Digital Library
Search: "[ keyword: TAC ]" (52)
-
Hyang-Chang Choi, Noh Bong-Nam, Lee Hyung-Hyo, Vol. 7, No. 5, pp. 59-70, Oct. 2006
Keywords: Scenario Attack, Network Simulator, IDS, DARPA -
Lee Sang-Gon, Lee Hoon-Jae, Vol. 7, No. 3, pp. 133-142, Jun. 2006
Keywords: key agreement, ID based, Security, Unknown key-share attack, inpersonation attack -
Jeong-Hoon Shin, Kwang-Seok Hong, Vol. 6, No. 5, pp. 73-84, Oct. 2005
Keywords: HCl, Tactile device, Information input device, Information input algorithm -
Lee Hyung-Woo, Vol. 6, No. 1, pp. 13-26, Feb. 2005
Keywords: Packet Marking, DDoS attack, IP Traceback, Network Security -
Roh Byeong-hee, Vol. 5, No. 4, pp. 23-34, Aug. 2004
Keywords: Network Security, Attack Detection, Attack Traffic Modeling -
Sunjun Hwang, Vol. 27, No. 1, pp. 201-212, Feb. 2026
10.7472/jksii.2026.27.1.201
Keywords: Quantum Computing, Diffusion models, Adversarial attack, AI Security, Quantum Noise -
Yeonuk Kim, Jaeho Hwang, Jaeyoung Park, Vol. 27, No. 1, pp. 79-86, Feb. 2026
10.7472/jksii.2026.27.1.79
Keywords: Mobile Device, Virtual Vibrotactile rendering, Vector information -
Suho Son, Moonseong Kim, Vol. 26, No. 6, pp. 23-31, Dec. 2025
10.7472/jksii.2025.26.6.23
Keywords: VBA, OOXML, Imperative Attack, Declarative Attack, Command Usurping, Remote Template, OLE Object -
Sungjae Park, Sunghwan Cho, Sangjun Park, Hochan Lee, Sungjoon Ahn, Hyun Park, Yongchul Kim, Vol. 26, No. 4, pp. 19-29, Aug. 2025
10.7472/jksii.2025.26.4.19
Keywords: LEO Satellite Communication, Tactical Network, Network-Centric Warfare, ANASIS




