{"id":4195,"date":"2025-10-24T16:49:00","date_gmt":"2025-10-24T07:49:00","guid":{"rendered":"https:\/\/pel.sejong.ac.kr\/wordpress\/?p=4195"},"modified":"2025-11-21T17:00:59","modified_gmt":"2025-11-21T08:00:59","slug":"2025-%ea%b5%ad%ea%b0%80%ec%95%94%ed%98%b8%ea%b3%b5%eb%aa%a8%ec%a0%84-%ec%b0%b8%ea%b0%80","status":"publish","type":"post","link":"https:\/\/pel.sejong.ac.kr\/wordpress\/?p=4195","title":{"rendered":"2025 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804 \ucc38\uac00"},"content":{"rendered":"\n<p>2025\ub144 10\uc6d4 23\uc77c(\ubaa9), \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud55c\uad6d\uc554\ud638\ud3ec\ub7fc\uc5d0\uc11c \uc8fc\uad00\ud558\ub294 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804\uc5d0 \uc800\ud76c \uc5f0\uad6c\uc2e4\uc758 \uad8c\uc21c\ud64d \ud559\uc0dd\uacfc \uc190\uc6b0\uc601 \ud559\uc0dd\uc774 \ub17c\ubb38\uc744 \ud22c\uace0\ud558\uc600\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uae08\ubc88 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804\uc5d0\uc11c\ub294 \uad8c\uc21c\ud64d \ud559\uc0dd\uacfc \uc190\uc6b0\uc601 \ud559\uc0dd\uc774 \uc544\ub798\uc640 \uac19\uc774 \ub17c\ubb38\uc744 \ubc1c\ud45c\ud558\uc600\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<ul><li>\uad8c\uc21c\ud64d, \uc190\uc6b0\uc601, \uc774\uc885\ud601, \u201cPolicy-Driven Contextual Risk Evaluation in OAuth 2.0 Authentication Frameworks for AI chatbot-based RPA Systems\u201d,\u00a0<em>2025\ub144 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804<\/em>, 2025\ub144 10\uc6d4(\ud2b9\ubcc4\uc0c1).<\/li><\/ul>\n\n\n\n<ul><li>\uc190\uc6b0\uc601, \uad8c\uc21c\ud64d, \uc774\uc885\ud601, \u201cGNN-Based Predictive Model for Adversarial Cyber Behavior Using the MITRE ATT&amp;CK\u201d,\u00a0<em>2025\ub144 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804<\/em>, 2025\ub144 10\uc6d4(\ud2b9\ubcc4\uc0c1).<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251120_235826244-scaled.jpg\"><img loading=\"lazy\" width=\"960\" height=\"640\" src=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251120_235826244-960x640.jpg\" alt=\"\" class=\"wp-image-4196\" srcset=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251120_235826244-960x640.jpg 960w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251120_235826244-595x397.jpg 595w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251120_235826244-768x512.jpg 768w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251120_235826244-1536x1024.jpg 1536w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251120_235826244-2048x1365.jpg 2048w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251120_235826244-300x200.jpg 300w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><\/figure>\n\n\n\n<p>\ub610\ud55c, \ub450 \ud559\uc0dd \ubaa8\ub450 \ub2e4 \uc554\ud638 \uae30\uc220 \uc751\uc6a9 \ubc0f \ud65c\uc6a9 \ubd84\uc57c\uc5d0\uc11c \ud2b9\ubcc4\uc0c1\uc744 \uc218\uc0c1\ud558\uc600\uc2b5\ub2c8\ub2e4. \ucd95\ud558\ud569\ub2c8\ub2e4!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2025\ub144 10\uc6d4 23\uc77c(\ubaa9), \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud55c\uad6d\uc554\ud638\ud3ec\ub7fc\uc5d0\uc11c \uc8fc\uad00\ud558\ub294 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804\uc5d0 \uc800\ud76c \uc5f0\uad6c\uc2e4\uc758 \uad8c\uc21c\ud64d \ud559\uc0dd\uacfc \uc190\uc6b0\uc601 \ud559\uc0dd\uc774 \ub17c\ubb38\uc744 \ud22c\uace0\ud558\uc600\uc2b5\ub2c8\ub2e4. \uae08\ubc88 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804\uc5d0\uc11c\ub294 \uad8c\uc21c\ud64d \ud559\uc0dd\uacfc \uc190\uc6b0\uc601 \ud559\uc0dd\uc774 \uc544\ub798\uc640 \uac19\uc774 \ub17c\ubb38\uc744 \ubc1c\ud45c\ud558\uc600\uc2b5\ub2c8\ub2e4. \uad8c\uc21c\ud64d, \uc190\uc6b0\uc601, \uc774\uc885\ud601, \u201cPolicy-Driven Contextual Risk Evaluation in OAuth 2.0 Authentication Frameworks for AI chatbot-based RPA Systems\u201d,\u00a02025\ub144 \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804, 2025\ub144 10\uc6d4(\ud2b9\ubcc4\uc0c1). \uc190\uc6b0\uc601, \uad8c\uc21c\ud64d, \uc774\uc885\ud601, \u201cGNN-Based Predictive Model for Adversarial Cyber Behavior [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4195"}],"collection":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4195"}],"version-history":[{"count":1,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4195\/revisions"}],"predecessor-version":[{"id":4197,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4195\/revisions\/4197"}],"wp:attachment":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}