¼¼ºÎÇÁ·Î±×·¥

 

114.   512
Track>Session : Cyber Security > Software-defined Security
¹ßÇ¥Á¦¸ñ : °í¼Ó ½ºÆ®¸µ ÆÐÅÏ ¸ÅĪÀ» »ç¿ëÇÑ DPI ±â¹ÝÀÇ Network Function °í¼ÓÈ­
¹ßÇ¥ÀÚ : Çѵ¿¼ö (±³¼ö/KAIST)
°­¿¬¿ä¾à : Middlebox services that inspect packet payloads have become commonplace. Today, anyone can sign up for cloudbased Web application firewall with a single click. These...
Track>Session : Cyber Security > Software-defined Security
¹ßÇ¥Á¦¸ñ : Ŭ¶ó¿ìµå±â¹Ý º¸¾È¼­ºñ½º¿Í Software-defined Security ±â¼ú
¹ßÇ¥ÀÚ : ±èÀÍ±Õ (½ÇÀå/ETRI)
°­¿¬¿ä¾à : ³¯·Î Á¤±³ÇØÁö´Â »çÀ̹ö À§Çù¿¡ À¯±âÀûÀ¸·Î ´ëÀÀÇÏ°í, º¸¾È ±â´ÉÀÇ À¯¿¬¼ºÀ» Á¦°øÇϱâ À§ÇÏ¿© ÃÖ±Ù¿¡´Â ¡®¼­ºñ½º·Î¼­ÀÇ º¸¾È¡¯ÀÇ ¿ä±¸»çÇ×ÀÌ Áõ°¡ÇÏ°í ÀÖ´Ù. ÀÌ¿¡, º¸¾È ¼Ö·ç¼Ç...
Track>Session : Cyber Security > IoT/Fintech Security
¹ßÇ¥Á¦¸ñ : ½ÇÁ¦ »ç·Ê·Î ¾Ë¾Æº¸´Â IoT º¸¾ÈÀÇ ÇöÀç¿Í ¹Ì·¡
¹ßÇ¥ÀÚ : ±è¿ë´ë (±³¼ö/KAIST)
°­¿¬¿ä¾à : º» °­¿¬¿¡¼­´Â ÇöÀç Àü¼¼°è¿¡¼­ Ãâ½ÃµÇ°í ÀÖ´Â ´Ù¾çÇÑ IoT ±â±âµé¿¡ ´ëÇÑ º¸¾È ¹®Á¦µé¿¡ ´ëÇÏ¿© »ìÆ캸°í ¹Ì·¡ IoT º¸¾È À̽´µé¿¡ ´ëÇÏ¿© »ý°¢ÇØ º¸°íÀÚ ÇÑ´Ù. ¸ÕÀú, ¿ì¸®³ª¶ó¿¡...
Track>Session : Cyber Security > IoT/Fintech Security
¹ßÇ¥Á¦¸ñ : IoT º¸¾È: ÇÙ½ÉÀ̽´´Â?
¹ßÇ¥ÀÚ : Á¤¼öȯ (±³¼ö/¼þ½Ç´ëÇб³)
°­¿¬¿ä¾à : IoT º¸¾È ÇÙ½É À̽´¸¦ Á¤¸®ÇÏ°í, ´Ù¾çÇÑ IoT ȯ°æ¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â µµ¸ÞÀÎ º° º¸¾È À§Çù ¹× ´ëÀÀ ¹æ¾ÈµéÀ» »ìÆ캻´Ù. ¶ÇÇÑ Å¬¶ó¿ìµå¿Í °áÇÕµÈ IoT ¼­ºñ½º ȯ°æ¿¡¼­ ÇÊ¿äÇÑ º¸...
Track>Session : Cyber Security > IoT/Fintech Security
¹ßÇ¥Á¦¸ñ : IoT º¸¾ÈÀ» À§ÇÑ Á¦Ç°/¼­ºñ½º ¼³°è Àü·«
¹ßÇ¥ÀÚ : Àå¿ìÁø (ÆÀÀå/SKÀÎÆ÷¼½)
°­¿¬¿ä¾à : - IoT º¸¾ÈÀ§Çù¿¡ ´ëÀÀÇϱâ À§ÇÑ º¸¾È±â¼úÀ» »ìÆ캸°í IoT ¼­ºñ½º »ç¾÷ÀÚ°¡ Á¦Ç° ±âȹ/¼³°è ½Ã Àû¿ë °¡´ÉÇÑ º¸¾È¿ä¼Ò¸¦ ±¸Çö¹æ¾È°ú ´õºÒ¾î ¼Ò°³ÇÑ´Ù. 1. IoT ¼­ºñ½º °³¿ä A....
Track>Session : Cyber Security > IoT/Fintech Security
¹ßÇ¥Á¦¸ñ : Fintech »ç¿ëÀÚ ÀÎÁõ ±â¼ú µ¿Çâ ¹× Àü¸Á
¹ßÇ¥ÀÚ : Áø½ÂÇå (º»ºÎÀå/ETRI)
°­¿¬¿ä¾à : - ÀÛ³âºÎÅÍ IT ±â¼úÀ» ±â¹ÝÀ¸·Î ´Ù¾çÇÑ ±ÝÀ¶¼­ºñ½º¸¦ Á¦°øÇÏ´Â ÇÉÅ×Å©°¡ ÁÖ¿ä È­µÎÀÌ´Ù. ÇÉÅ×Å©´Â ±âº»ÀûÀ¸·Î ±ÝÀ¶¼­ºñ½ºÀ̱⠶§¹®¿¡ º¸¾ÈÀÌ ÇʼöÀÌ´Ù. º» ¹ßÇ¥¿¡¼­´Â ÇÉÅ×Å© »ç...
Track>Session : Cyber Security > Cybersecurity Technology
¹ßÇ¥Á¦¸ñ : Cybersecurity Intelligence
¹ßÇ¥ÀÚ : À±Áö¿ø (±³¼ö/°í·Á´ëÇб³)
°­¿¬¿ä¾à : Á¤º¸¶ó´Â ´Ü¾î´Â Å©°Ô Information °ú Intelligence¶ó´Â µÎ°¡Áö ´Ü¾î°¡ Á¸ÀçÇÑ´Ù. InformationÀº µ¥ÀÌÅÍ ±× ÀÚüÀ̸ç ÀÌ·¯ÇÑ InformationÀ» ¿©·¯°¡Áö ÀǹÌÀÖ´Â ¹æ¹ýµé°ú ¼ö´ÜÀ» ...
Track>Session : Cyber Security > Cybersecurity Technology
¹ßÇ¥Á¦¸ñ : Tizen Security & Privacy
¹ßÇ¥ÀÚ : Ȳ¿ëÈ£ (¼ö¼® (Security LabÀå)/»ï¼ºÀüÀÚ)
°­¿¬¿ä¾à : ¿ÀÇ Ç÷§Æû ȯ°æ ¹× ½º¸¶Æ® ±â±â »ç¿ë ½Ã¿¡ º¸¾È°ú »ç¿ëÀÚ ÇÁ¶óÀ̹ö½Ã º¸È£´Â °³¹ßÀÚ¿Í »ç¿ëÀÚ ¸ðµÎ¿¡°Ô Áß¿äÇÑ °í·Á»çÇ×ÀÌ´Ù. ¿ÀÇ Ç÷§ÆûÀÎ TizenÀº °³¹ßÀڵ鿡°Ô ¾ÈÀüÇÑ App...
Track>Session : Cyber Security > Cybersecurity Technology
¹ßÇ¥Á¦¸ñ : Cloud Security with Homomorphic Encryption
¹ßÇ¥ÀÚ : õÁ¤Èñ (±³¼ö/¼­¿ï´ëÇб³)
°­¿¬¿ä¾à : ¿ÏÀüµ¿Çü¾ÏÈ£´Â ¾ÏȣȭµÈ »óÅ¿¡¼­ ¸ðµç °è»êÀ» Áö¿øÇÏ´Â ÀÌ»óÀûÀÎ ¾ÏÈ£·Î¼­ ¾ÏÈ£ÇаèÀÇ ¼º¹è(holy grail)·Î ºÒ¸®¸ç 1978³â ÀÌÈÄ ¿À·§µ¿¾È ¹ÌÇØ°á ¹®Á¦·Î ¾Ë·ÁÁ® ÀÖ¾ú´Ù. 2009³â...
Track>Session : Special Open Sessions > Open Infrastructure for Science & Technology
¹ßÇ¥Á¦¸ñ : ¿ÀÇ»çÀ̾𽺸¦ ÅëÇÑ Çõ½Å ÃËÁø °¡´É¼º°ú Á¤Ã¥Àû °³¼±¹æ¾È
¹ßÇ¥ÀÚ : Á¤ÀåÈÆ (ºÎ¿¬±¸À§¿ø/°úÇбâ¼úÁ¤Ã¥¿¬±¸¿ø)
°­¿¬¿ä¾à : - ¿ÀÇ»çÀ̾ð½ºÀÇ °³³äÀû ÀÌÇØ: Çõ½ÅÀ» À§ÇÑ Áö½Ä°³¹æ°ú °ø°ø¼º °­È­  Áö¼Ó°¡´É¼º°ú °úÇбâ¼ú Çõ½ÅÀ» À§ÇØ ¿ÀÇ»çÀ̾𽺰¡ ±¹Á¦»çȸÀÇ ÁÖ¿ä ÀÇÁ¦·Î µîÀå - ±¹Á¦Àû ¿À...
 01 02 03 04 05 06 07 08 09 10