ITEM and TITLE |
EDITOR |
CRAMM Roadmap
SG17 Cyber Security Reference Architectures, Models and Methodologies Strategy and Roadmap
|
N. Kishor
NARANG
Editor
Email:
design[at]narnix.com
|
|
Arnaud
TADDEI
Editor
Email:
arnaud.taddei[at]broadcom.com
|
Security Compendium
ICT Security Compendium
|
Sandor
MAZGON
Editor
Email:
sandor.mazgon[at]ties.itu.int
|
Security standards roadmap
ICT Security standards roadmap
|
Yiwen
WANG
Editor
Email:
wangyiwen[at]caict.ac.cn
|
SG17 implementation of PP-22 Res
SG17 activities and achievements in support of the most recent Resolutions of the ITU PP
|
Juhee
KI
Editor
Email:
eye[at]iitp.kr
|
SG17 implementation of WTSA Res
SG17 activities and achievements in support of the most recent Resolutions of the WTSA
|
Juhee
KI
Editor
Email:
eye[at]iitp.kr
|
TR.PKIC-man-ib
Technical Report: Technical guidelines for Web PKI certificate validation and fine-grained configuration for Internet browser
|
Yu
FU
Editor
Email:
fuy186[at]chinaunicom.cn
|
|
Penghui
LIU
Editor
Email:
liuph[at]pcl.ac.cn
|
|
Xiang
LIU
Editor
Email:
liux15[at]pcl.ac.cn
|
|
Rongwei
YANG
Editor
Email:
yangrw[at]pcl.ac.cn
|
X.5Gsec-asra
Guidelines and Technical Requirements for 5G Network Asset Security Risk Analysis
|
Qin
QIU
Editor
Email:
qiuqin[at]chinamobile.com
|
|
Daoli
SU
Editor
Email:
sudl[at]chinatelecom.cn
|
|
Tian
TIAN
Editor
Email:
tian.tian1[at]zte.com.cn
|
|
Jing
WANG
Editor
Email:
wang.jing17[at]zte.com.cn
|
X.5Gsec-FMSC
Security requirements and guidelines for fixed, mobile and satellite convergence of IMT-2020 networks and beyond
|
Jingpeng
BAI
Editor
Email:
baijp[at]chinatelecom.cn
|
|
Jun
SHEN
Editor
Email:
shenjun6[at]chinatelecom.cn
|
|
Zecheng
XIE
Editor
Email:
xiezc18[at]chinaunicom.cn
|
|
Zhonghuai
XIE
Editor
Email:
xiezh55[at]chinaunicom.cn
|
X.5Gsec-scio
Framework of security capability intelligent orchestration system for IMT-2020 network
|
Jingpeng
BAI
Editor
Email:
baijp[at]chinatelecom.cn
|
|
Zecheng
XIE
Editor
Email:
xiezc18[at]chinaunicom.cn
|
|
Zhonghuai
XIE
Editor
Email:
xiezh55[at]chinaunicom.cn
|
|
Leyi
ZHANG
Editor
Email:
leyi.zhang[at]zte.com.cn
|
X.509Amd.2
The Directory: Public-key and attribute certificate frameworks
|
Erik
ANDERSEN
Editor
Email:
era[at]x500.eu
|
X.510 Amd.1
The Directory - Protocol specifications for secure operations
|
Erik
ANDERSEN
Editor
Email:
era[at]x500.eu
|
X.1053 rev
Information security controls based on ITU-T X.1051 for small and medium-sized telecommunication organizations
|
Changoh
KIM
Editor
Email:
peterx.1053[at]gmail.com
|
|
Thaib
MUSTAFA
Editor
Email:
thaibmus[at]tab.com.my
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.1058 rev
Information security, cybersecurity and privacy protection — Code of practice for personally identifiable information protection
|
Changoh
KIM
Editor
Email:
peterx.1053[at]gmail.com
|
|
Jinghua
MIN
Editor
Email:
minjinghua[at]cecgw.cn
|
|
Thaib
MUSTAFA
Editor
Email:
thaibmus[at]tab.com.my
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.1060 rev
Framework for the creation and operation of a cyber defence/security centre
|
Arnaud
TADDEI
Editor
Email:
arnaud.taddei[at]broadcom.com
|
|
Shigenori
TAKEI
Editor
Email:
Shigenori.Takei[at]scsksecurity.co.jp
|
X.1062
Framework for Security Human Capability Development
|
Lee
HWEE HSIUNG
Editor
Email:
hh.lee[at]cybersecurity.my
|
|
Khairul
KAMARUDIN
Editor
Email:
khairul.ekhwan[at]mtsfb.org.my
|
|
Thaib
MUSTAFA
Editor
Email:
thaibmus[at]tab.com.my
|
|
Norkhadhra
NAWAWI
Editor
Email:
norkhadhra[at]fnsvalue.co.kr
|
X.1128
Security features to assess mobile terminal security
|
Samir
ABDELGAWAD
Editor
Email:
sgaber[at]tra.gov.eg
|
|
Zhiyuan
HU
Editor
Email:
huzhiyuan[at]vivo.com
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.1129
Security guidelines for mobile terminal integrity protection
|
Samir
ABDELGAWAD
Editor
Email:
sgaber[at]tra.gov.eg
|
|
Zhiyuan
HU
Editor
Email:
huzhiyuan[at]vivo.com
|
|
Weidong
WANG
Editor
Email:
wangweidong[at]chinawllc.com
|
X.1130
Technical guidelines for fraud detection of malicious applications in mobile devices
|
Xiaoyuan
BAI
Editor
Email:
xiaoyuan.bxy[at]antgroup.com
|
|
Zhiyuan
HU
Editor
Email:
huzhiyuan[at]vivo.com
|
|
Hazirah
MD NAWI
Editor
Email:
hazirah[at]mcmc.gov.my
|
|
Jin
PENG
Editor
Email:
jim.pj[at]antgroup.com
|
|
Weidong
WANG
Editor
Email:
wangweidong[at]chinawllc.com
|
|
Wenbiao
ZHAO
Editor
Email:
wenbiao.zwb[at]antgroup.com
|
X.1238
Guidelines for countering spam over rich communication service (RCS) messaging
|
Huamin
JIN
Editor
Email:
jhm[at]gsta.com;
|
|
Shuai
WANG
Editor
Email:
wangs[at]gsta.com
|
|
Haodi
ZHANG
Editor
Email:
zhanghaodi[at]chinatelecom.cn
|
|
Yanbin
ZHANG
Editor
Email:
zhangyanbin[at]caict.ac.cn
|
X.1250
Baseline capabilities for enhanced identity management and interoperability
|
Abbie
BARBIR
Editor
Email:
barbira[at]cvshealth.com
|
|
Sylvan
TRAN
Editor
Email:
s.t[at]lshd.us
|
X.1254 rev
Entity authentication assurance framework
|
Abbie
BARBIR
Editor
Email:
barbira[at]cvshealth.com
|
|
Sylvan
TRAN
Editor
Email:
s.t[at]lshd.us
|
X.1280 rev
Framework for out-of-band mutual authentication using mobile devices
|
Il Jin
JUNG
Editor
Email:
jiljin[at]estorm.co.kr
|
|
Taeil
LEE
Editor
Email:
tail[at]estorm.co.kr
|
|
Heejun
SHIN
Editor
Email:
heejun[at]estorm.co.kr
|
|
Jonghyun
WOO
Editor
Email:
jhwoo[at]dualauth.com
|
X.1281.Amd1
APIs for interoperability of identity management systems
|
Abbie
BARBIR
Editor
Email:
barbira[at]cvshealth.com
|
X.1400 rev
Terms and definitions for distributed ledger technology
|
Jae Nam
KO
Editor
Email:
jnko[at]sch.ac.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.1457
Security threats and requirements for information recommendation service
|
Zhiyuan
HU
Editor
Email:
huzhiyuan[at]vivo.com
|
|
Junzhi
YAN
Editor
Email:
yanjunzhi[at]chinamobile.com
|
|
Yunwei
ZHAO
Editor
Email:
zhaoyw[at]cert.org.cn
|
X.1631
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services
|
Nan
MENG
Editor
Email:
mengnan[at]caict.ac.cn
|
|
Koji
NAKAO
Editor
Email:
ko-nakao[at]nict.go.jp
|
X.1649
Security guidelines for multi-cloud
|
Wei
LIU
Editor
Email:
liuw147[at]chinaunicom.cn
|
|
Nan
MENG
Editor
Email:
mengnan[at]caict.ac.cn
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
|
Lei
XU
Editor
Email:
xulei56[at]chinaunicom.cn
|
|
Yi
ZHANG
Editor
Email:
enidzhang2019[at]163.com
|
X.1753
Guidelines for data security using machine learning in big data infrastructure
|
Mi
CAO
Editor
Email:
caom11[at]chinaunicom.cn
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
|
Laifu
WANG
Editor
Email:
wanglaifu[at]chinatelecom.cn
|
|
Lei
XU
Editor
Email:
xulei56[at]chinaunicom.cn
|
X.AA-LLM
Guidelines for Preventing and Mitigating Adversarial Attacks on LLMs in Metaverse and Digital Twin Environments
|
Aurindam
BHATTACHARYA
Editor
Email:
aurindam[at]cdot.in
|
|
Navin
MANASWI
Editor
Email:
manaswi.navin[at]gmail.com
|
|
Manivannan
MUNIYANDI
Editor
Email:
mani[at]iitm.ac.in
|
|
Raghav
PURWAR
Editor
Email:
rpurwar.96[at]gov.in
|
|
Namrata
SINGH
Editor
Email:
namrata.singh51[at]gov.in
|
|
R. S.
SINGH
Editor
Email:
ddgsd.tec[at]gov.in
|
X.aamd-sec
Security guidelines for categorized data in advanced air mobility (AAM)
|
Changhun
JUNG
Editor
Email:
changhun[at]hyundai.com
|
|
Sang-Woo
LEE
Editor
Email:
ttomlee[at]etri.re.kr
|
|
Yousik
LEE
Editor
Email:
yousik.lee[at]sch.ac.kr
|
|
Seungwook
PARK
Editor
Email:
seungwook.park[at]hyundai.com
|
X.aas
Information security, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework
|
El-Sayed Ali Gomaa
EL-SAYED ALI
Editor
Email:
eali[at]cra.gov.qa
|
|
Honey
MAKOLA
Editor
Email:
hmakola[at]icasa.org.za
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.accsadlt
Access security authentication based on DLT
|
Seung Ju
JEON
Editor
Email:
jkme098[at]fnsvalue.co.kr
|
|
Ariff Olan
KHOLID
Editor
Email:
ariffolan[at]fnsvalue.co.kr
|
|
Radhilufti
MADEHI
Editor
Email:
radhi[at]fnsvalue.co.kr
|
|
Norkhadhra
NAWAWI
Editor
Email:
norkhadhra[at]fnsvalue.co.kr
|
X.af-sec
Evaluation methodologies for anonymization techniques using face images in autonomous vehicles
|
Sang-Woo
LEE
Editor
Email:
ttomlee[at]etri.re.kr
|
|
Yousik
LEE
Editor
Email:
yousik.lee[at]sch.ac.kr
|
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
X.AI-App_policy
Reference architecture for AI-assisted analysis of consistency between App's data usage behaviour and its privacy policy
|
Wentao
CHEN
Editor
Email:
chenwentao[at]caict.ac.cn
|
|
Zhiyuan
HU
Editor
Email:
huzhiyuan[at]vivo.com
|
|
Weidong
WANG
Editor
Email:
wangweidong[at]chinawllc.com
|
|
Yunwei
ZHAO
Editor
Email:
zhaoyw[at]cert.org.cn
|
X.AI-gcd
Guidelines for Artificial Intelligence-generated content detection
|
Shiqi
LI
Editor
Email:
lishiqi.li[at]alibaba-inc.com
|
|
Yong
SUN
Editor
Email:
sy359975[at]alibaba-inc.com
|
|
Jishen
ZENG
Editor
Email:
jishen.zjs[at]alibaba-inc.com
|
X.APIrsd
Technical requirements for public API runtime security risk detection
|
Jie
CHEN
Editor
Email:
chenj135[at]chinatelecom.cn
|
|
Shuai
WANG
Editor
Email:
wangshuai8[at]chinatelecom.cn
|
|
Haodi
ZHANG
Editor
Email:
zhanghaodi[at]chinatelecom.cn
|
X.arch-design
Design principles and best practices for security architectures
|
N. Kishor
NARANG
Editor
Email:
design[at]narnix.com
|
|
Arnaud
TADDEI
Editor
Email:
arnaud.taddei[at]broadcom.com
|
X.asm-cc
Requirements of attack surface management for cloud computing
|
Maofei
CHEN
Editor
Email:
chenmf6[at]chinatelecom.cn
|
|
Fangfang
DAI
Editor
Email:
daifangfang[at]caict.ac.cn
|
|
Dongxin
LIU
Editor
Email:
liudongxin[at]chinatelecom.cn
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
|
Laifu
WANG
Editor
Email:
wanglaifu[at]chinatelecom.cn
|
X.bvm
Requirements for biometric variability management
|
Jason
KIM
Editor
Email:
jasonkim_korea[at]naver.com
|
|
Eunjeong
PARK
Editor
Email:
eunjeong.ej[at]gmail.com
|
|
Han
TAEHWA
Editor
Email:
taehwa.han[at]gmail.com
|
X.C2M2
Cybersecurity capability maturity model for telecommunication organisations
|
Jainendra
BAHADUR
Editor
Email:
dyscecyber-nscs[at]gov.in
|
|
Divya
SHARMA
Editor
Email:
divya.sharma87[at]gov.in
|
X.cdc-csirt
Relationship between Cyber Defence/Security Center and Computer Security Incident Response Team
|
Arnaud
TADDEI
Editor
Email:
arnaud.taddei[at]broadcom.com
|
X.ckrp
Framework of cryptographic key resource pool for cloud computing
|
Ming
HE
Editor
Email:
heming8[at]chinatelecom.cn
|
|
Gang
LIU
Editor
Email:
gang.3.liu[at]nokia.com
|
|
Jun
SHEN
Editor
Email:
shenjun6[at]chinatelecom.cn
|
X.cov-sec
Security guidelines for countermeasures against covert channels in connected vehicles
|
Sang-Woo
LEE
Editor
Email:
ttomlee[at]etri.re.kr
|
|
Seungwook
PARK
Editor
Email:
seungwook.park[at]hyundai.com
|
X.cramms
Framework for cyber security reference architectures, models and methodologies strategy and roadmap (CRAMMS)
|
N. Kishor
NARANG
Editor
Email:
design[at]narnix.com
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Arnaud
TADDEI
Editor
Email:
arnaud.taddei[at]broadcom.com
|
|
Chen
ZHANG
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
|
X.cs-ra
Cyber security reference architecture
|
N. Kishor
NARANG
Editor
Email:
design[at]narnix.com
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Preetika
SINGH
Editor
Email:
preetika.singh87[at]gov.in
|
|
Pushpendra Kumar
SINGH
Editor
Email:
pushpendraks.its[at]gov.in
|
X.DLT-dgi
Security requirements of DLT gateway for interoperability
|
Jung Yeon
HWANG
Editor
Email:
jyhwang[at]sungshin.ac.kr
|
|
Xiongwei
JIA
Editor
Email:
jiaxw9[at]chinaunicom.cn
|
|
Migyeong
KIM
Editor
Email:
mg.kim[at]dreamsecurity.com
|
|
Kim
YOUNGJIN
Editor
Email:
kimyngjin[at]gmail.com
|
X.dlt-share
Security requirements for data application software based on DLT to achieve statistics
|
Hang
DONG
Editor
Email:
donghang[at]chinamobile.com
|
|
Shenglan
LIU
Editor
Email:
liushenglan[at]cmdi.chinamobile.com
|
|
Chen
ZHANG
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
|
|
Feng
ZHANG
Editor
Email:
zhangfeng[at]chinamobile.com
|
X.dpki
Decentralized Public-key infrastructure
|
Erik
ANDERSEN
Editor
Email:
era[at]x500.eu
|
X.dtns
Guidelines of using digital twin of network for network security
|
HaiTao
DU
Editor
Email:
duhaitao[at]chinamobile.com
|
|
Li
SU
Editor
Email:
suli[at]chinamobile.com
|
|
Ke
WANG
Editor
Email:
wangkeyj[at]chinamobile.com
|
|
Junjie
XIA
Editor
Email:
xiajj2[at]chinaunicom.cn
|
X.ececu-sec
Security requirements for externally connected electronic control units of connected vehicles
|
Nan
LAN
Editor
Email:
lannan[at]caeri.com.cn
|
|
Yufeng
LI
Editor
Email:
liyufeng_shu[at]shu.edu.cn
|
|
Wei
XU
Editor
Email:
xuwei[at]caeri.com.cn
|
|
Shichun
YANG
Editor
Email:
yangshichun[at]buaa.edu.cn
|
|
Yi
ZHANG
Editor
Email:
enidzhang2019[at]163.com
|
X.evpnc-sec
Security guidelines for electric vehicle plug and charge (PnC) services using vehicle identity (VID)
|
Byoung-Moon
CHIN
Editor
Email:
bmchin[at]tta.or.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Kiho
YEO
Editor
Email:
beware523[at]paran.com
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.fod-sec
Security guidelines for a feature on demand (FoD) service in a connected vehicle environment
|
Jiyong
HAN
Editor
Email:
jiyong.han[at]hyundai.com
|
|
Changhun
JUNG
Editor
Email:
changhun[at]hyundai.com
|
|
Seungwook
PARK
Editor
Email:
seungwook.park[at]hyundai.com
|
X.fr-msp
Functional Requirements of Microsegmentation Platform in a cloud-based environment
|
Huamin
JIN
Editor
Email:
jinhm.gd[at]chinatelecom.cn
|
|
Shuai
WANG
Editor
Email:
wangshuai8[at]chinatelecom.cn
|
|
Haodi
ZHANG
Editor
Email:
zhanghaodi[at]chinatelecom.cn
|
X.fr-vsasi
Functional requirements for visualization service of network security assets and security incidents based on digital twin
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Mengxiang
HAN
Editor
Email:
hanmx12[at]chinaunicom.cn
|
|
Ke
WANG
Editor
Email:
wangkeyj[at]chinamobile.com
|
|
Junjie
XIA
Editor
Email:
xiajj2[at]chinaunicom.cn
|
X.gapci
Guidelines on Anti-DDoS protection for cloud infrastructure
|
Lin
CHEN
Editor
Email:
chenlin6[at]caict.ac.cn
|
|
Hang
DONG
Editor
Email:
donghang[at]chinamobile.com
|
|
Nan
MENG
Editor
Email:
mengnan[at]caict.ac.cn
|
|
Yue
SHI
Editor
Email:
shiyue1[at]caict.ac.cn
|
X.gcspcc
Guidelines of developing of cybersecurity simulation platform based on cloud computing
|
Lu
CHEN
Editor
Email:
chenl225[at]chinaunicom.cn
|
|
Wei
LIU
Editor
Email:
liuw147[at]chinaunicom.cn
|
|
Nan
MENG
Editor
Email:
mengnan[at]caict.ac.cn
|
|
Shuai
WANG
Editor
Email:
wangshuai8[at]chinatelecom.cn
|
|
Lei
XU
Editor
Email:
xulei56[at]chinaunicom.cn
|
X.gdso-cs
Guidelines of development, security and operations (DevSecOps) for cloud service
|
Maofei
CHEN
Editor
Email:
chenmf6[at]chinatelecom.cn
|
|
Xianjun
LONG
Editor
Email:
longxj[at]chinatelecom.cn
|
|
Laifu
WANG
Editor
Email:
wanglaifu[at]chinatelecom.cn
|
X.GenAI-FT
Security guidelines for fine-tuning generative AI model
|
Xiaoyuan
BAI
Editor
Email:
xiaoyuan.bxy[at]antgroup.com
|
|
Wentao
CHEN
Editor
Email:
chenwentao[at]caict.ac.cn
|
|
Zhiyuan
HU
Editor
Email:
huzhiyuan[at]vivo.com
|
|
Weidong
WANG
Editor
Email:
wangweidong[at]chinawllc.com
|
|
Yunwei
ZHAO
Editor
Email:
zhaoyw[at]cert.org.cn
|
X.gnssa-iot
Guidelines of implementing network security situational awareness for IoT systems
|
Maofei
CHEN
Editor
Email:
chenmf6[at]chinatelecom.cn
|
|
Zhaoji
LIN
Editor
Email:
lin.zhaoji[at]foxmail.com
|
|
Dongxin
LIU
Editor
Email:
liudongxin[at]chinatelecom.cn
|
|
Laifu
WANG
Editor
Email:
wanglaifu[at]chinatelecom.cn
|
X.gpmr
Guidelines and security measures for prevention and mitigation of ransomware
|
Mufan
CUI
Editor
Email:
cuimf[at]cert.org.cn
|
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Zhihui
HAN
Editor
Email:
hzh[at]cert.org.cn
|
|
Minfeng
QIU
Editor
Email:
qiuminfeng[at]chinamobile.com
|
|
Wenlei
WANG
Editor
Email:
wwl[at]cert.org.cn
|
X.gsm-cdc
Guidelines on Security Metrics for CDC
|
Hiroshi
TAKECHI
Editor
Email:
hiro[at]takechi.org
|
X.ias
Functional requirements for the integrated authentication service of telecommunication operators
|
Hang
DONG
Editor
Email:
donghang[at]chinamobile.com
|
|
Chen
ZHANG
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
|
|
Yunfa
ZHU
Editor
Email:
19802024070[at]139.com
|
X.icd-schemas
Vendor agnostic security data schemas for integrated cyber defence solutions
|
Arnaud
TADDEI
Editor
Email:
arnaud.taddei[at]broadcom.com
|
X.idse
Evaluation methodology for in-vehicle intrusion detection systems
|
Weiwei
GONG
Editor
Email:
gongweiwei[at]360.cn
|
|
Huamin
JIN
Editor
Email:
jhm[at]gsta.com;
|
|
Laifu
WANG
Editor
Email:
wanglaifu[at]chinatelecom.cn
|
|
Minrui
YAN
Editor
Email:
yanminrui1[at]huawei.com
|
|
Yi
ZHANG
Editor
Email:
enidzhang2019[at]163.com
|
X.ig-dw
Implementation guidelines for digital watermarking
|
Shiqi
LI
Editor
Email:
lishiqi.li[at]alibaba-inc.com
|
|
Weiwei
SUN
Editor
Email:
sunweiwei.sww[at]alibaba-inc.com
|
|
Yong
SUN
Editor
Email:
sy359975[at]alibaba-inc.com
|
X.iot-dt
Technical requirements for verification of IoT data security
|
Wenyu
DONG
Editor
Email:
dongwenyu[at]chinamobile.com
|
|
Junzhi
YAN
Editor
Email:
yanjunzhi[at]chinamobile.com
|
|
Feng
ZHANG
Editor
Email:
zhangfeng[at]chinamobile.com
|
X.IoT-RF-Auth
Security framework for radio frequency characteristics-based IoT device authentication
|
Na
CAO
Editor
Email:
xt-caona[at]jx.sgcc.com.cn
|
|
Rixuan
QIU
Editor
Email:
xt-qiurx[at]jx.sgcc.com.cn
|
X.ivkm-sec
Security requirements and guidelines for the in-vehicle key management
|
Jiyong
HAN
Editor
Email:
jiyong.han[at]hyundai.com
|
|
Sang-Woo
LEE
Editor
Email:
ttomlee[at]etri.re.kr
|
|
Yousik
LEE
Editor
Email:
yousik.lee[at]sch.ac.kr
|
|
Seungwook
PARK
Editor
Email:
seungwook.park[at]hyundai.com
|
X.mbaas-cs-sec
Security requirements and framework of collaboration service for multiple blockchain as a service platforms
|
Xiongwei
JIA
Editor
Email:
jiaxw9[at]chinaunicom.cn
|
|
Keng
LI
Editor
Email:
kli[at]fiberhome.com
|
|
Yimin
LIU
Editor
Email:
liuym[at]chinaunicom.cn
|
|
Qiuli
MEI
Editor
Email:
meiqiuli2010[at]163.com
|
|
Kyeong Hee
OH
Editor
Email:
khoh[at]tcaservices.kr
|
|
Yuwei
WANG
Editor
Email:
ywwang[at]ict.ac.cn
|
X.MVSC
Minimum viable security controls
|
Gabor
ACS-KURUCZ
Editor
Email:
acskurucz[at]google.com
|
X.nspam
Security framework for network storage protection against malware attacks
|
Bongchan
KIM
Editor
Email:
kbchani[at]namusoft.co.kr
|
|
Jonghyun
KIM
Editor
Email:
jhk[at]etri.re.kr
|
|
Sujung
PARK
Editor
Email:
sjpark[at]tta.or.kr
|
|
Sungyong
SHIN
Editor
Email:
syshin[at]filingbox.com
|
|
Jonghyun
WOO
Editor
Email:
jhwoo[at]dualauth.com
|
X.oob-pacs
Framework for out-of-band physical access control systems using beacon-initiated mutual authentication
|
Il Jin
JUNG
Editor
Email:
jiljin[at]estorm.co.kr
|
|
Tail
LEE
Editor
Email:
tail3831[at]estorm.co.kr
|
|
Youngjoo
LEE
Editor
Email:
yjyjoo99[at]naver.com
|
|
Sujung
PARK
Editor
Email:
sjpark[at]tta.or.kr
|
|
Heejun
SHIN
Editor
Email:
heejun[at]estorm.co.kr
|
|
Jonghyun
WOO
Editor
Email:
jhwoo[at]dualauth.com
|
X.ota-sec
Implementation and evaluation of security functions to support over-the-air (OTA) update capability in connected vehicles
|
Sang-Woo
LEE
Editor
Email:
ttomlee[at]etri.re.kr
|
|
Yousik
LEE
Editor
Email:
yousik.lee[at]sch.ac.kr
|
|
Seungwook
PARK
Editor
Email:
seungwook.park[at]hyundai.com
|
|
Samuel
WOO
Editor
Email:
samuelwoo[at]dankook.ac.kr
|
X.pg-cla
A guideline for continual learning to actively respond to network attacks
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
|
Jongyoul
PARK
Editor
Email:
jongyoul[at]seoultech.ac.kr
|
X.qsdlt-ca
Guidelines for building crypto-agility and migration for quantum-safe DLT systems
|
Fuwen
LIU
Editor
Email:
liufuwen[at]chinamobile.com
|
|
Ke
WANG
Editor
Email:
wangkeyj[at]chinamobile.com
|
|
Weidong
WANG
Editor
Email:
wangweidong[at]chinawllc.com
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.rs-certi
Framework for risk assessment of server certificate in application
|
Xiang
LIU
Editor
Email:
liux15[at]pcl.ac.cn
|
|
Haiguang
WANG
Editor
Email:
wang.haiguang1[at]huawei.com
|
|
Rongwei
YANG
Editor
Email:
yangrw[at]pcl.ac.cn
|
|
Bin
ZHANG
Editor
Email:
zhangb[at]pcl.ac.cn
|
X.S-AIA
Security requirements and guidelines for Artificial Intelligence agent
|
Zhiyuan
HU
Editor
Email:
huzhiyuan[at]vivo.com
|
|
Jing
JING
Editor
Email:
jingjing[at]caict.ac.cn
|
|
Quanchao
LIU
Editor
Email:
liuquanchao[at]chinamobile.com
|
|
Ke
WANG
Editor
Email:
wangkeyj[at]chinamobile.com
|
|
Feng
ZHANG
Editor
Email:
zhangfeng[at]chinamobile.com
|
X.scr-cna
Security requirements of sandboxed container runtime for cloud native applications
|
Zeya
ZHU
Editor
Email:
zhuzy13[at]chinatelecom.cn
|
X.sc-sscti
Guidelines on Security Capabilities for Software Supply Chain in the Telecommunications Industry
|
Yuanying
XIAO
Editor
Email:
xiaoyy1[at]chinatelecom.cn
|
|
Jia
XIE
Editor
Email:
xiej68[at]chinatelecom.cn
|
|
Baoqi
YAN
Editor
Email:
yanbq[at]chinatelecom.cn
|
X.sec_QKD_profr
Framework of quantum key distribution (QKD) protocols in QKD network
|
Mariko
HONDA
Editor
Email:
tmyrkhonda[at]gmail.com
|
|
Hao
QIN
Editor
Email:
hao.qin[at]nus.edu.sg
|
X.sec_QKDNi
Security requirements for Quantum Key Distribution Network interworking (QKDNi)
|
Yazi
WANG
Editor
Email:
yazi_wang[at]bupt.edu.cn
|
|
Xiaosong
YU
Editor
Email:
xiaosongyu[at]bupt.edu.cn
|
|
Yongli
ZHAO
Editor
Email:
yonglizhao[at]bupt.edu.cn
|
X.secadef
Security capabilities definitions
|
Arnaud
TADDEI
Editor
Email:
arnaud.taddei[at]broadcom.com
|
|
Chen
ZHANG
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
|
X.sec-grp-mov
Security guideline for group movement service platform
|
Changoh
KIM
Editor
Email:
peterx.1053[at]gmail.com
|
|
HuyKang
KIM
Editor
Email:
cenda[at]korea.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.sec-va
Security guidelines for vertical applications within the IMT-2020 ecosystem
|
Jingpeng
BAI
Editor
Email:
baijp[at]chinatelecom.cn
|
|
Wang
SHAOMIN
Editor
Email:
wangshaomin[at]chinatelecom.cn
|
|
Xuan
SI
Editor
Email:
six1[at]chinatelecom.cn
|
|
Zhonghuai
XIE
Editor
Email:
xiezh55[at]chinaunicom.cn
|
X.sfdiw
Security framework of digital identity wallet for decentralized identity model
|
Abbie
BARBIR
Editor
Email:
barbira[at]cvshealth.com
|
|
Daeun
HYEON
Editor
Email:
hde0610[at]naver.com
|
|
Bradley
SNYDER
Editor
Email:
blsnyder[at]fbi.gov
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.sf-dtea
Security framework for detecting targeted email attacks
|
Chunghan
KIM
Editor
Email:
kevinkim[at]kiwontech.com
|
|
Jonghyun
KIM
Editor
Email:
jhk[at]etri.re.kr
|
|
Sujung
PARK
Editor
Email:
sjpark[at]tta.or.kr
|
|
Warren
SEALEY
Editor
Email:
warren.sealey[at]broadcom.com
|
|
Hyunmin
SHIN
Editor
Email:
hyunminshin[at]kiwontech.com
|
X.sfrms
Security framework and requirements of microservice for cloud computing using container technology
|
Wenjing
MA
Editor
Email:
berryjing0222[at]163.com
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
X.sgcnp
Security guidelines for platform as a service for cloud native applications
|
Wei
LIU
Editor
Email:
liuw147[at]chinaunicom.cn
|
|
Nan
MENG
Editor
Email:
mengnan[at]caict.ac.cn
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
|
Laifu
WANG
Editor
Email:
wanglaifu[at]chinatelecom.cn
|
|
Lei
XU
Editor
Email:
xulei56[at]chinaunicom.cn
|
X.sg-dcs
Security guidelines for DLT-based digital collection services
|
Jihye
KIM
Editor
Email:
ngswma32[at]gmail.com
|
|
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
|
X.sg-eAI
Security requirements and guidelines for embodied artificial intelligence systems
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
|
Chang
SONG
Editor
Email:
songc53[at]chinaunicom.cn
|
X.sg-eimv
Security guidelines for enabling integration of virtual and physical worlds of the metaverses in smart city
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
|
Chang
SONG
Editor
Email:
songc53[at]chinaunicom.cn
|
|
Junjie
XIA
Editor
Email:
xiajj2[at]chinaunicom.cn
|
X.sgfems
Security requirements and guidelines for factory energy management system
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Mengxiang
HAN
Editor
Email:
hanmx12[at]chinaunicom.cn
|
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
|
Junjie
XIA
Editor
Email:
xiajj2[at]chinaunicom.cn
|
X.sg-GenAI
Security Guidelines for Generative Artificial Intelligence Application Service
|
Yang
CHEN
Editor
Email:
cheny1672[at]chinaunicom.cn
|
|
Huifang
LI
Editor
Email:
lihf209[at]chinaunicom.cn
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
X.sg-GenAId
Security Guidelines for Generative Artificial Intelligence Data Life Cycle
|
Mi
CAO
Editor
Email:
caom11[at]chinaunicom.cn
|
|
Jiahang
LI
Editor
Email:
lijh1337[at]chinaunicom.cn
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
X.sg-ressso
Security guidelines for reporting email security status to security operations
|
Chunghan
KIM
Editor
Email:
kevinkim[at]kiwontech.com
|
|
Jonghyun
KIM
Editor
Email:
jhk[at]etri.re.kr
|
|
Hyunmin
SHIN
Editor
Email:
hyunminshin[at]kiwontech.com
|
X.sgrtem
Security guidelines for real-time event monitoring and integrated management in smart city platforms
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Chang
SONG
Editor
Email:
songc53[at]chinaunicom.cn
|
|
Junjie
XIA
Editor
Email:
xiajj2[at]chinaunicom.cn
|
X.sg-sd
Security guidelines for synthetic data in the context of AI systems
|
Lu
CHEN
Editor
Email:
chenl225[at]chinaunicom.cn
|
|
Hou
JIE
Editor
Email:
houj76[at]chinaunicom.cn
|
|
Lei
XU
Editor
Email:
xulei56[at]chinaunicom.cn
|
X.sg-tc
Security guidelines of trusted cloud services
|
Lu
CHEN
Editor
Email:
chenl225[at]chinaunicom.cn
|
|
Dongxin
LIU
Editor
Email:
liudongxin[at]chinatelecom.cn
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
X.s-isac
Security guidelines for integrated sensing and communication in IMT-2020 networks and beyond
|
Chang
LIU
Editor
Email:
liuchangyjy[at]chinamobile.com
|
|
Guoshun
NAN
Editor
Email:
nanguo2021[at]bupt.edu.cn
|
|
Li
SU
Editor
Email:
suli[at]chinamobile.com
|
|
Ke
WANG
Editor
Email:
wangkeyj[at]chinamobile.com
|
X.sm-iot
Technical requirements of security situation monitoring for Internet of things (IoT) devices
|
Hang
DONG
Editor
Email:
donghang[at]chinamobile.com
|
|
Xiaoqin
HUANG
Editor
Email:
huangxiaoqin[at]cmiot.chinamobile.com
|
|
Lijun
LIU
Editor
Email:
liulijun[at]cmiot.chinamobile.com
|
|
Le
YU
Editor
Email:
yule[at]chinamobile.com
|
|
Shuang
ZHANG
Editor
Email:
zhangshuang[at]cmiot.chinamobile.com
|
X.soar-cc
Framework of security orchestration, automation and response for cloud computing
|
Maofei
CHEN
Editor
Email:
chenmf6[at]chinatelecom.cn
|
|
Dongxin
LIU
Editor
Email:
liudongxin[at]chinatelecom.cn
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
|
Laifu
WANG
Editor
Email:
wanglaifu[at]chinatelecom.cn
|
|
Yi
ZHANG
Editor
Email:
enidzhang2019[at]163.com
|
X.Spud
Security requirements for psuedonymizing unstructured data
|
Lim
HYUNG-JIN
Editor
Email:
dream.hjlim[at]gmail.com
|
|
I seok
KANG
Editor
Email:
kis[at]kisa.or.kr
|
|
Junho
KIM
Editor
Email:
kimjh0201[at]kisa.or.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.sr-AI
Security requirements for AI systems
|
Daeun
HYEON
Editor
Email:
hde0610[at]naver.com
|
|
Jae Nam
KO
Editor
Email:
jnko[at]sch.ac.kr
|
|
Qing
LIU
Editor
Email:
liuqing6[at]chinatelecom.cn
|
|
Junhyung
PARK
Editor
Email:
junhyung.park[at]sch.ac.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.srapi-cc
Security requirements of application programming interface (API) for cloud computing
|
Maofei
CHEN
Editor
Email:
chenmf6[at]chinatelecom.cn
|
|
Dongxin
LIU
Editor
Email:
liudongxin[at]chinatelecom.cn
|
|
Laifu
WANG
Editor
Email:
wanglaifu[at]chinatelecom.cn
|
X.sr-da-GenAI
Security threats and requirements for data annotation service of generative artificial intelligence
|
Zhiyuan
HU
Editor
Email:
huzhiyuan[at]vivo.com
|
|
Luhua
WANG
Editor
Email:
wlh[at]cert.org.cn
|
|
Hong
ZHANG
Editor
Email:
zhanghong[at]cert.org.cn
|
|
Yunwei
ZHAO
Editor
Email:
zhaoyw[at]cert.org.cn
|
X.sr-di
Security requirements for DLT-based invoices
|
Jinsue
LEE
Editor
Email:
jinsue[at]pel.sejong.ac.kr
|
|
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
|
X.srdidm
Security requirements for decentralized identity management systems using distributed ledger technology
|
Byoung-Moon
CHIN
Editor
Email:
bmchin[at]tta.or.kr
|
|
Keundug
PARK
Editor
Email:
jacepark926[at]gmail.com
|
|
Kiho
YEO
Editor
Email:
beware523[at]paran.com
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.sr-dpts
Security requirements for DLT data on permissioned DLT-based distributed power trading systems
|
Lee
HANEUL
Editor
Email:
hameul6789[at]gmail.com
|
|
Jihye
KIM
Editor
Email:
ngswma32[at]gmail.com
|
|
Jinsue
LEE
Editor
Email:
jinsue[at]pel.sejong.ac.kr
|
|
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
|
X.sreai-ec
Security requirements of delivering edge AI on edge computing
|
Maofei
CHEN
Editor
Email:
chenmf6[at]chinatelecom.cn
|
|
Laifu
WANG
Editor
Email:
wanglaifu[at]chinatelecom.cn
|
X.sreg-ICS
Security Requirements and Evaluation Guidelines for Intelligent Customer Services
|
Xiongwei
JIA
Editor
Email:
jiaxw9[at]chinaunicom.cn
|
|
Xiaojun
MU
Editor
Email:
muxj[at]chinaunicom.cn
|
X.srg-AIgis
Security requirements and guidelines for AI-based image generation system
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Mengxiang
HAN
Editor
Email:
hanmx12[at]chinaunicom.cn
|
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
X.srgsc
Security requirements and guidelines of application and service for smart city platform
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
|
Jun
SHEN
Editor
Email:
shenjun6[at]chinatelecom.cn
|
|
Junjie
XIA
Editor
Email:
xiajj2[at]chinaunicom.cn
|
X.srgsdcs
Security requirements and guidelines of sensing and data collection system for city infrastructure
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Mengxiang
HAN
Editor
Email:
hanmx12[at]chinaunicom.cn
|
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
|
Junjie
XIA
Editor
Email:
xiajj2[at]chinaunicom.cn
|
X.sr-iiot
Security requirements for the industrial Internet of things based smart manufacturing reference model
|
Lee
HANEUL
Editor
Email:
hameul6789[at]gmail.com
|
|
Jinsue
LEE
Editor
Email:
jinsue[at]pel.sejong.ac.kr
|
|
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
|
|
Taeyang
LEE
Editor
Email:
taeyang[at]pel.sejong.ac.kr
|
X.srm-fml
Security requirements and measures of federated machine learning
|
Jianing
CHEN
Editor
Email:
chenjn[at]chinatelecom.cn
|
|
Xiongwei
JIA
Editor
Email:
jiaxw9[at]chinaunicom.cn
|
|
Qiuli
MEI
Editor
Email:
meiqiuli2010[at]163.com
|
X.srm-sup
Security risk management on software supply chain for telecommunication organizations
|
Yifu
WANG
Editor
Email:
wangyifu[at]cmdi.chinamobile.com
|
|
Yue
WANG
Editor
Email:
wangy2025[at]chinaunicom.cn
|
|
Chen
ZHANG
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
|
X.sr-smb
Security requirements for industrial IoT data of smart manufacturing using blockchain
|
Haneul
LEE
Editor
Email:
haneul[at]pel.sejong.ac.kr
|
|
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
|
X.ssc-sa
Guidelines for software supply chain security audit
|
Lizhu
SU
Editor
Email:
sulz9[at]chinaunicom.cn
|
X.SSDHN-AI-Atk
Security Guidelines for Software-Defined Heterogeneous Networks Architecture against AI generated Attacks and Threats
|
Ravinder
KUMAR
Editor
Email:
ravinder.kumar74[at]gov.in
|
|
Yashwant
KUMAR
Editor
Email:
ddgngn.tec[at]gov.in
|
|
Vaishnavi
MOORTHY
Editor
Email:
vaishnam[at]srmist.edu.in
|
|
Revathi
VENKATARAMAN
Editor
Email:
revathin[at]srmist.edu.in
|
X.stie
Structured Threat Information Expression (STIE)
|
Michael
ROSA
Editor
Email:
mjrosa[at]cyber.nsa.gov
|
|
Duncan
SPARRELL
Editor
Email:
duncan[at]sfractal.com
|
X.stm-dpm
Security for things across metaverses in aspects of data processing and management
|
Xiongwei
JIA
Editor
Email:
jiaxw9[at]chinaunicom.cn
|
|
Xiaojun
MU
Editor
Email:
muxj[at]chinaunicom.cn
|
|
Junhyung
PARK
Editor
Email:
junhyung.park[at]sch.ac.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.st-ssc
Security threats of software supply chain
|
Daeun
HYEON
Editor
Email:
hde0610[at]naver.com
|
|
Jae Nam
KO
Editor
Email:
jnko[at]sch.ac.kr
|
|
Junhyung
PARK
Editor
Email:
junhyung.park[at]sch.ac.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.suppl.divs
Rationale and initial vision of a decentralized identity verification system (DIVS) based on verifiable data
|
Daeun
HYEON
Editor
Email:
hde0610[at]naver.com
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Bradley
SNYDER
Editor
Email:
blsnyder[at]fbi.gov
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.suppl-tig-iotsec
Technical implementation guidelines for IoT devices and gateway
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Jyoti
SENGAR
Editor
Email:
jyoti.sengar[at]gov.in
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.taeii
Trusted Automated Exchange of Intelligence Information (TAEII)
|
Michael
ROSA
Editor
Email:
mjrosa[at]cyber.nsa.gov
|
|
Duncan
SPARRELL
Editor
Email:
duncan[at]sfractal.com
|
X.tas
Telebiometric authentication using speaker recognition
|
Myung Geun
CHUN
Editor
Email:
mgchun[at]chungbuk.ac.kr
|
|
Fatoumata
SAMAKE
Editor
Email:
fsamake42002[at]yahoo.fr
|
X.tc-ifd
Technical capabilities of interactive fraud detection
|
Bibo
LIU
Editor
Email:
lubibo.lbb[at]alibaba-inc.com
|
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
|
Jin
PENG
Editor
Email:
jim.pj[at]antgroup.com
|
X.tis
Telebiometric authentication based on information splitting
|
Myung Geun
CHUN
Editor
Email:
mgchun[at]chungbuk.ac.kr
|
X.uc-zt-5g
Security threats associated with use cases for applying zero trust to IMT-2020 private network deployments
|
Junhyung
PARK
Editor
Email:
junhyung.park[at]sch.ac.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.vctp
Verifiable credential-based trust propagation framework in the decentralized identity
|
Abbie
BARBIR
Editor
Email:
barbira[at]cvshealth.com
|
|
Daeun
HYEON
Editor
Email:
hde0610[at]naver.com
|
|
Junhyung
PARK
Editor
Email:
junhyung.park[at]sch.ac.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Bradley
SNYDER
Editor
Email:
blsnyder[at]fbi.gov
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
X.vide
Guideline of visual feature protection and secure sharing mechanisms for de-identification
|
Feng
GAO
Editor
Email:
gaofeng149[at]chinaunicom.cn
|
|
Youngjoo
JO
Editor
Email:
run.youngjoo[at]etri.re.kr
|
|
Jongyoul
PARK
Editor
Email:
jongyoul[at]seoultech.ac.kr
|
X.ztmc
Guidelines for Hhigh level Zero trust model and its security capabilities for in telecommunication networks
|
Junhyung
PARK
Editor
Email:
junhyung.park[at]sch.ac.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
XSTR.ac-pqc
Technical Report: Guidance on use of advanced cryptography based on Post Quantum Cryptography (PQC)
|
Koji
NAKAO
Editor
Email:
ko-nakao[at]nict.go.jp
|
XSTR.AISec
Technical Report: Artificial intelligence security standardization strategies
|
Shaoyong
GUO
Editor
Email:
syguo[at]bupt.edu.cn
|
|
Zhiyuan
HU
Editor
Email:
huzhiyuan[at]vivo.com
|
|
Weizhao
HUANG
Editor
Email:
goodbean2000[at]163.com
|
|
Xiongwei
JIA
Editor
Email:
jiaxw9[at]chinaunicom.cn
|
|
Jabu
MTSWENI
Editor
Email:
jmtsweni[at]csir.co.za
|
|
Lin
SHI
Editor
Email:
shilin1[at]caict.ac.cn
|
XSTR.cr-mv
Technical Report: Cyber risks, threats, and harms in the metaverse
|
Jae Nam
KO
Editor
Email:
jnko[at]sch.ac.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
XSTR.cs-sc
Technical Report: Collection of Security Concerns for extracting the Security Requirements for Cyber Security Reference Architecture
|
N. Kishor
NARANG
Editor
Email:
design[at]narnix.com
|
|
Jitender
PRAKASH
Editor
Email:
dirsa-dot[at]gov.in
|
|
Preetika
SINGH
Editor
Email:
preetika.singh87[at]gov.in
|
|
Pushpendra Kumar
SINGH
Editor
Email:
pushpendraks.its[at]gov.in
|
XSTR.cs-uc
Technical Report: Use cases for extracting the security requirements for cyber security reference architecture
|
Daeun
HYEON
Editor
Email:
hde0610[at]naver.com
|
|
Juhee
KI
Editor
Email:
eye[at]iitp.kr
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
XSTR.dpama
Technical Report on " A Landscape analysis for data protection of avatars in metaverse applications"
|
Heebong
CHOI
Editor
Email:
hhbchoi[at]gmail.com
|
|
Dae-Ki
KANG
Editor
Email:
dkkang[at]dongseo.ac.kr
|
|
HoonJae
LEE
Editor
Email:
hjlee[at]dongseo.ac.kr
|
XSTR.fcnsc
Technical Report: Framework for cloud native based security collaboration mechanism among cloud service providers
|
Zhengwei
CHANG
Editor
Email:
changzw[at]126.com
|
|
Lin
CHEN
Editor
Email:
chenlin6[at]caict.ac.cn
|
|
Hao
HAN
Editor
Email:
hhan[at]nuaa.edu.cn
|
|
Bo
PANG
Editor
Email:
pang-bo[at]outlook.com
|
|
Xuan
ZHA
Editor
Email:
zhaxuan[at]caict.ac.cn
|
|
Linghao
ZHANG
Editor
Email:
16100178[at]qq.com
|
XSTR.FMSC-IMT2030
Technical Report: Security technologies of fixed, mobile and satellite convergence of IMT-2030 networks
|
Meiling
CHEN
Editor
Email:
chenmeiling[at]chinamobile.com
|
|
Li
SU
Editor
Email:
suli[at]chinamobile.com
|
|
Junzhi
YAN
Editor
Email:
yanjunzhi[at]chinamobile.com
|
XSTR.gscim-dlt
Technical Report: Guidelines for security consideration for incident management by DLT service provider
|
Yue
CHEN
Editor
Email:
chenyue[at]cert.org.cn
|
|
Han
HAN
Editor
Email:
hanh[at]cert.org.cn
|
|
Junzhi
YAN
Editor
Email:
yanjunzhi[at]chinamobile.com
|
|
Yunwei
ZHAO
Editor
Email:
zhaoyw[at]cert.org.cn
|
XSTR.hyb_qsafe
Technical Report: Overview of key management of hybrid approaches for quantum-safe communications
|
Kaoru
KENYOSHI
Editor
Email:
kaoru.kenyoshi[at]nict.go.jp
|
XSTR.IMT2030-sec-con
Technical Report on "Security Consideration for IMT-2030 Networks"
|
HaiTao
DU
Editor
Email:
duhaitao[at]chinamobile.com
|
|
Yutaka
MIYAKE
Editor
Email:
yu-miyake[at]kddi.com
|
|
Li
SU
Editor
Email:
suli[at]chinamobile.com
|
|
Ke
WANG
Editor
Email:
wangkeyj[at]chinamobile.com
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
XSTR.kdc_qkdn
Technical Report: Key distribution center based approaches in the service layer to manage keys supplied by QKDN
|
Shen
HE
Editor
Email:
heshen[at]chinamobile.com
|
|
Fuwen
LIU
Editor
Email:
liufuwen[at]chinamobile.com
|
|
Zhangchao
MA
Editor
Email:
mazhangchao[at]qtict.com
|
|
Ye
TIAN
Editor
Email:
tianye[at]chinamobile.com
|
|
Yong
ZHAO
Editor
Email:
yong.zhao[at]quantum-info.com
|
XSTR.lzkml
Technical Report: Landscape analysis of Zero-Knowledge machine learning
|
Dong Bin
CHOI
Editor
Email:
dbchoi85[at]gmail.com
|
|
Jae Hoon
NAH
Editor
Email:
jhnah[at]etri.re.kr
|
|
JoYeon
PARK
Editor
Email:
hpjoanne[at]sogang.ac.kr
|
XSTR.QKDN-SP
Technical Report: Overview of security profile for Quantum Key Distribution Networks in hybrid mode
|
Venkata Rama Raju
CHELLE
Editor
Email:
cvramaraju.v[at]gov.in
|
|
Soumya
DAS
Editor
Email:
soumya06.das[at]gmail.com
|
|
Prabhakar
KRISHNAN
Editor
Email:
kprabhakar[at]am.amrita.edu
|
|
Ravindra Pratap
SINGH
Editor
Email:
rpsingh[at]prl.res.in
|
XSTR.saAIoT
Technical Report: Security Threat Analysis for Artificial Intelligence of Things on Devices
|
Yang
CHEN
Editor
Email:
cheny1672[at]chinaunicom.cn
|
|
Shiding
SUN
Editor
Email:
sunsd15[at]chinaunicom.cn
|
|
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
|
XSTR.sa-ran
Technical Report on "Security Attacks in Radio Access Networks"
|
Eduardo
RODRIGUES
Editor
Email:
eduardorodrigues[at]anatel.gov.br
|
|
Dalton
VALADARES
Editor
Email:
dalton.valadares[at]embedded.ufcg.edu.br
|
XSTR.sd-cnc
Technical report: Security guidelines for data of coordination of networking and computing
|
Li
SU
Editor
Email:
suli[at]chinamobile.com
|
|
Ke
WANG
Editor
Email:
wangkeyj[at]chinamobile.com
|
|
Tingting
YANG
Editor
Email:
yangtingting[at]chinamobile.com
|
XSTR.se-AI
Technical Report: Security Evaluation on Artificial Intelligence Technology in ICT
|
Jia
CHEN
Editor
Email:
chenjia[at]chinamobile.com
|
|
Quanchao
LIU
Editor
Email:
liuquanchao[at]chinamobile.com
|
|
Yong
SUN
Editor
Email:
sy359975[at]alibaba-inc.com
|
|
Ke
WANG
Editor
Email:
wangkeyj[at]chinamobile.com
|
XSTR.sec-iepi-AI
Technical Report: Security guideline for artificial intelligence applications of IoT-based electric power infrastructure monitoring system
|
Mamadou Sire
BARRY
Editor
Email:
mamadou.barry[at]artp.sn
|
|
Liu
BOYU
Editor
Email:
13939010853[at]163.com
|
|
Fangfang
DANG
Editor
Email:
1621597980[at]qq.com
|
|
Shaoyong
GUO
Editor
Email:
syguo[at]bupt.edu.cn
|
|
Zhaotai
MENG
Editor
Email:
mengzhaotai[at]pku.edu.cn
|
XSTR.sec-int-cpc
Technical report: Security considerations for interconnection of computing power centers
|
Yu
JIANG
Editor
Email:
jiangyu[at]chinatelecom.cn
|
|
Xiang
LIU
Editor
Email:
liux15[at]pcl.ac.cn
|
|
Weizhe
ZHANG
Editor
Email:
weizhe.zhang[at]pcl.ac.cn
|
|
Yu
ZHANG
Editor
Email:
zhangyu5[at]cmdi.chinamobile.com
|
XSTR.sg-lmcs
Technical report: Security guidelines for DLT-based lifecycle management of computing services
|
Lanfang
REN
Editor
Email:
renlanfang[at]chinamobile.com
|
|
Junzhi
YAN
Editor
Email:
yanjunzhi[at]chinamobile.com
|
|
Bo
YANG
Editor
Email:
yangbo[at]chinamobile.com
|
|
Huachun
ZHOU
Editor
Email:
hchzhou[at]bjtu.edu.cn
|
XSTR.SIMRegBio
Technical Report: Guidelines for SIM Identity and Biometrics Registration
|
Kwadwo
OSAFO-MAAFO
Editor
Email:
kwadwo.osafo-maafo[at]nca.org.gh
|
|
Opeolu
OYEBANJI
Editor
Email:
opeolu[at]ncc.gov.ng
|
|
Shamsuddeen
SABO
Editor
Email:
ssabo[at]ncc.gov.ng
|
|
Pushpendra Kumar
SINGH
Editor
Email:
pushpendraks.its[at]gov.in
|
XSTR.smpa
Technical Report: Security middle platform architecture
|
Jingyang
LI
Editor
Email:
lijy29[at]chinatelecom.cn
|
|
Ke
WANG
Editor
Email:
wangkeyj[at]chinamobile.com
|
|
Shuai
WANG
Editor
Email:
wangshuai8[at]chinatelecom.cn
|
|
Haodi
ZHANG
Editor
Email:
zhanghaodi[at]chinatelecom.cn
|
XSTR.SQKDN-SC
Technical Report: Security consideration for satellite-based quantum key distribution network
|
Dongdong
LI
Editor
Email:
dongdong.li[at]quantum-info.com
|
|
Ming-Han
LI
Editor
Email:
liminghan[at]qtict.com
|
|
Shengkai
LIAO
Editor
Email:
skliao[at]ustc.edu.cn
|
|
Weiyang
ZHANG
Editor
Email:
zwy2hucong[at]ustc.edu.cn
|
XSTR.srsec
Technical Report: Security aspects of segment routing IPv6 for the convergence of computing and network for telecommunication operators
|
Gang
DU
Editor
Email:
dugang[at]cmdi.chinamobile.com
|
|
Xuetao
DU
Editor
Email:
duxuetao[at]cmdi.chinamobile.com
|
|
Chen
ZHANG
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
|
XSTR.st-iot
Technical Report: Security threat scenarios in Internet of Things
|
Ernesto
SILVEIRA
Editor
Email:
ernestom[at]anatel.gov.br
|
|
Dalton
VALADARES
Editor
Email:
dalton.valadares[at]embedded.ufcg.edu.br
|
XSTR.Suss-rev
Technical Report: Successful use of security standards
|
Abbie
BARBIR
Editor
Email:
barbira[at]cvshealth.com
|
XSTR.trust
Technical Report: Trust framework for telecommunication/ICTs
|
Jae Nam
KO
Editor
Email:
jnko[at]sch.ac.kr
|
|
N. Kishor
NARANG
Editor
Email:
design[at]narnix.com
|
|
Zoe Sungchae
PARK
Editor
Email:
zoesc.park[at]sch.ac.kr
|
|
Heung Youl
YOUM
Editor
Email:
hyyoum[at]sch.ac.kr
|
XSTR.trust-metaverse
Technical Report: Technical challenges to achieving trustworthy metaverses
|
Xiongwei
JIA
Editor
Email:
jiaxw9[at]chinaunicom.cn
|
|
Gyu Myoung
LEE
Editor
Email:
gyumyoung.lee[at]gmail.com
|
|
Wonjoo
PARK
Editor
Email:
wjpark[at]etri.re.kr
|
|
Xiaojia
SONG
Editor
Email:
songxiaojia[at]chinamobile.com
|
XSTR.verm
Technical Report: Framework for verification of messages
|
Kwadwo
OSAFO-MAAFO
Editor
Email:
kwadwo.osafo-maafo[at]nca.org.gh
|