• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: TAC ]" (49)
  1. 21. ID-based Tripartite Multiple Key Agreement Protocol Combined with Key Derivation Function
  2. 22. An improved information input algorithm and information input device using Tactile devices based on wearable PC
  3. 23. Advanced n based Packet Marking Mechanism for IP Traceback
    Lee Hyung-Woo, Vol. 6, No. 1, pp. 13-26, Feb. 2005
    Keywords: Packet Marking, DDoS attack, IP Traceback, Network Security
  4. 24. A Threaded Tree Construction Algorithm not Using Stack
    Lee Dae-Sik, Vol. 5, No. 5, pp. 119-128, Oct. 2004
    Keywords: Threaded Tree, Stack, Parsing
  5. 25. Detection of Network Attack Symptoms Based on the Traffic Measurement on Highspeed Internet Backbone Links
    Roh Byeong-hee, Vol. 5, No. 4, pp. 23-34, Aug. 2004
    Keywords: Network Security, Attack Detection, Attack Traffic Modeling
  6. 26. A Study on Military Operational Concepts for Commercial Low Earth Orbit (LEO) Satellite-Based Communication Systems
  7. 27. LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology
    Yonghyeon Park, Changhee Choi, Vol. 26, No. 4, pp. 9-18, Aug. 2025
    10.7472/jksii.2025.26.4.9
    Keywords: LLM, finetuning, MITRE ATT&CK, cyber attack technique
  8. 28. Cybersecurity Risk Assessment: An Asset-Based Approach to Pre-Attack Threat Analysis
    Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
    10.7472/jksii.2025.26.3.19
    Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis
  9. 29. A Study of Recent Research Trends on XAI in Defense Domain and Adversarial Attacks
    Sang-ho Lee, Youngho Cho, Vol. 25, No. 6, pp. 147-154, Dec. 2024
    10.7472/jksii.2024.25.6.147
    Keywords: XAI, Adversarial attack, Military Artificial Intelligence
  10. 30. Analysis of Mission Impact of Counter-Fire Operations due to Cyber Attacks using CyMIA