/bin/bash

jc0818@portfolio:~$ ./introduce.sh

jc0818

Studying

0x01 | Certificate

K-Shield Jr. 13th

Vulnerability Analysis Process

Kisa Bug Hunting

Intermediate Course

Information processing industry engineer

White Hat School(pre-BOB)_3rd

0x02 | ️Activity

0x03 | Paper

CISC'25: Analysis of ECDIS Cybersecurity Threat Scenarios Applying the S-100 Standard: A STRIDE Model-based Approach

CISC'25: A Methodology for Cyber Threat Assessment of ECDIS IP Interfaces in Compliance with the S-100 Standard

CISC'25: Mitigating the Risks of Chart Deletion Updates in ECDIS: A Procedural Approach

WISA_2025: NMEA Under Siege: Dynamic Flooding Attacks and Defenses

WISA_2025: Visual Tampering in S-52: Threats and Protections

ISIS_2025: Quantum Neural Network Approach for Classifying Dummy Power Traces in Side-Channel Analysis

0x04 | CVE