• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: TAC ]" (52)
  1. 21. Design and Implementation of Scenario-based Attack Simulator using NS
    Hyang-Chang Choi, Noh Bong-Nam, Lee Hyung-Hyo, Vol. 7, No. 5, pp. 59-70, Oct. 2006
    Keywords: Scenario Attack, Network Simulator, IDS, DARPA
  2. 22. ID-based Tripartite Multiple Key Agreement Protocol Combined with Key Derivation Function
  3. 23. An improved information input algorithm and information input device using Tactile devices based on wearable PC
  4. 24. Advanced n based Packet Marking Mechanism for IP Traceback
    Lee Hyung-Woo, Vol. 6, No. 1, pp. 13-26, Feb. 2005
    Keywords: Packet Marking, DDoS attack, IP Traceback, Network Security
  5. 25. A Threaded Tree Construction Algorithm not Using Stack
    Lee Dae-Sik, Vol. 5, No. 5, pp. 119-128, Oct. 2004
    Keywords: Threaded Tree, Stack, Parsing
  6. 26. Detection of Network Attack Symptoms Based on the Traffic Measurement on Highspeed Internet Backbone Links
    Roh Byeong-hee, Vol. 5, No. 4, pp. 23-34, Aug. 2004
    Keywords: Network Security, Attack Detection, Attack Traffic Modeling
  7. 27. Quantum Noise-based Adversarial Attack on Diffusion Models and Analysis of Defense Mechanisms
    Sunjun Hwang, Vol. 27, No. 1, pp. 201-212, Feb. 2026
    10.7472/jksii.2026.27.1.201
    Keywords: Quantum Computing, Diffusion models, Adversarial attack, AI Security, Quantum Noise
  8. 28. Vector Information Transfer through a Mobile Device Using Virtual Vibration Rendering
    Yeonuk Kim, Jaeho Hwang, Jaeyoung Park, Vol. 27, No. 1, pp. 79-86, Feb. 2026
    10.7472/jksii.2026.27.1.79
    Keywords: Mobile Device, Virtual Vibrotactile rendering, Vector information
  9. 29. Implementing of Malicious Execution Mechanisms in VBA and OOXML
    Suho Son, Moonseong Kim, Vol. 26, No. 6, pp. 23-31, Dec. 2025
    10.7472/jksii.2025.26.6.23
    Keywords: VBA, OOXML, Imperative Attack, Declarative Attack, Command Usurping, Remote Template, OLE Object
  10. 30. A Study on Military Operational Concepts for Commercial Low Earth Orbit (LEO) Satellite-Based Communication Systems