facebook
·Î±×ÀÎ
·Î±×ÀÎ
Àλ縻
Á¶Á÷
Á¶Á÷
ÁÖ°ü±â°ü
À§¿øȸ ±¸¼º
ÇÁ·Î±×·¥
ÇÁ·Î±×·¥
ÇÁ·Î±×·¥À϶÷
¼¼ºÎÇÁ·Î±×·¥
µî·Ï/Âü°¡¾È³»
µî·Ï/µî·Ï/Âü°¡¾È³»
»çÀüµî·Ï
µî·ÏÈ®ÀÎ
Âü°¡ ¾È³»
°Ô½ÃÆÇ
°Ô½ÃÆÇ
°øÁö»çÇ×
ÀÚ·á½Ç
Photo Gallery
Past KRnet
¼¼ºÎÇÁ·Î±×·¥
ÇÁ·Î±×·¥
¼¼ºÎÇÁ·Î±×·¥
¼¼ºÎÇÁ·Î±×·¥
114
.
5
12
---- ¼±Åà ----
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
---- ¼±Åà ----
---- ¼±Åà ----
Track
>
Session :
Cyber Security
>
Software-defined Security
¹ßÇ¥Á¦¸ñ :
°í¼Ó ½ºÆ®¸µ ÆÐÅÏ ¸ÅĪÀ» »ç¿ëÇÑ DPI ±â¹ÝÀÇ Network Function °í¼ÓÈ
¹ßÇ¥ÀÚ :
Çѵ¿¼ö (±³¼ö/KAIST)
°¿¬¿ä¾à :
Middlebox services that inspect packet payloads have become commonplace. Today, anyone can sign up for cloudbased Web application firewall with a single click. These services typically look for known patterns that might appear anywhere in the payload. The key challenge is that existing solutions for...more
Track
>
Session :
Cyber Security
>
Software-defined Security
¹ßÇ¥Á¦¸ñ :
Ŭ¶ó¿ìµå±â¹Ý º¸¾È¼ºñ½º¿Í Software-defined Security ±â¼ú
¹ßÇ¥ÀÚ :
±èÀÍ±Õ (½ÇÀå/ETRI)
°¿¬¿ä¾à :
³¯·Î Á¤±³ÇØÁö´Â »çÀ̹ö À§Çù¿¡ À¯±âÀûÀ¸·Î ´ëÀÀÇÏ°í, º¸¾È ±â´ÉÀÇ À¯¿¬¼ºÀ» Á¦°øÇϱâ À§ÇÏ¿© ÃÖ±Ù¿¡´Â ¡®¼ºñ½º·Î¼ÀÇ º¸¾È¡¯ÀÇ ¿ä±¸»çÇ×ÀÌ Áõ°¡ÇÏ°í ÀÖ´Ù. ÀÌ¿¡, º¸¾È ¼Ö·ç¼ÇÀÇ Á÷Á¢ÀûÀÎ ÅõÀÚ °í¹Î ¾øÀÌ ÁøÈÇÏ´Â º¸¾È ¹®Á¦¸¦ ÇØ°áÇÒ ¼ö ÀÖ´Â ´ë¾ÈÀ¸·Î¼, ´Ù¾çÇÑ È¯°æ¿¡¼ ¸ÂÃãÇü º¸¾È±â´ÉÀÌ µ¿ÀûÀ¸·Î Àû¿ëµÇ°í »çÀ̹ö À§...more
Track
>
Session :
Cyber Security
>
IoT/Fintech Security
¹ßÇ¥Á¦¸ñ :
½ÇÁ¦ »ç·Ê·Î ¾Ë¾Æº¸´Â IoT º¸¾ÈÀÇ ÇöÀç¿Í ¹Ì·¡
¹ßÇ¥ÀÚ :
±è¿ë´ë (±³¼ö/KAIST)
°¿¬¿ä¾à :
º» °¿¬¿¡¼´Â ÇöÀç Àü¼¼°è¿¡¼ Ãâ½ÃµÇ°í ÀÖ´Â ´Ù¾çÇÑ IoT ±â±âµé¿¡ ´ëÇÑ º¸¾È ¹®Á¦µé¿¡ ´ëÇÏ¿© »ìÆ캸°í ¹Ì·¡ IoT º¸¾È À̽´µé¿¡ ´ëÇÏ¿© »ý°¢ÇØ º¸°íÀÚ ÇÑ´Ù. ¸ÕÀú, ¿ì¸®³ª¶ó¿¡ Á¸ÀçÇÏ´Â ´Ù¾çÇÑ IoT ±â±âµé¿¡ Á¸ÀçÇÏ´Â ´Ù¾çÇÑ Ãë¾àÁ¡¿¡ ´ëÇÏ¿© »ìÆì º»´Ù. À̵é Ãë¾àÁ¡Àº °¡Á¤¿ë ±â±âºÎÅÍ ½ÃÀÛÇÏ¿© ±â¹Ý ½Ã¼³, ÀÚµ¿Â÷, ÀÇ·á...more
Track
>
Session :
Cyber Security
>
IoT/Fintech Security
¹ßÇ¥Á¦¸ñ :
IoT º¸¾È: ÇÙ½ÉÀ̽´´Â?
¹ßÇ¥ÀÚ :
Á¤¼öȯ (±³¼ö/¼þ½Ç´ëÇб³)
°¿¬¿ä¾à :
IoT º¸¾È ÇÙ½É À̽´¸¦ Á¤¸®ÇÏ°í, ´Ù¾çÇÑ IoT ȯ°æ¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â µµ¸ÞÀÎ º° º¸¾È À§Çù ¹× ´ëÀÀ ¹æ¾ÈµéÀ» »ìÆ캻´Ù. ¶ÇÇÑ Å¬¶ó¿ìµå¿Í °áÇÕµÈ IoT ¼ºñ½º ȯ°æ¿¡¼ ÇÊ¿äÇÑ º¸¾È Àü·«Àº ¹«¾ùÀÎÁö ³íÀÇÇÑ´Ù.more
Track
>
Session :
Cyber Security
>
IoT/Fintech Security
¹ßÇ¥Á¦¸ñ :
IoT º¸¾ÈÀ» À§ÇÑ Á¦Ç°/¼ºñ½º ¼³°è Àü·«
¹ßÇ¥ÀÚ :
Àå¿ìÁø (ÆÀÀå/SKÀÎÆ÷¼½)
°¿¬¿ä¾à :
- IoT º¸¾ÈÀ§Çù¿¡ ´ëÀÀÇϱâ À§ÇÑ º¸¾È±â¼úÀ» »ìÆ캸°í IoT ¼ºñ½º »ç¾÷ÀÚ°¡ Á¦Ç° ±âȹ/¼³°è ½Ã Àû¿ë °¡´ÉÇÑ º¸¾È¿ä¼Ò¸¦ ±¸Çö¹æ¾È°ú ´õºÒ¾î ¼Ò°³ÇÑ´Ù. 1. IoT ¼ºñ½º °³¿ä A. IoT ¼ºñ½º ±¸°£ Á¤ÀÇ ¹× ¼ºñ½º ±¸Çö ±â¼ú¿ä¼Ò 2. IoT ¼ºñ½º ±¸°£ º° Ãë¾àÁ¡ ¹× º¸¾È ±â¼ú A. Device Ãë¾àÁ¡ ¹× º¸¾È±â¼ú B. N/W Ãë¾àÁ¡ ...more
Track
>
Session :
Cyber Security
>
IoT/Fintech Security
¹ßÇ¥Á¦¸ñ :
Fintech »ç¿ëÀÚ ÀÎÁõ ±â¼ú µ¿Çâ ¹× Àü¸Á
¹ßÇ¥ÀÚ :
Áø½ÂÇå (º»ºÎÀå/ETRI)
°¿¬¿ä¾à :
- ÀÛ³âºÎÅÍ IT ±â¼úÀ» ±â¹ÝÀ¸·Î ´Ù¾çÇÑ ±ÝÀ¶¼ºñ½º¸¦ Á¦°øÇÏ´Â ÇÉÅ×Å©°¡ ÁÖ¿ä ȵÎÀÌ´Ù. ÇÉÅ×Å©´Â ±âº»ÀûÀ¸·Î ±ÝÀ¶¼ºñ½ºÀ̱⠶§¹®¿¡ º¸¾ÈÀÌ ÇʼöÀÌ´Ù. º» ¹ßÇ¥¿¡¼´Â ÇÉÅ×Å© »ç¿ëÀÚ ÀÎÁõ±â¼ú µ¿Çâ¿¡ ´ëÇؼ »ìÆ캸°í, ±× Áß¿¡¼ ±¸±Û, ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®»ç µî°ú °°Àº ±Û·Î¹ú ±â¾÷µéÀÌ Âü¿©ÇÏ¿© È°¹ßÇÏ°Ô È°µ¿ÁßÀÎ FIDO Allian...more
Track
>
Session :
Cyber Security
>
Cybersecurity Technology
¹ßÇ¥Á¦¸ñ :
Cybersecurity Intelligence
¹ßÇ¥ÀÚ :
À±Áö¿ø (±³¼ö/°í·Á´ëÇб³)
°¿¬¿ä¾à :
Á¤º¸¶ó´Â ´Ü¾î´Â Å©°Ô Information °ú Intelligence¶ó´Â µÎ°¡Áö ´Ü¾î°¡ Á¸ÀçÇÑ´Ù. InformationÀº µ¥ÀÌÅÍ ±× ÀÚüÀ̸ç ÀÌ·¯ÇÑ InformationÀ» ¿©·¯°¡Áö ÀǹÌÀÖ´Â ¹æ¹ýµé°ú ¼ö´ÜÀ» ÅëÇØ Á¤Á¦ÇÏ°í ó¸®ÇÏ¿© ºÐ¼®¿¡ À̸£·¯¼ ¾ò¾îÁö´Â °¡Ä¡ÀÖ´Â Á¤º¸°¡ ¹Ù·Î Intelligence·Î¼ ÃÖ±ÙÀÇ À̽´ÀÎ ºòµ¥ÀÌÅͺм®°úµµ ¿¬°áÁöÀ»¼ö ÀÖÀ¸¸ç ...more
Track
>
Session :
Cyber Security
>
Cybersecurity Technology
¹ßÇ¥Á¦¸ñ :
Tizen Security & Privacy
¹ßÇ¥ÀÚ :
Ȳ¿ëÈ£ (¼ö¼® (Security LabÀå)/»ï¼ºÀüÀÚ)
°¿¬¿ä¾à :
¿ÀÇ Ç÷§Æû ȯ°æ ¹× ½º¸¶Æ® ±â±â »ç¿ë ½Ã¿¡ º¸¾È°ú »ç¿ëÀÚ ÇÁ¶óÀ̹ö½Ã º¸È£´Â °³¹ßÀÚ¿Í »ç¿ëÀÚ ¸ðµÎ¿¡°Ô Áß¿äÇÑ °í·Á»çÇ×ÀÌ´Ù. ¿ÀÇ Ç÷§ÆûÀÎ TizenÀº °³¹ßÀڵ鿡°Ô ¾ÈÀüÇÑ App °³¹ßȯ°æÀ» Á¦°øÇÏ°í »ç¿ëÀÚ Privacy µ¥ÀÌÅÍ º¸È£¸¦ À§ÇØ ±â¼úÀûÀÎ Ãø¸é°ú »ç¿ë ÆíÀǼº Ãø¸é¿¡¼ º¸¾È ±â´ÉµéÀ» °ÈÇسª°¡°í ÀÖ´Ù. »õ·Ó°Ô °ø...more
Track
>
Session :
Cyber Security
>
Cybersecurity Technology
¹ßÇ¥Á¦¸ñ :
Cloud Security with Homomorphic Encryption
¹ßÇ¥ÀÚ :
õÁ¤Èñ (±³¼ö/¼¿ï´ëÇб³)
°¿¬¿ä¾à :
¿ÏÀüµ¿Çü¾ÏÈ£´Â ¾ÏÈ£ÈµÈ »óÅ¿¡¼ ¸ðµç °è»êÀ» Áö¿øÇÏ´Â ÀÌ»óÀûÀÎ ¾ÏÈ£·Î¼ ¾ÏÈ£ÇаèÀÇ ¼º¹è(holy grail)·Î ºÒ¸®¸ç 1978³â ÀÌÈÄ ¿À·§µ¿¾È ¹ÌÇØ°á ¹®Á¦·Î ¾Ë·ÁÁ® ÀÖ¾ú´Ù. 2009³â Gentry¿¡ ÀÇÇØ Ã³À½ ¸¸µé¾îÁø µ¿Çü¾ÏÈ£´Â ±¸ÇöÀÌ °ÅÀÇ ºÒ°¡´ÉÇÒ Á¤µµ·Î º¹ÀâÇÏ¿´À¸³ª ÀÌÈÄ ¸¹Àº ¿¬±¸¸¦ ÅëÇØ ½Ç¿ë °¡´ÉÇÑ ½ºÅ´µéÀÌ Á¦½ÃµÇ°í ÀÖ...more
Track
>
Session :
Special Open Sessions
>
Open Infrastructure for Science & Technology
¹ßÇ¥Á¦¸ñ :
¿ÀÇ»çÀ̾𽺸¦ ÅëÇÑ Çõ½Å ÃËÁø °¡´É¼º°ú Á¤Ã¥Àû °³¼±¹æ¾È
¹ßÇ¥ÀÚ :
Á¤ÀåÈÆ (ºÎ¿¬±¸À§¿ø/°úÇбâ¼úÁ¤Ã¥¿¬±¸¿ø)
°¿¬¿ä¾à :
- ¿ÀÇ»çÀ̾ð½ºÀÇ °³³äÀû ÀÌÇØ: Çõ½ÅÀ» À§ÇÑ Áö½Ä°³¹æ°ú °ø°ø¼º °È Áö¼Ó°¡´É¼º°ú °úÇбâ¼ú Çõ½ÅÀ» À§ÇØ ¿ÀÇ»çÀ̾𽺰¡ ±¹Á¦»çȸÀÇ ÁÖ¿ä ÀÇÁ¦·Î µîÀå - ±¹Á¦Àû ¿ÀÇ»çÀ̾ð½º(open science) ÇÁ·ÎÁ§Æ®ÀÇ µ¿Çâ OECD °ü·Ã ÇÁ·ÎÁ§Æ®, EU ÇÁ·ÎÁ§Æ® µî - Çѱ¹ ¿ÀÇ»çÀ̾𽺠°ü·Ã µ¿Çâ Çѱ¹ ¿ª...more
01
02
03
04
05
06
07
08
09
10
¹ßÇ¥Á¦¸ñ
°¿¬¿ä¾à
¹ßÇ¥ÀÚ¸í
TOP