• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)

Digital Library

Search: "[ author: Myung-Mook Han ]" (13)
  1. 1. RDP-based Lateral Movement Detection using PageRank and Interpretable System using SHAP
  2. 2. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis
    Dong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
    Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM
  3. 3. A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection
  4. 4. An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining
    Jiyoung Yun, Gun-Yoon Shin, Dong-Wook Kim, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 2, pp. 77-87, Apr. 2021
    Keywords: Explainable AI, Log anomaly detection, Bayesian Probability, Rule Extraction
  5. 5. A Study on Classification of Variant Malware Family Based on ResNet-Variational AutoEncoder
    Young-jeon Lee, Myung-Mook Han, Vol. 22, No. 2, pp. 1-9, Apr. 2021
    Keywords: Variant Malware, Malware classification, Variational AutoEncoder, Tranfer Learning, Ensemble learning
  6. 6. A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain
  7. 7. Survival network based Android Authorship Attribution considering overlapping tolerance
  8. 8. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
    Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
    Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering
  9. 9. The prediction of appearance of jellyfish through Deep Neural Network
  10. 10. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
    Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
    Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail