Digital Library
Search: "[ keyword: TAC ]" (40)
-
Seung-Beom Kang, Seung-Gyu Kim, Sae-Yong Park, Tae-ho Im, Vol. 25, No. 1, pp. 17-27, Feb. 2024
10.7472/jksii.2024.25.1.17
Keywords: TAC, Fish Species Identification, Body Length Measurement -
Se-ho Choi, Hang-sup Lim, Jung-young Choi, Oh-jin Kwon, Dong-kyoo Shin, Vol. 24, No. 6, pp. 137-144, Dec. 2023
10.7472/jksii.2023.24.6.137
Keywords: Cyberattack technology, Cyber Assets, Minimize Downtime, Intelligent Self-Recovery Technology -
Si-on Jeong, Tae-hyun Han, Seung-bum Lim, Tae-jin Lee, Vol. 24, No. 4, pp. 25-36, Aug. 2023
10.7472/jksii.2023.24.4.25
Keywords: Artificial intelligence, robustness, Adversarial attack -
Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
10.7472/jksii.2022.23.6.1
Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK -
Min-Gyu Kim, Myung-Mook Han, Vol. 23, No. 5, pp. 79-85, Oct. 2022
10.7472/jksii.2022.23.5.79
Keywords: Extreme Random Forest, Artificial neural network, Anomaly Detection, Anomaly Detection and Attack type Classification, Network intrusion detection -
6. A study on machine learning-based defense system proposal through web shell collection and analysisKi-hwan Kim, Yong-tae Shin, Vol. 23, No. 4, pp. 87-94, Aug. 2022
10.7472/jksii.2022.23.4.87
Keywords: Web Service, WebShell attack, Machine Learning, WebShell collection and analysis, Defense System -
Tae-jun Park, Jongsub Moon, Vol. 23, No. 4, pp. 1-9, Aug. 2022
10.7472/jksii.2022.23.4.1
Keywords: DolphinAttack, Smart speaker, Voice Controllable System, Speaker Recognition -
8. Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger FabricYong-bae Kim, Juyong Back, Jongweon Kim, Vol. 23, No. 3, pp. 47-56, Jun. 2022
10.7472/jksii.2022.23.3.47
Keywords: Blockchain, DTG(Digital Tacho-Graph), Hyperledger Fabric, lightweight blockchain, Random Seed, SDRS(Safe Driving Reward System), SDCN(Safe Driving Channel Network), SDRCN(Safe Driving Reward Channel Network) -
9. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection AnalysisDong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
10.7472/jksii.2021.22.3.45
Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM -
Jung-Sik Lee, Sung-Young Cho, Heang-Rok Oh, Myung-Mook Han, Vol. 22, No. 1, pp. 41-50, Feb. 2021
10.7472/jksii.2021.22.1.41
Keywords: Cyber Command Control System, Cyber Kill Chain Model, Defense Model, attack model, threat classification/analysis/prediction framework