¼¼ºÎÇÁ·Î±×·¥

 

83.   99
Track > Session : Forensics and Security / e-Goverment > Security Hot Issues
¹ßÇ¥Á¦¸ñ : Network Behavior Analysis for Unknown Attack Detection
¹ßÇ¥ÀÚ : Àü´öÁ¶ (´ëÇ¥ÀÌ»ç/¾¾Å¥ºñ½ºÅ¸)
°­¿¬¿ä¾à : ±âÁ¸ÀÇ ³×Æ®¿öÅ© º¸¾È±â¼úÀº ¾Ë·ÁÁø °ø°ÝÀÇ Å½Áö ¹× ¹æÁö¿¡ ÁýÁߵǾî ÀÖÀ¸¸ç µû¶ó¼­ Zero-day °ø°Ý °ú °°Àº ½ÅÁ¾°ø°Ý ¹× DDoS °ø°Ý°ú °°ÀÌ µ¿ÀûÀ¸·Î ¹ß»ýÇϴ Ư¼ºÀ» Áö´Ñ °ø°Ý¿¡ ´ëÇÑ ´ëÀÀ´É·ÂÃø¸é¿¡ ¼­´Â ¸Å¿ì Ãë¾àÇÏ´Ù. µû¶ó¼­ ¸¹Àº ¿¬±¸Àڵ鿡 ÀÇÇؼ­ ¾Ë·ÁÁöÁö ¾ÊÀº °ø°ÝÀ» ŽÁöÇϱâ À§ÇÑ ¸¹Àº ¿¬ ±¸ °¡ ÁøÇàµÇ°í ...more
Track > Session : Forensics and Security / e-Goverment > Security Hot Issues
¹ßÇ¥Á¦¸ñ : Detection and Response Technology for Botnets
¹ßÇ¥ÀÚ : Á¤Çöö (ÆÀÀå/KISA)
°­¿¬¿ä¾à : º¿³ÝÀº ¾Ç¼ºÄڵ忡 °¨¿°µÈ ¼ö¸¹Àº Á»ºñ PCµéÀ» ¿ø°Ý¿¡¼­ Á¦¾îÇÏ¿©, °ø°ÝÀÚ°¡ ¿øÇÏ´Â ¾ÇÀÇÀûÀÎ ÇàÀ§ ¸¦ ÀÏ»çºÒ¶õÇÏ°Ô ¼öÇàÇÏ´Â ÀÏÁ¾ÀÇ »çÀ̹ö ±º´ë ¿ªÇÒÀ» ÇÑ´Ù. º¿³ÝÀº Çù¹Ú¼º DDoS °ø°Ý, ºÒ¹ý ½ºÆÔ ¹ß ¼Û, °³ÀÎÁ¤º¸ À¯Ãâ µî ÁÖ·Î ¹üÁËÀûÀÎ ¸ñÀûÀ¸·Î ¸¹ÀÌ ¾Ç¿ëµÇ°í ÀÖ´Ù. ÃÖ±Ù º¿³ÝÀ¸·Î ÀÎÇÑ ÇÇÇØ´Â Áö¼ÓÀûÀ¸·Î Áõ°¡ÇÏ...more
Track > Session : Forensics and Security / e-Goverment > Security Hot Issues
¹ßÇ¥Á¦¸ñ : Mobile Device Security: Securing SmartPhone, PDA and more
¹ßÇ¥ÀÚ : ±è±â¿µ (ÆÀÀå/ETRI)
°­¿¬¿ä¾à : À¯ºñÄõÅͽº »çȸÀÇ µµ·¡·Î ÀÎÇÏ¿© À̵¿ÀüÈ­, PDA, DMB, ³ëÆ®ºÏ°ú °°ÀÌ µ¶¸³ÀûÀÎ ÇüÅÂÀÇ °³ÀÎÈÞ´ë ´Ü ¸»µéÀÌ Á¡Â÷ÀûÀ¸·Î ±â´ÉÀû, ¼­ºñ½ºÀûÀ¸·Î ÅëÇյǾî À¶.º¹ÇÕ ³×Æ®¿öÅ© ¹× ¼­ºñ½ºÈ¯°æ¿¡¼­ »ç¿ëµÇ´Â º¹Çմܸ»ÀÇ ÇüÅ·ΠÁøÈ­ÇÏ°í ÀÖ¾î ÀÌµé º¹Çմܸ»¿¡ ´ëÇÑ Ä§Çؽõµ¸¦ ŽÁö, Â÷´ÜÇÏ°í ÀúÀåµÈ ¹Î°¨µ¥ ÀÌÅÍÀÇ º¸È£¸¦ ...more
 01 02 03 04 05 06 07 08 09