• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: TAC ]" (52)
  1. 1. A Novel Design of Cloud-based Management Solution for Android Containers
    Nam Pham Nguyen Xuan, Hojin Chun, Souhwan Jung, Vol. 20, No. 1, pp. 67-75, Feb. 2019
    10.7472/jksii.2019.20.1.67
    Keywords: Android Container, Openstack, Container Runtime, HW device, Cloud computing
  2. 2. Workflow Process-Aware Data Cubes and Analysis
  3. 3. Detecting code reuse attack using RNN
    Jin-sub Kim, Jong-sub Moon, Vol. 19, No. 3, pp. 15-23, Jun. 2018
    10.7472/jksii.2018.19.3.15
    Keywords: code reuse attack, ROP(Return-Oriented Programming), RNN(Recurrent Neural Network)
  4. 4. A Classification Model for Attack Mail Detection based on the Authorship Analysis
    Sung-Sam Hong, Gun-Yoon Shin, Myung-Mook Han, Vol. 18, No. 6, pp. 35-46, Dec. 2017
    10.7472/jksii.2017.18.6.35
    Keywords: Text Mining, Machine Learning, Classification, Authorship Analysis, Attacker Identification
  5. 5. A Study on the Characteristics of a series of Autoencoder for Recognizing Numbers used in CAPTCHA
    Jae-seung Jeon, Jong-sub Moon, Vol. 18, No. 6, pp. 25-34, Dec. 2017
    10.7472/jksii.2017.18.6.25
    Keywords: CAPTCHA, Autoencoder, Stacked autoencoder, Denoising, SOFTMAX
  6. 6. A Study on the Clustering method for Analysis of Zeus Botnet Attack Types in the Cloud Environment
    Won-il Bae, Suk-June Choi, Seong-Jin Kim, Hyeong-Cheon Kim, Jin Kwak, Vol. 18, No. 1, pp. 11-20, Feb. 2017
    10.7472/jksii.2017.18.1.11
    Keywords: Cloud computing, K-Means Clustering, Zeus botnet, Openstack
  7. 7. DDoS Attack Analysis Using the Improved ATMSim
    Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk R. Lee, Vol. 17, No. 2, pp. 19-28, Apr. 2016
    10.7472/jksii.2016.17.2.19
    Keywords: Anomaly traffic, self-similarity, Hurst parameter, ATMSim, DDoS attack
  8. 8. The Real-Time Detection of the Malicious JavaScript
    Hyun-Lock Choo, Jong-Hun Jung, Hwan-Kuk Kim, Vol. 16, No. 4, pp. 51-60, Aug. 2015
    10.7472/jksii.2015.16.4.51
    Keywords: Malicious JavaScript, Analysis Engine, Static Analysis, Dynamic Analysis, Script-Based Cyber Attack
  9. 9. An Inference Method of Stateless Firewall Policy Considering Attack Detection Threshold
  10. 10. A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method
    Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
    10.7472/jksii.2013.14.4.43
    Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack)