0.0(top 100%)
impact factor
202(top 50%)
papers
108(top 100%)
citations
5(top 50%)
h-index
0.0(top 100%)
impact factor
231
all documents
114
doc citations
7(top 100%)
g-index

Top Articles

#TitleJournalYearCitations
1An Analysis of Information Security Management System and Certification Standard for Information SecurityJournal of Security Engineering20149
2E-learning Privacy and Security Requirements: ReviewJournal of Security Engineering20138
3Survey of Security Threats and Contermeasures on Android EnvironmentJournal of Security Engineering20147
4A Study on the Security Technology for the Internet of ThingsJournal of Security Engineering20146
5A Design of Secure E-health Data Management SystemJournal of Security Engineering20155
6A Review on the Role Expansion of German Federal Office for Information Security(Bundesamt für Sicherheit in der Informationstechnik, BSI) in 2017Journal of Security Engineering20185
7Improvement of Personal Information Protection Level in the Military Using the Measurement of Disclosure RiskJournal of Security Engineering20153
8Method of Detecting SmiShing using SVMJournal of Security Engineering20133
9Towards on blockchain standardization including blockchain as a serviceJournal of Security Engineering20172
10The Improvement Plan of a Customized Cyber-Training Structure for enhancing the Capability of Cyber SecurityJournal of Security Engineering20152
11Design and Implementation of Fail Recovery Proces on Highly-Reliable Embeded Linux SystemJournal of Security Engineering20142
12Developing Warfare System SW Development Security Clasification System Using KJ methodJournal of Security Engineering20142
13Secure Coding Rule Selection Optimized on the Army Fire Control ComputerJournal of Security Engineering20142
14A Study on the Improvement and Supervisory Status for Personal Fiduciary Services in Financial InstitutionsJournal of Security Engineering20142
15Countermeasures against Anti-forensics by Analyzing Anti-forensics TechniquesJournal of Security Engineering20142
16A Suggestion for Information Security Awareness of Finance FirmsJournal of Security Engineering20142
17Remote User Authentication Scheme with Key Agreement Providing Forward SecrecyJournal of Security Engineering20152
18Development of Information System Operational Audit Checklist for Personal Information Protection in Public OrganizationsJournal of Security Engineering20152
19A Case Study of Employee Privacy leaks and Fraud during B2B transaction -Focused on Man in the Middle Attack Case-Journal of Security Engineering20152
20An Efficient and Secure Physical Security Method of Data CenterJournal of Security Engineering20152
21Cyber Profesionals Certification Evaluation Model for Reinforcing Cyberwar PowerJournal of Security Engineering20141
22A Proposal of Smart Phone App for Preventing Smishing AttackJournal of Security Engineering20151
23Certificateless-based Authenticated Key Agreement(AKA) Protocol Without PairingsJournal of Security Engineering20161
24Strengthening of Token Authentication Using Time-based RandomizationJournal of Security Engineering20171
25Security Model of Secure Cloud Computing ServicesJournal of Security Engineering20171
26Two-Factor Authentication Scheme based on Mobile Mesenger with Improved UsabilityJournal of Security Engineering20131
27Security Requirements of Order Communication System in Hospitals for Compliance with Personal Information Protection ActJournal of Security Engineering20131
28E-learning Ongoing Sesion Authentication SecurityJournal of Security Engineering20131
29A Study of Security Technique on Cloud based Healthcare SystemJournal of Security Engineering20131
30An Analysis of Security Vulnerability on Document Management Service by Cloud ComputingJournal of Security Engineering20131
31The Customized Scheme Structure for Prevent Cyber Threats on the Critical Information and Communication InfrastructureJournal of Security Engineering20131
32Research on Factors Efecting Online Service Loyalty : Mediating Efect of Perceived Personal Information ProtectionJournal of Security Engineering20131
33A Study on the Protection Plan of Digital ContentsJournal of Security Engineering20131
34A Study on Ninja Gateway Routing Using Backdor MethodJournal of Security Engineering20141
35A Framework for Personal Information Handler in Smart Device EnvironmentJournal of Security Engineering20141
36On Conditions to Satisfy White-Box CryptographyJournal of Security Engineering20141
37Investigation on NFC-based Security System for Smart WorkJournal of Security Engineering20141
38Development of Service Verification Methodology Based on Cloud Computing InteroperabilityJournal of Security Engineering20141
39Hybrid Key Management Using Self-Extended Certification and Hardware Security ModuleJournal of Security Engineering20141
40Limitation of Armed Response to Cyber Armed ConflictJournal of Security Engineering20141
41A Survey and Analysis of Security Vulnerability in Xen and KVMJournal of Security Engineering20141
42A Design of ETDTP(Energy Theft Detection and Traceback Protocol) for AMI(Advanced Metering Infrastructure) of Smart GridJournal of Security Engineering20141
43A Study on Train Plan For Copyright Infringement Forensics Professional in the CyberspaceJournal of Security Engineering20141
44Proposal of Security Requirements for Storage Virtualization System against Cloud Computing Security ThreatsJournal of Security Engineering20141
45Secure Coding Rule Selecting Evaluation for Air Warfare System Considering Military Air WorthinessJournal of Security Engineering20141
46Management Plan of Cyber Reserve Forces for Cyber WarfareJournal of Security Engineering20151
47A Congestion Avoidance Policy to extend lifetime of Sensor NetworksJournal of Security Engineering20151
48Remarks on Smart Watch Security Vulnerability and SolutionJournal of Security Engineering20151
49IPv6 Address Configuration for Privacy Protection in the IoTJournal of Security Engineering20151
50Propagation Modeling of Multiple Internet Worm VariantsJournal of Security Engineering20151