Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAK.KO-12.0317 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2017-12-13 | ÃÑ ÆäÀÌÁö | 15 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | µå·Ð ±â¹Ý ¼ºñ½º¸¦ À§ÇÑ º¸¾È ¿ä±¸»çÇ× | ||||||||||||||||
¿µ¹® Ç¥Áظí | Security Requirements for Drone-based Services | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØ¿¡¼´Â ¸ÕÀú µå·ÐÀÇ º¸¾È Ãë¾àÁ¡À» ºÐ¼®ÇÑ´Ù. ±×¸®°í µå·Ð ±â¹Ý ¼ºñ½ºÀÇ ±¸¼º ¿ä¼Ò¸¦ Á¤ÀÇÇÏ°í º¸¾È ¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | First, security threats of drone are analyzed. Next, the service components for drone-based service are defined and the security requirements are defined. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|