• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)

Digital Library

Search: "[ keyword: TAC ]" (40)
  1. 1. A Study on the Automation of Fish Species Identification and Body Length Measurement System
    Seung-Beom Kang, Seung-Gyu Kim, Sae-Yong Park, Tae-ho Im, Vol. 25, No. 1, pp. 17-27, Feb. 2024
    Keywords: TAC, Fish Species Identification, Body Length Measurement
  2. 2. A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks
  3. 3. A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models
    Si-on Jeong, Tae-hyun Han, Seung-bum Lim, Tae-jin Lee, Vol. 24, No. 4, pp. 25-36, Aug. 2023
    Keywords: Artificial intelligence, robustness, Adversarial attack
  4. 4. Cyber attack group classification based on MITRE ATT&CK model
    Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
    Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK
  5. 5. Anomaly detection and attack type classification mechanism using Extra Tree and ANN
  6. 6. A study on machine learning-based defense system proposal through web shell collection and analysis
    Ki-hwan Kim, Yong-tae Shin, Vol. 23, No. 4, pp. 87-94, Aug. 2022
    Keywords: Web Service, WebShell attack, Machine Learning, WebShell collection and analysis, Defense System
  7. 7. Proposal of Hostile Command Attack Method Using Audible Frequency Band for Smart Speaker
    Tae-jun Park, Jongsub Moon, Vol. 23, No. 4, pp. 1-9, Aug. 2022
    Keywords: DolphinAttack, Smart speaker, Voice Controllable System, Speaker Recognition
  8. 8. Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger Fabric
  9. 9. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis
    Dong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
    Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM
  10. 10. A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain