• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: TAC ]" (52)
  1. 41. A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models
    Si-on Jeong, Tae-hyun Han, Seung-bum Lim, Tae-jin Lee, Vol. 24, No. 4, pp. 25-36, Aug. 2023
    10.7472/jksii.2023.24.4.25
    Keywords: Artificial intelligence, robustness, Adversarial attack
  2. 42. Cyber attack group classification based on MITRE ATT&CK model
    Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
    10.7472/jksii.2022.23.6.1
    Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK
  3. 43. Anomaly detection and attack type classification mechanism using Extra Tree and ANN
  4. 44. A study on machine learning-based defense system proposal through web shell collection and analysis
    Ki-hwan Kim, Yong-tae Shin, Vol. 23, No. 4, pp. 87-94, Aug. 2022
    10.7472/jksii.2022.23.4.87
    Keywords: Web Service, WebShell attack, Machine Learning, WebShell collection and analysis, Defense System
  5. 45. Proposal of Hostile Command Attack Method Using Audible Frequency Band for Smart Speaker
    Tae-jun Park, Jongsub Moon, Vol. 23, No. 4, pp. 1-9, Aug. 2022
    10.7472/jksii.2022.23.4.1
    Keywords: DolphinAttack, Smart speaker, Voice Controllable System, Speaker Recognition
  6. 46. Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger Fabric
  7. 47. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis
    Dong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
    10.7472/jksii.2021.22.3.45
    Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM
  8. 48. A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain
  9. 49. A Profiling Case Study to Phishing Mail Attack Group
    Jae-il Lee, Yong-joon Lee, Hyuk-jin Kwon, Vol. 21, No. 2, pp. 91-97, Apr. 2020
    10.7472/jksii.2020.21.2.91
    Keywords: Phishing mail, hacking, Cyber Attack Group, Profiling
  10. 50. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
    Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
    10.7472/jksii.2020.21.2.1
    Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering