ±Õ (½ÇÀå/ETRI)
°¿¬¿ä¾à :
³¯·Î Á¤±³ÇØÁö´Â »çÀ̹ö À§Çù¿¡ À¯±âÀûÀ¸·Î ´ëÀÀÇÏ°í, º¸¾È ±â´ÉÀÇ À¯¿¬¼ºÀ» Á¦°øÇϱâ À§ÇÏ¿© ÃÖ±Ù¿¡´Â ¡®¼ºñ½º·Î¼ÀÇ º¸¾È¡¯ÀÇ ¿ä±¸»çÇ×ÀÌ Áõ°¡ÇÏ°í ÀÖ´Ù. ÀÌ¿¡, º¸¾È ¼Ö·ç¼Ç...
Track>Session :
Cyber Security > IoT/Fintech Security
¹ßÇ¥Á¦¸ñ :
½ÇÁ¦ »ç·Ê·Î ¾Ë¾Æº¸´Â IoT º¸¾ÈÀÇ ÇöÀç¿Í ¹Ì·¡
¹ßÇ¥ÀÚ :
±è¿ë´ë (±³¼ö/KAIST)
°¿¬¿ä¾à :
º» °¿¬¿¡¼´Â ÇöÀç Àü¼¼°è¿¡¼ Ãâ½ÃµÇ°í ÀÖ´Â ´Ù¾çÇÑ IoT ±â±âµé¿¡ ´ëÇÑ º¸¾È ¹®Á¦µé¿¡ ´ëÇÏ¿© »ìÆ캸°í ¹Ì·¡ IoT º¸¾È À̽´µé¿¡ ´ëÇÏ¿© »ý°¢ÇØ º¸°íÀÚ ÇÑ´Ù. ¸ÕÀú, ¿ì¸®³ª¶ó¿¡...
Track>Session :
Cyber Security > IoT/Fintech Security
¹ßÇ¥Á¦¸ñ :
IoT º¸¾È: ÇÙ½ÉÀ̽´´Â?
¹ßÇ¥ÀÚ :
Á¤¼öȯ (±³¼ö/¼þ½Ç´ëÇб³)
°¿¬¿ä¾à :
IoT º¸¾È ÇÙ½É À̽´¸¦ Á¤¸®ÇÏ°í, ´Ù¾çÇÑ IoT ȯ°æ¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â µµ¸ÞÀÎ º° º¸¾È À§Çù ¹× ´ëÀÀ ¹æ¾ÈµéÀ» »ìÆ캻´Ù. ¶ÇÇÑ Å¬¶ó¿ìµå¿Í °áÇÕµÈ IoT ¼ºñ½º ȯ°æ¿¡¼ ÇÊ¿äÇÑ º¸...
Track>Session :
Cyber Security > IoT/Fintech Security
¹ßÇ¥Á¦¸ñ :
IoT º¸¾ÈÀ» À§ÇÑ Á¦Ç°/¼ºñ½º ¼³°è Àü·«
¹ßÇ¥ÀÚ :
Àå¿ìÁø (ÆÀÀå/SKÀÎÆ÷¼½)
°¿¬¿ä¾à :
- IoT º¸¾ÈÀ§Çù¿¡ ´ëÀÀÇϱâ À§ÇÑ º¸¾È±â¼úÀ» »ìÆ캸°í IoT ¼ºñ½º »ç¾÷ÀÚ°¡ Á¦Ç° ±âȹ/¼³°è ½Ã Àû¿ë °¡´ÉÇÑ º¸¾È¿ä¼Ò¸¦ ±¸Çö¹æ¾È°ú ´õºÒ¾î ¼Ò°³ÇÑ´Ù. 1. IoT ¼ºñ½º °³¿ä A....
Track>Session :
Cyber Security > IoT/Fintech Security
¹ßÇ¥Á¦¸ñ :
Fintech »ç¿ëÀÚ ÀÎÁõ ±â¼ú µ¿Çâ ¹× Àü¸Á
¹ßÇ¥ÀÚ :
Áø½ÂÇå (º»ºÎÀå/ETRI)
°¿¬¿ä¾à :
- ÀÛ³âºÎÅÍ IT ±â¼úÀ» ±â¹ÝÀ¸·Î ´Ù¾çÇÑ ±ÝÀ¶¼ºñ½º¸¦ Á¦°øÇÏ´Â ÇÉÅ×Å©°¡ ÁÖ¿ä ȵÎÀÌ´Ù. ÇÉÅ×Å©´Â ±âº»ÀûÀ¸·Î ±ÝÀ¶¼ºñ½ºÀ̱⠶§¹®¿¡ º¸¾ÈÀÌ ÇʼöÀÌ´Ù. º» ¹ßÇ¥¿¡¼´Â ÇÉÅ×Å© »ç...
Track>Session :
Cyber Security > Cybersecurity Technology
¹ßÇ¥Á¦¸ñ :
Cybersecurity Intelligence
¹ßÇ¥ÀÚ :
À±Áö¿ø (±³¼ö/°í·Á´ëÇб³)
°¿¬¿ä¾à :
Á¤º¸¶ó´Â ´Ü¾î´Â Å©°Ô Information °ú Intelligence¶ó´Â µÎ°¡Áö ´Ü¾î°¡ Á¸ÀçÇÑ´Ù. InformationÀº µ¥ÀÌÅÍ ±× ÀÚüÀ̸ç ÀÌ·¯ÇÑ InformationÀ» ¿©·¯°¡Áö ÀǹÌÀÖ´Â ¹æ¹ýµé°ú ¼ö´ÜÀ» ...
Track>Session :
Cyber Security > Cybersecurity Technology
¹ßÇ¥Á¦¸ñ :
Tizen Security & Privacy
¹ßÇ¥ÀÚ :
Ȳ¿ëÈ£ (¼ö¼® (Security LabÀå)/»ï¼ºÀüÀÚ)
°¿¬¿ä¾à :
¿ÀÇ Ç÷§Æû ȯ°æ ¹× ½º¸¶Æ® ±â±â »ç¿ë ½Ã¿¡ º¸¾È°ú »ç¿ëÀÚ ÇÁ¶óÀ̹ö½Ã º¸È£´Â °³¹ßÀÚ¿Í »ç¿ëÀÚ ¸ðµÎ¿¡°Ô Áß¿äÇÑ °í·Á»çÇ×ÀÌ´Ù. ¿ÀÇ Ç÷§ÆûÀÎ TizenÀº °³¹ßÀڵ鿡°Ô ¾ÈÀüÇÑ App...
Track>Session :
Cyber Security > Cybersecurity Technology
¹ßÇ¥Á¦¸ñ :
Cloud Security with Homomorphic Encryption
¹ßÇ¥ÀÚ :
õÁ¤Èñ (±³¼ö/¼¿ï´ëÇб³)
°¿¬¿ä¾à :
¿ÏÀüµ¿Çü¾ÏÈ£´Â ¾ÏÈ£ÈµÈ »óÅ¿¡¼ ¸ðµç °è»êÀ» Áö¿øÇÏ´Â ÀÌ»óÀûÀÎ ¾ÏÈ£·Î¼ ¾ÏÈ£ÇаèÀÇ ¼º¹è(holy grail)·Î ºÒ¸®¸ç 1978³â ÀÌÈÄ ¿À·§µ¿¾È ¹ÌÇØ°á ¹®Á¦·Î ¾Ë·ÁÁ® ÀÖ¾ú´Ù. 2009³â...
Track>Session :
Special Open Sessions > Open Infrastructure for Science & Technology
¹ßÇ¥Á¦¸ñ :
¿ÀÇ»çÀ̾𽺸¦ ÅëÇÑ Çõ½Å ÃËÁø °¡´É¼º°ú Á¤Ã¥Àû °³¼±¹æ¾È
¹ßÇ¥ÀÚ :
Á¤ÀåÈÆ (ºÎ¿¬±¸À§¿ø/°úÇбâ¼úÁ¤Ã¥¿¬±¸¿ø)
°¿¬¿ä¾à :
- ¿ÀÇ»çÀ̾ð½ºÀÇ °³³äÀû ÀÌÇØ: Çõ½ÅÀ» À§ÇÑ Áö½Ä°³¹æ°ú °ø°ø¼º °È Áö¼Ó°¡´É¼º°ú °úÇбâ¼ú Çõ½ÅÀ» À§ÇØ ¿ÀÇ»çÀ̾𽺰¡ ±¹Á¦»çȸÀÇ ÁÖ¿ä ÀÇÁ¦·Î µîÀå - ±¹Á¦Àû ¿À...
01
02
03
04
05
06
07
08
09
10
¹ßÇ¥Á¦¸ñ
°¿¬¿ä¾à
¹ßÇ¥ÀÚ¸í
TOP