Digital Library
Search: "[ keyword: 탐지 ]" (54)
-
Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
10.7472/jksii.2013.14.2.61
Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process -
Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
10.7472/jksii.2012.13.2.41
Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM -
Byung-Mun Lee, Hyun-Ho Shin, Un-Gu Kang, Vol. 12, No. 6, pp. 73-82, Dec. 2011
Keywords: Location-based service, Tracking system -
Moon-Sun Shin, Woo-Jin Paik, Vol. 10, No. 2, pp. 1-14, Apr. 2009
Keywords: alert data, IDS, sequential pattern mining, prefixSpan -
Jae-Young Chang, Jong-Myoung Park, Han-Joon Kim, Vol. 8, No. 6, pp. 43-54, Dec. 2007
Keywords: network intrusion system, outlier detection algorithm, density function -
Hyunjun Park, Insup Lee, Vol. 26, No. 4, pp. 1-8, Aug. 2025
10.7472/jksii.2025.26.4.1
Keywords: ddos detection, Deep Learning, Transfer Learning, traffic volume-based labeling -
Taesu Kim, Dongkyoo Shin, Dongil Shin, Vol. 26, No. 3, pp. 1-7, Jun. 2025
10.7472/jksii.2025.26.3.1
Keywords: Network intrusion detection, data augmentation -
Janghyuk Kauh, Changmin Jeong, Koohyung Kwon, Vol. 26, No. 1, pp. 221-233, Feb. 2025
10.7472/jksii.2025.26.1.221
Keywords: Hardware Trojan, Anomaly Detection, Electromagnetic Analysis, Side channel analysis, FPGA, ASIC