Digital Library
Search: "[ keyword: TAC ]" (52)
-
Si-on Jeong, Tae-hyun Han, Seung-bum Lim, Tae-jin Lee, Vol. 24, No. 4, pp. 25-36, Aug. 2023
10.7472/jksii.2023.24.4.25
Keywords: Artificial intelligence, robustness, Adversarial attack -
Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
10.7472/jksii.2022.23.6.1
Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK -
Min-Gyu Kim, Myung-Mook Han, Vol. 23, No. 5, pp. 79-85, Oct. 2022
10.7472/jksii.2022.23.5.79
Keywords: Extreme Random Forest, Artificial neural network, Anomaly Detection, Anomaly Detection and Attack type Classification, Network intrusion detection -
44. A study on machine learning-based defense system proposal through web shell collection and analysisKi-hwan Kim, Yong-tae Shin, Vol. 23, No. 4, pp. 87-94, Aug. 2022
10.7472/jksii.2022.23.4.87
Keywords: Web Service, WebShell attack, Machine Learning, WebShell collection and analysis, Defense System -
Tae-jun Park, Jongsub Moon, Vol. 23, No. 4, pp. 1-9, Aug. 2022
10.7472/jksii.2022.23.4.1
Keywords: DolphinAttack, Smart speaker, Voice Controllable System, Speaker Recognition -
46. Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger FabricYong-bae Kim, Juyong Back, Jongweon Kim, Vol. 23, No. 3, pp. 47-56, Jun. 2022
10.7472/jksii.2022.23.3.47
Keywords: Blockchain, DTG(Digital Tacho-Graph), Hyperledger Fabric, lightweight blockchain, Random Seed, SDRS(Safe Driving Reward System), SDCN(Safe Driving Channel Network), SDRCN(Safe Driving Reward Channel Network) -
47. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection AnalysisDong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
10.7472/jksii.2021.22.3.45
Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM -
Jung-Sik Lee, Sung-Young Cho, Heang-Rok Oh, Myung-Mook Han, Vol. 22, No. 1, pp. 41-50, Feb. 2021
10.7472/jksii.2021.22.1.41
Keywords: Cyber Command Control System, Cyber Kill Chain Model, Defense Model, attack model, threat classification/analysis/prediction framework -
Jae-il Lee, Yong-joon Lee, Hyuk-jin Kwon, Vol. 21, No. 2, pp. 91-97, Apr. 2020
10.7472/jksii.2020.21.2.91
Keywords: Phishing mail, hacking, Cyber Attack Group, Profiling -
Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
10.7472/jksii.2020.21.2.1
Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering




