{"id":35,"date":"2014-12-21T14:33:01","date_gmt":"2014-12-21T14:33:01","guid":{"rendered":"http:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=35"},"modified":"2026-01-24T07:25:40","modified_gmt":"2026-01-23T22:25:40","slug":"projects","status":"publish","type":"page","link":"https:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=35","title":{"rendered":"Projects"},"content":{"rendered":"<h2>Ongoing Projects<\/h2>\n<ul>\n<li>Development of international standards for interoperability of counter-UAS<br \/>\nTitle in Korean: \ub300\ub4dc\ub860 \ud1b5\ud569\uccb4\uacc4\uc758 \uc0c1\ud638\uc6b4\uc6a9\uc744 \uc704\ud55c \uad6d\uc81c\ud45c\uc900 \uac1c\ubc1c<br \/>\nSponsoring Authority: Korea Planning &amp; Evaluation Institute of Industrial Technology (KEIT, \uc0b0\uc5c5\uae30\uc220\uae30\ud68d\ud3c9\uac00\uc6d0)<br \/>\nDuration: 2025-07-01 \u2013 2029-12-31<\/li>\n<\/ul>\n<ul>\n<li>Training Global Talent for Copyright Protection and Management of On-Device AI Models<br \/>\nTitle in Korean: On-Device AI \ubaa8\ub378 \uc800\uc791\uad8c \ubcf4\ud638 \ubc0f \uad00\ub9ac\ub97c \uc704\ud55c \uae00\ub85c\ubc8c \uc778\uc7ac\uc591\uc131<br \/>\nSponsoring Authority: Korea Creative Content Agency (KOCCA, \ud55c\uad6d\ucf58\ud150\uce20\uc9c4\ud765\uc6d0)<br \/>\nDuration: 2025-04-01 \u2013 2028-12-31<\/li>\n<\/ul>\n<ul>\n<li>Research and international cooperation on trust model-based intelligent breach response technology in 6G open network environment<br \/>\nTitle in Korean: 6G \uac1c\ubc29\ud615 \ub124\ud2b8\uc6cc\ud06c \ud658\uacbd\uc5d0\uc11c \ud2b8\ub7ec\uc2a4\ud2b8 \ubaa8\ub378 \uae30\ubc18 \uc9c0\ub2a5\ud615 \uce68\ud574\ub300\uc751 \uae30\uc220 \uc5f0\uad6c \ubc0f \uad6d\uc81c\ud611\ub825<br \/>\nSponsoring Authority: Institute for Information &amp; Communications Technology Promotion (IITP, \uc815\ubcf4\ud1b5\uc2e0\uae30\ud68d\ud3c9\uac00\uc6d0)<br \/>\nDuration: 2024-07-01 \u2013 2026-12-31<\/li>\n<\/ul>\n<ul>\n<li>Study of the Development of Defense Technology for Military Facilities and Equipment in Cyber Battlefield<br \/>\nTitle in Korean: \uc0ac\uc774\ubc84\uc804\uc7a5 \uc0c1\ud669\uc5d0\uc11c\uc758 \uad70\uc0ac\uc2dc\uc124 \ubc0f \uc7a5\ube44 \ubc29\uc5b4\uae30\uc220 \uac1c\ubc1c \uc5f0\uad6c<br \/>\nSponsoring Authority: Agency of Defense Development (ADD, \uad6d\ubc29\uacfc\ud559\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2023-08-01 \u2013 2026-07-31<\/li>\n<\/ul>\n<h2>Completed Projects<\/h2>\n<ul>\n<li>Development of Standards for Personal Information Protection in the Blockchain Environment<br \/>\nTitle in Korean: \ube14\ub85d\uccb4\uc778 \ud658\uacbd\uc5d0\uc11c\uc758 \uac1c\uc778\uc815\ubcf4\ubcf4\ud638 \ud45c\uc900\uac1c\ubc1c<br \/>\nSponsoring Authority: Korea Internet &amp; Security Agency (KISA, \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0)<br \/>\nDuration: 2023-04-01 \u2013 2025-12-31<\/li>\n<\/ul>\n<ul>\n<li>Study of the application of multi-factor authentication for Mydata platforms<br \/>\nTitle in Korean: \ub9c8\uc774\ub370\uc774\ud130 \ud50c\ub7ab\ud3fc\uc744 \uc704\ud55c \ub2e4\uc911 \uc778\uc99d \uae30\uc220 \uc801\uc6a9 \uc5f0\uad6c<br \/>\nSponsoring Authority: Korea Institute of Science and Technology Information (KISTI, \ud55c\uad6d\uacfc\ud559\uae30\uc220\uc815\ubcf4\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2025-05-01 \u2013 2025-10-31<\/li>\n<\/ul>\n<ul>\n<li>Study of Antidrone System Standards Conformance Testing<br \/>\nTitle in Korean: \uc548\ud2f0\ub4dc\ub860 \uc2dc\uc2a4\ud15c \ud45c\uc900 \uc801\ud569\uc131 \uac80\uc99d \uc5f0\uad6c<br \/>\nSponsoring Authority: National Security Research Institute (NSR, \uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2025-04-01 \u2013 2025-10-31<\/li>\n<\/ul>\n<ul>\n<li>Development of Software Copyright Application Technology for Fair Trade and Distribution<br \/>\nTitle in Korean: \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc800\uc791\uad8c \uc720\ud1b5 \uc5f0\uad6c<br \/>\nSponsoring Authority:\u00a0National Research Foundation of Korea (NRF, \ud55c\uad6d\uc5f0\uad6c\uc7ac\ub2e8)<br \/>\nDuration: 2022-06-01 \u2013 2025-02-28<\/li>\n<\/ul>\n<ul>\n<li>Analysis of Candidate Technologies for International Standards based on 6G Security Internalization Use Cases<br \/>\nTitle in Korean: 6G \ubcf4\uc548 \ub0b4\uc7ac\ud654 \uc720\uc988\ucf00\uc774\uc2a4 \uae30\ubc18\uc758 \uad6d\uc81c\ud45c\uc900 \ud6c4\ubcf4 \uae30\uc220 \ubd84\uc11d<br \/>\nSponsoring Authority: Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2024-01-01 \u2013 2024-12-31<\/li>\n<\/ul>\n<ul>\n<li>Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security<br \/>\nTitle in Korean: \uc0c1\uc2dc\uc801 \ubcf4\uc548\ud488\uc9c8 \ubcf4\uc7a5\uc744 \uc704\ud55c 6G \uc790\uc728\ubcf4\uc548 \ub0b4\uc7ac\ud654 \uae30\ubc18\uae30\uc220 \uc5f0\uad6c<br \/>\nSponsoring Authority: Institute for Information &amp; Communications Technology Promotion (IITP, \uc815\ubcf4\ud1b5\uc2e0\uae30\ud68d\ud3c9\uac00\uc6d0)<br \/>\nDuration: 2021-04-01 \u2013 2024-12-31<\/li>\n<\/ul>\n<ul>\n<li>Research on Personal Information Protection Processing Technology for Mydata Platform<br \/>\nTitle in Korean: \ub9c8\uc774\ub370\uc774\ud130 \ud50c\ub7ab\ud3fc\uc744 \uc704\ud55c \uac1c\uc778\uc815\ubcf4\ubcf4\ud638 \ucc98\ub9ac\uae30\uc220 \uc5f0\uad6c<br \/>\nSponsoring Authority: Korea Institute of Science and Technology Information (KISTI, \ud55c\uad6d\uacfc\ud559\uae30\uc220\uc815\ubcf4\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2024-05-01 \u2013 2024-10-31<\/li>\n<\/ul>\n<ul>\n<li>Study of Requirements Analysis and Standardization of Data Specifications for Interoperability of Anti-Drone System<br \/>\nTitle in Korean: \uc548\ud2f0\ub4dc\ub860\uc2dc\uc2a4\ud15c \uc5f0\ub3d9 \ub370\uc774\ud130 \uaddc\uaca9 \uc694\uad6c\uc0ac\ud56d \ubd84\uc11d \ubc0f \ud45c\uc900\ud654 \uc5f0\uad6c<br \/>\nSponsoring Authority: National Security Research Institute (NSR, \uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2024-04-01 \u2013 2024-10-31<\/li>\n<\/ul>\n<ul>\n<li>Development of Security by Design and Security Management Technology in Smart factory<br \/>\nTitle in Korean: \uc2a4\ub9c8\ud2b8\uacf5\uc7a5 \ubcf4\uc548 \ub0b4\uc7ac\ud654 \ubc0f \ubcf4\uc548\uad00\ub9ac \uae30\uc220 \uac1c\ubc1c<br \/>\nSponsoring Authority: Institute for Information &amp; Communications Technology Promotion (IITP, \uc815\ubcf4\ud1b5\uc2e0\uae30\ud68d\ud3c9\uac00\uc6d0)<br \/>\nDuration: 2022-01-01 \u2013 2024-06-30<\/li>\n<\/ul>\n<ul>\n<li>Research Laboratory of RAS Assurance for Cognitive Collaborative Embedded Systems Software<br \/>\nTitle in Korean: \uc0c1\ud669\uc778\uc9c0 \uae30\ubc18 \uad70\uc9d1\ud611\uc5c5\ud615 \uc784\ubca0\ub514\ub4dc SW\uc758 RAS \ubcf4\uc99d \uc5f0\uad6c\uc2e4<br \/>\nSponsoring Authority: National Research Foundation of Korea (NRF, \ud55c\uad6d\uc5f0\uad6c\uc7ac\ub2e8)<br \/>\nDuration: 2021-03-01 \u2013 2024-02-29<\/li>\n<\/ul>\n<ul>\n<li>Collection of 6G infrastructure attack traffic and development of datasets through international collaborative<br \/>\nTitle in Korean: 6G \uc778\ud504\ub77c \uacf5\uaca9 \ud2b8\ub798\ud53d \uc218\uc9d1 \ubc0f \uad6d\uc81c \uacf5\ub3d9 \ub370\uc774\ud130\uc138\ud2b8 \uac1c\ubc1c<br \/>\nSponsoring Authority: Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2023-08-03 \u2013 2023-11-30<\/li>\n<\/ul>\n<ul>\n<li>Study of the Evaluation of the Importance of Infrastructure in the Public Sector and the Improvement of Designation Standards<br \/>\nTitle in Korean: \uacf5\uacf5\ubd84\uc57c \uae30\ubc18\uc2dc\uc124 \uc911\uc694\ub3c4 \ud3c9\uac00 \ubc0f \uc9c0\uc815\uae30\uc900 \uac1c\uc120\ubc29\uc548 \uc5f0\uad6c<br \/>\nSponsoring Authority: National Security Research Institute (NSR, \uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2023-04-01 \u2013 2023-10-31<\/li>\n<\/ul>\n<ul>\n<li>Study of Security Standardization Trends for Drone and Anti-drone Systems and Establishment of Strategies for Propulsion<br \/>\nTitle in Korean: \ub4dc\ub860\u00b7\uc548\ud2f0\ub4dc\ub860 \uc2dc\uc2a4\ud15c \ubcf4\uc548 \ud45c\uc900\ud654 \ub3d9\ud5a5 \ubd84\uc11d \ubc0f \ucd94\uc9c4\uc804\ub7b5 \uc218\ub9bd \uc5f0\uad6c<br \/>\nSponsoring Authority: National Security Research Institute (NSR, \uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2023-04-01 \u2013 2023-10-31<\/li>\n<\/ul>\n<ul>\n<li>Study of International Standardization for Edge-based Virtualization Security Technology in 6G Environments<br \/>\nTitle in Korean: 6G \ud658\uacbd\uc5d0\uc11c Edge \uae30\ubc18 \uac00\uc0c1\ud654 \ubcf4\uc548 \uae30\uc220 \uad6d\uc81c\ud45c\uc900\ud654 \uc5f0\uad6c<br \/>\nSponsoring Authority: Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2023-01-01 \u2013 2023-12-31<\/li>\n<\/ul>\n<ul>\n<li>Research and Development of Realistic 4D Content Generation and Copyright Protection Core Technology with Artificial Intelligence<br \/>\nTitle in Korean: \uc778\uacf5\uc9c0\ub2a5\uc744 \ud65c\uc6a9\ud55c 4D \uc2e4\uac10 \ucf58\ud150\uce20 \ucc3d\uc791\ubb3c \uc0dd\uc131 \ubc0f \uc800\uc791\uad8c \ud575\uc2ec \uae30\uc220 \uc5f0\uad6c\uac1c\ubc1c<br \/>\nSponsoring Authority: Korea Creative Content Agency (KOCCA, \ud55c\uad6d\ucf58\ud150\uce20\uc9c4\ud765\uc6d0)<br \/>\nDuration: 2022-04-01 \u2013 2023-12-31<\/li>\n<\/ul>\n<ul>\n<li>Development of Software Copyright Application Technology for Fair Trade and Distribution<br \/>\nTitle in Korean: \uacf5\uc815\ud55c SW\uc800\uc791\uad8c \uac70\ub798 \ubc0f \uc720\ud1b5 \uc0dd\ud0dc\uacc4 \uc9c0\uc6d0\uc744 \uc704\ud55c \uc800\uc791\uad8c \uc751\uc6a9 \uae30\uc220 \uac1c\ubc1c<br \/>\nSponsoring Authority: Korea Creative Content Agency (KOCCA, \ud55c\uad6d\ucf58\ud150\uce20\uc9c4\ud765\uc6d0)<br \/>\nDuration: 2022-04-01 \u2013 2023-12-31<\/li>\n<\/ul>\n<ul>\n<li>Development of Immersive Contents Anti Counterfeiting and Holography Technology with Micro Patterning<br \/>\nTitle in Korean: \ubbf8\uc138 \ud328\ud130\ub2dd \uae30\uc220\uc744 \ud65c\uc6a9\ud55c \uc2e4\uac10 \ucf58\ud150\uce20 \ubcf5\uc81c \ubc29\uc9c0 \ubc0f \ud640\ub85c\uadf8\ub7a8 \ud65c\uc6a9 \uae30\uc220 \uac1c\ubc1c<br \/>\nSponsoring Authority: Korea Creative Content Agency (KOCCA, \ud55c\uad6d\ucf58\ud150\uce20\uc9c4\ud765\uc6d0)<br \/>\nDuration: 2022-04-01 \u2013 2023-12-31<\/li>\n<\/ul>\n<ul>\n<li>Development of 6G Access and Core Networks Attack Simulation Tools<br \/>\nTitle in Korean: 6G \uc561\uc138\uc2a4 \ubc0f \ucf54\uc5b4 \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9 \uc2dc\ubbac\ub808\uc774\uc158 \ub3c4\uad6c \uac1c\ubc1c<br \/>\nSponsoring Authority:\u00a0Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2022-08-30 \u2013 2022-11-30<\/li>\n<\/ul>\n<ul>\n<li>Research of 6G Security International Standardization Trend Analysis and Standardization Candidate Technology<br \/>\nTitle in Korean: 6G \ubcf4\uc548 \uad6d\uc81c\ud45c\uc900\ud654 \ub3d9\ud5a5\ubd84\uc11d \ubc0f \ud45c\uc900\ud654 \ud6c4\ubcf4 \uae30\uc220 \uc5f0\uad6c<br \/>\nSponsoring Authority:\u00a0Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2022-06-01 \u2013 2022-11-30<\/li>\n<\/ul>\n<ul>\n<li>Research of the Multilateral Copyright Transaction System Using Selective Information Disclosure<br \/>\nTitle in Korean: \uc120\ud0dd\uc801 \uc815\ubcf4 \uacf5\uac1c\ub97c \ud65c\uc6a9\ud55c \ub2e4\uc790\uac04 \uc800\uc791\uad8c \uac70\ub798 \uc2dc\uc2a4\ud15c \uc5f0\uad6c \uc870\uc0ac<br \/>\nSponsoring Authority: XXX (Private Firm)<br \/>\nDuration: 2022-05-17 \u2013 2022-10-31<\/li>\n<\/ul>\n<ul>\n<li>Research of ICT Information Security Technology R&amp;D Status Analysis and Core Technology Roadmap Establishment<br \/>\nTitle in Korean: ICT \uc815\ubcf4\ubcf4\uc548 \uae30\uc220 R&amp;D \ud604\ud669 \ubd84\uc11d \ubc0f \ud575\uc2ec\uae30\uc220 \ub85c\ub4dc\ub9f5 \uc218\ub9bd \uc5f0\uad6c<br \/>\nSponsoring Authority: National Security Research Institute (NSR, \uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2022-05-01 \u2013 2022-11-14<\/li>\n<\/ul>\n<ul>\n<li>Development of Network Modeling and Testbed for 6G Network Infringement Analysis<br \/>\nTitle in Korean: 6G Network \uce68\ud574\uc0ac\uace0 \ubd84\uc11d\uc744 \uc704\ud55c Network \ubaa8\ub378\ub9c1 \ubc0f \ud14c\uc2a4\ud2b8\ubca0\ub4dc \uac1c\ubc1c<br \/>\nSponsoring Authority:\u00a0Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2021-08-30 \u2013 2021-11-30<\/li>\n<\/ul>\n<ul>\n<li>Research of the Forensics Watermarking System Supporting Personal Information Protection Management<br \/>\nTitle in Korean: \uac1c\uc778\uc815\ubcf4\ubcf4\ud638 \uad00\ub9ac\ub97c \uc9c0\uc6d0\ud558\ub294 \ud3ec\ub80c\uc2dd \uc6cc\ud130\ub9c8\ud0b9 \uc2dc\uc2a4\ud15c \uc5f0\uad6c \uc870\uc0ac<br \/>\nSponsoring Authority: XXX (Private Firm)<br \/>\nDuration: 2021-05-17 \u2013 2021-12-17<\/li>\n<\/ul>\n<ul>\n<li>Research on the Standardization Measures of Unmanned Vehicle Security and Safety Evaluation and Verification<br \/>\nTitle in Korean: \ubb34\uc778\uc774\ub3d9\uccb4 \ubcf4\uc548\uc131\u00b7\uc548\uc804\uc131 \ud3c9\uac00 \ubc0f \uac80\uc99d \ud45c\uc900\ud654 \ubc29\uc548 \uc5f0\uad6c<br \/>\nSponsoring Auyhority: National Security Research Institute (NSR, \uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2021-04-01 \u2013 2021-10-31<\/li>\n<\/ul>\n<ul>\n<li>Research on Copyright Technology Trends and Technology Roadmap<br \/>\nTitle in Korean: \uc800\uc791\uad8c \uae30\uc220 \ub3d9\ud5a5\uc870\uc0ac \ubc0f \uae30\uc220\ub85c\ub4dc\ub9f5 \ub9c8\ub828<br \/>\nSponsoring Authority: Korea Copyright Commission (\ud55c\uad6d\uc800\uc791\uad8c\uc704\uc6d0\ud68c)<br \/>\nDuration: 2020-09-21 \u2013 2020-12-15<\/li>\n<\/ul>\n<ul>\n<li>Development of a Fuzzer-based Crash Management Interface for Collecting Executable File Information<br \/>\nTitle in Korean: \uc2e4\ud589 \ud30c\uc77c \uc815\ubcf4 \uc218\uc9d1\uc744 \uc704\ud55c \ud37c\uc800 \uae30\ubc18 \ud06c\ub798\uc2dc \uad00\ub9ac \uc778\ud130\ud398\uc774\uc2a4 \uac1c\ubc1c<br \/>\nSponsoring Authority: \u00a0Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2020-05-25 \u2013 2020-09-24<\/li>\n<\/ul>\n<ul>\n<li>Research and Development of Firmware Update Architecture in Private Blockchain Environment<br \/>\nTitle in Korean: \uc0ac\uc124 \ube14\ub85d\uccb4\uc778 \ud658\uacbd\uc5d0\uc11c\uc758 \ud38c\uc6e8\uc5b4 \uc5c5\ub370\uc774\ud2b8 \uc544\ud0a4\ud14d\ucc98 \uc5f0\uad6c \ubc0f \uac1c\ubc1c<br \/>\nSponsoring Authority:\u00a0Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2020-04-01 \u2013 2020-10-31<\/li>\n<\/ul>\n<ul>\n<li>Research on a Consensus Algorithm in a Public Blockchain Environment<br \/>\nTitle in Korean: \uacf5\uac1c\ud615 \ube14\ub85d\uccb4\uc778 \ud658\uacbd\uc5d0\uc11c\uc758 \ud569\uc758 \uc54c\uace0\ub9ac\uc998 \uc5f0\uad6c<br \/>\nSponsoring Authority: Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2019-03-01 \u2013 2019-11-30<\/li>\n<\/ul>\n<ul>\n<li>Research on a Reliable Data Sharing System Based on Expendable Permissioned Blockchain<br \/>\nTitle in Korean: \ud655\uc7a5 \uac00\ub2a5\ud55c \ud5c8\uac00\ud615 \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc2e0\ub8b0 \ub370\uc774\ud130 \uacf5\uc720 \uccb4\uacc4 \uc5f0\uad6c<br \/>\nSponsoring Authority: Korea Institute of Science and Technology Information (KISTI, \ud55c\uad6d\uacfc\ud559\uae30\uc220\uc815\ubcf4\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2019-03-01 \u2013 2019-08-31<\/li>\n<\/ul>\n<ul>\n<li>Research onSignatureless blockchain platform and algorithm<br \/>\nTitle in Korean: Signatureless \ube14\ub85d\uccb4\uc778 \ud50c\ub7ab\ud3fc \ubc0f \uc54c\uace0\ub9ac\uc998 \uc5f0\uad6c<br \/>\nSponsoring Authority: Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2018-07-20 \u2013 2018-11-30<\/li>\n<\/ul>\n<ul>\n<li>Development of Blockchain Business Service Technology and Human Resources<br \/>\nTitle in Korean: \ube14\ub85d\uccb4\uc778 \ube44\uc988\ub2c8\uc2a4 \uc11c\ube44\uc2a4 \uae30\uc220 \uac1c\ubc1c \ubc0f \uc778\ub825\uc591\uc131 (IITP ITRC &#8211; \ucc38\uc5ec\uae30\uad00)<br \/>\nSponsoring Authority: Institute for Information &amp; Communications Technology Promotion (IITP, \uc815\ubcf4\ud1b5\uc2e0\uae30\ud68d\ud3c9\uac00\uc6d0)<br \/>\nDuration: 2018-07-01 \u2013 2021-12-31<\/li>\n<\/ul>\n<ul>\n<li>Research Laboratory of RAS Assurance for Distributed Embedded Systems Software<br \/>\nTitle in Korean: \ubd84\uc0b0 \uc784\ubca0\ub514\ub4dc \uc18c\ud504\ud2b8\uc6e8\uc5b4 RAS \ubcf4\uc99d \uc5f0\uad6c\uc2e4 (NRF \uae30\ucd08\uc5f0\uad6c\uc2e4 &#8211; \ucc38\uc5ec\uae30\uad00)<br \/>\nSponsoring Authority:\u00a0National Research Foundation of Korea (NRF, \ud55c\uad6d\uc5f0\uad6c\uc7ac\ub2e8)<br \/>\nDuration: 2018-06-01 \u2013 2021-02-28<\/li>\n<\/ul>\n<ul>\n<li>Development of a Reliable Data Sharing System Based on Blockchains<br \/>\nTitle in Korean: \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc2e0\ub8b0 \ub370\uc774\ud130 \uacf5\uc720 \uc2dc\uc2a4\ud15c \uac1c\ubc1c<br \/>\nSponsoring Authority:\u00a0Korea Institute of Science and Technology Information (KISTI, \ud55c\uad6d\uacfc\ud559\uae30\uc220\uc815\ubcf4\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2018-05-01 \u2013 2018-10-31<\/li>\n<\/ul>\n<ul>\n<li>Research on ASLR based Cloud Hypervisor Incident Response Technology<br \/>\nTitle in Korean: ASLR \uae30\ubc18 \ud074\ub77c\uc6b0\ub4dc \ud558\uc774\ud37c\ubc14\uc774\uc800 \uce68\ud574 \ub300\uc751\uae30\uc220 \uc5f0\uad6c<br \/>\nSponsoring Authority: National Security Research Institute (NSR, \uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2018-04-01 \u2013 2018-10-31<\/li>\n<\/ul>\n<ul>\n<li>Research on MacOS based S\/W Communication Protocol Analysis<br \/>\nTitle in Korean: MacOS \uae30\ubc18 S\/W \ud1b5\uc2e0 \ud504\ub85c\ud1a0\ucf5c \ubd84\uc11d \uc5f0\uad6c<br \/>\nSponsoring Authority: National Security Research Institute (NSR, \uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2018-04-01 \u2013 2018-10-31<\/li>\n<\/ul>\n<ul>\n<li>Development of Blockchain Based Digital Contents DRM Application Technology<br \/>\nTitle in Korean: \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ub514\uc9c0\ud138 \ucf58\ud150\uce20 DRM \uc751\uc6a9 \uae30\uc220 \uac1c\ubc1c (\ubcf8 \uc5f0\uad6c)<br \/>\nSponsoring Authority: Korea Copyright Commission (\ud55c\uad6d\uc800\uc791\uad8c\uc704\uc6d0\ud68c)<br \/>\nDuration: 2018-01-01 \u2013 2018-12-31<\/li>\n<\/ul>\n<ul>\n<li>Development of an Analysis Tool for the TXE-01 Platform and Firmware Security Structure<br \/>\nTitle in Korean: TXE-01 \ud50c\ub7ab\ud3fc \ubc0f \ud38c\uc6e8\uc5b4 \ubcf4\uc548\uad6c\uc870 \ubd84\uc11d \ub3c4\uad6c \uc81c\uc791<br \/>\nSponsoring Authority: Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2017-09-01 \u2013 2017-11-30<\/li>\n<\/ul>\n<ul>\n<li>Development of Blockchain Based Digital Contents DRM Application Technology<br \/>\nTitle in Korean: \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ub514\uc9c0\ud138 \ucf58\ud150\uce20 DRM \uc751\uc6a9 \uae30\uc220 \uac1c\ubc1c<br \/>\nSponsoring Authority: Korea Copyright Commission (\ud55c\uad6d\uc800\uc791\uad8c\uc704\uc6d0\ud68c)<br \/>\nDuration: 2017-08-01 \u2013 2017-11-30<\/li>\n<\/ul>\n<ul>\n<li>Research\u00a0on Requirement Analysis of Blockchain as a Service<br \/>\nTitle in Korean: \ud074\ub77c\uc6b0\ub4dc\uc5d0\uc11c \ube14\ub85d\uccb4\uc778 \uc11c\ube44\uc2a4(Blockchain as a Service) \uc81c\uacf5 \ubd84\uc11d \ubc0f \uc694\uad6c\uc0ac\ud56d \uac1c\ubc1c<br \/>\nSponsoring Authority:\u00a0Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2017-07-17 &#8211; 2017-11-30<\/li>\n<\/ul>\n<ul>\n<li>Research on Security Guidelines for ICS Wireless Equipment Deployment and Usage<br \/>\nTitle in Korean:\u00a0\uae30\ubc18\uc2dc\uc124 \ubb34\uc120\uc7a5\ube44 \ub3c4\uc785 \ubc0f \ud65c\uc6a9 \ubcf4\uc548 \uac00\uc774\ub4dc\ub77c\uc778 \uc5f0\uad6c<br \/>\nSponsoring Authority: National Security Research Institute (NSR, \uad6d\uac00\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\uc18c)<br \/>\nDuration: 2017-04-01 &#8211; 2017-10-31<\/li>\n<\/ul>\n<ul>\n<li>Development of Mobile Edge Computing Platform Technology for URLLC Services<br \/>\nTitle in Korean:\u00a0\uc800\uc9c0\uc5f0 \uc735\ud569\uc11c\ube44\uc2a4\ub97c \uc704\ud55c \ubaa8\ubc14\uc77c \uc5d0\uc9c0 \ucef4\ud4e8\ud305 \ud50c\ub7ab\ud3fc \uae30\uc220 \uac1c\ubc1c<br \/>\nSponsoring Authority: Giga KOREA (\uae30\uac00\ucf54\ub9ac\uc544\uc0ac\uc5c5\ub2e8)<br \/>\nDuration: 2017-04-01 &#8211; 2020-12-31<\/li>\n<\/ul>\n<ul>\n<li>Human-centric Authentication and Access Control for the Internet of You (Downstream Research)<br \/>\nTitle in Korean: \uc0ac\ub78c\uc778\ud130\ub137\uc744 \uc704\ud55c \uc778\uac04\uc911\uc2ec\uc758 \uc778\uc99d\uacfc \uc811\uadfc\uc81c\uc5b4 (\ud6c4\uc18d \uc5f0\uad6c)<br \/>\nSponsoring Authority: National Research Foundation of Korea (NRF, \ud55c\uad6d\uc5f0\uad6c\uc7ac\ub2e8)<br \/>\nDuration: 2017-03-01 &#8211; 2020-02-29<\/li>\n<\/ul>\n<ul>\n<li>Study on Analysis of Security Requirements, Related Patents, and Standards for Vehicles<br \/>\nTitle in Korean: \ucc28\ub7c9\uc6a9 \ubcf4\uc548 \uc694\uad6c\uc0ac\ud56d \ubd84\uc11d \ubc0f \uad00\ub828 \ud2b9\ud5c8\/\ud45c\uc900\ud654\uc5d0 \uad00\ud55c \uc5f0\uad6c<br \/>\nSponsoring Authority: XXX (Private Firm)<br \/>\nDuration: 2017-02-15 &#8211; 2017-06-14<\/li>\n<\/ul>\n<ul>\n<li>Development of Comparative Analysis Techniques and Verification Codes for Software and Source Codes<br \/>\nTitle in Korean:\u00a0\uc18c\ud504\ud2b8\uc6e8\uc5b4 \ubc0f \uc18c\uc2a4\ucf54\ub4dc \ube44\uad50\ubd84\uc11d \uae30\ubc95 \ubc0f \uac80\uc99d\ucf54\ub4dc \uac1c\ubc1c<br \/>\nSponsoring Authority: Supreme Prosecutors&#8217; Office (\ub300\uac80\ucc30\uccad)<br \/>\nDuration: 2016-06-01 &#8211; 2016-12-28<\/li>\n<\/ul>\n<ul>\n<li>Title in Korean: \ud558\ub4dc\uc6e8\uc5b4 \uc778\ud130\ud398\uc774\uc2a4\ub97c \ud1b5\ud55c \ubcf4\uc548\uc131 \uac80\uc99d \ub3c4\uad6c \uac1c\ubc1c<br \/>\nSponsoring Authority:\u00a0Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2016-06-28 &#8211; 2016-11-27<\/li>\n<\/ul>\n<ul>\n<li>Study on IT Convergence based Security Protocols<br \/>\nTitle in Korean: IT\uc735\ud569 \uae30\ubc18 \ubcf4\uc548 \ud504\ub85c\ud1a0\ucf5c\uc5d0 \uad00\ud55c \uc5f0\uad6c<br \/>\nSponsoring Authority: XXX (Private Firm)<br \/>\nDuration: 2015-12-01 &#8211; 2016-02-29<\/li>\n<\/ul>\n<ul>\n<li>Research on the Security of Operating System<br \/>\nTitle in Korean: \uc6b4\uc601\uccb4\uc81c \uc548\uc804\uc131 \uc5f0\uad6c<br \/>\nSponsoring Authority: National Research Foundation of Korea (NRF, \ud55c\uad6d\uc5f0\uad6c\uc7ac\ub2e8)<br \/>\nDuration: 2015-09-01 &#8211; 2017-06-30<\/li>\n<\/ul>\n<ul>\n<li>XXX (nondisclosure due to security policy of the national research and development programs)<br \/>\nTitle in Korean: \uc784\ubca0\ub514\ub4dc \uc624\ud508 \ud50c\ub7ab\ud3fc \uae30\ubc18\uc758 \ud38c\uc6e8\uc5b4 \ubcf4\uc548\uc131 \uac80\uc99d \ub3c4\uad6c \uac1c\ubc1c<br \/>\nSponsoring Authority:\u00a0Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2015-06-29 &#8211; 2015-11-30<\/li>\n<\/ul>\n<ul>\n<li>Study on Copyright Infringement Technologies Anticipation and Countermeasures in the Next Generation Web Environment<br \/>\nTitle in Korean: \ucc28\uc138\ub300 \uc6f9 \ud658\uacbd\uc5d0\uc11c\uc758 \uc800\uc791\uad8c \uce68\ud574 \uae30\uc220\uc608\uce21 \ubc0f \ub300\uc751\ubc29\uc548 \uc5f0\uad6c<br \/>\nSponsoring Authority: Korea Copyright Commission (\ud55c\uad6d\uc800\uc791\uad8c\uc704\uc6d0\ud68c)<br \/>\nDuration: 2015-06-12 &#8211; 2015-10-30<\/li>\n<\/ul>\n<ul>\n<li>XXX (nondisclosure due to security policy of the national research and development programs)<br \/>\nTitle in Korean: \ud38c\uc6e8\uc5b4 \uc218\uc900\uc758 \ub8e8\ud2b8\ud0b7\uc5d0 \ub300\ud55c \uc0ac\ub840\ubd84\uc11d \ubc0f \uc2e0\uaddc \uc2dc\ub098\ub9ac\uc624 \uc5f0\uad6c<br \/>\nSponsoring Authority:\u00a0Electronics and Telecommunications Research Institute (ETRI, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0)<br \/>\nDuration: 2014-06-15 &#8211; 2014-11-30<\/li>\n<\/ul>\n<ul>\n<li>Research on IoT security techniques<br \/>\nTitle in Korean: IoT\ubcf4\uc548\uae30\uc220\uc5f0\uad6c\u00a0(IITP ITRC &#8211; \ucc38\uc5ec\uae30\uad00)<br \/>\nSponsoring Authority: Institute for Information &amp; Communications Technology Promotion (IITP, \uc815\ubcf4\ud1b5\uc2e0\uae30\ud68d\ud3c9\uac00\uc6d0)<br \/>\nDuration: 2015-06-01 \u2013 2021-03-31<\/li>\n<\/ul>\n<ul>\n<li>Study on New Forms of Copyright Infringements and Institutional Countermeasures<br \/>\nTitle in Korean: \uc0c8\ub85c\uc6b4 \uc720\ud615\uc758 \uc800\uc791\uad8c \uce68\ud574\uc2e4\ud0dc \ubc0f \uc81c\ub3c4\uc801 \ub300\uc751\ubc29\uc548 \uc5f0\uad6c<br \/>\nSponsoring Authority: Korea Copyright Commission\u00a0(\ud55c\uad6d\uc800\uc791\uad8c\uc704\uc6d0\ud68c)<br \/>\nDuration: 2014-05-28 &#8211; 2014-11-27<\/li>\n<\/ul>\n<ul>\n<li>Human-centric Authentication and Access Control for the Internet of You<br \/>\nTitle in Korean: \uc0ac\ub78c\uc778\ud130\ub137\uc744 \uc704\ud55c \uc778\uac04\uc911\uc2ec\uc758 \uc778\uc99d\uacfc \uc811\uadfc\uc81c\uc5b4<br \/>\nSponsoring Authority: National Research Foundation of Korea (NRF, \ud55c\uad6d\uc5f0\uad6c\uc7ac\ub2e8)<br \/>\nDuration: 2014-05-01 &#8211; 2017-04-30<\/li>\n<\/ul>\n<ul>\n<li>Research on Network Architecture and Mobility Management in 5G Mobile Systems<br \/>\nTitle in Korean: 5G \uc774\ub3d9\ud1b5\uc2e0\ub9dd\uc5d0\uc11c\uc758 \ub124\ud2b8\uc6cc\ud06c \uad6c\uc870 \ubc0f \ub2e8\ub9d0\/\ucc28\ub7c9 \uc774\ub3d9\uc131 \uc9c0\uc6d0 \uae30\uc220 \uc5f0\uad6c<br \/>\nSponsoring Authority: National Research Foundation of Korea (NRF, \ud55c\uad6d\uc5f0\uad6c\uc7ac\ub2e8)<br \/>\nDuration: 2014-05-01 &#8211; 2016-04-30<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Ongoing Projects Development of international standards for interoperability of counter-UAS Title in Korean: \ub300\ub4dc\ub860 \ud1b5\ud569\uccb4\uacc4\uc758 \uc0c1\ud638\uc6b4\uc6a9\uc744 \uc704\ud55c \uad6d\uc81c\ud45c\uc900 \uac1c\ubc1c Sponsoring Authority: Korea Planning &amp; Evaluation Institute of Industrial Technology (KEIT, \uc0b0\uc5c5\uae30\uc220\uae30\ud68d\ud3c9\uac00\uc6d0) Duration: 2025-07-01 \u2013 2029-12-31 Training Global Talent for Copyright Protection and Management of On-Device AI Models Title in Korean: On-Device AI \ubaa8\ub378 \uc800\uc791\uad8c \ubcf4\ud638 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/35"}],"collection":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35"}],"version-history":[{"count":103,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/35\/revisions"}],"predecessor-version":[{"id":4232,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/35\/revisions\/4232"}],"wp:attachment":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}