• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: TAC ]" (49)
  1. 41. Proposal of Hostile Command Attack Method Using Audible Frequency Band for Smart Speaker
    Tae-jun Park, Jongsub Moon, Vol. 23, No. 4, pp. 1-9, Aug. 2022
    10.7472/jksii.2022.23.4.1
    Keywords: DolphinAttack, Smart speaker, Voice Controllable System, Speaker Recognition
  2. 42. Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger Fabric
  3. 43. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis
    Dong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
    10.7472/jksii.2021.22.3.45
    Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM
  4. 44. A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain
  5. 45. A Profiling Case Study to Phishing Mail Attack Group
    Jae-il Lee, Yong-joon Lee, Hyuk-jin Kwon, Vol. 21, No. 2, pp. 91-97, Apr. 2020
    10.7472/jksii.2020.21.2.91
    Keywords: Phishing mail, hacking, Cyber Attack Group, Profiling
  6. 46. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
    Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
    10.7472/jksii.2020.21.2.1
    Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering
  7. 47. A study on the Application of Effects-based Operation in Cyberspace
    Won-gu Jang, Kyun-ho Lee, Vol. 21, No. 1, pp. 221-230, Feb. 2020
    10.7472/jksii.2020.21.1.221
    Keywords: Effects-based Operation, Cyberspace, Cyber Attack, Five Strategic Rings Model, Parallel Warfare
  8. 48. A Novel Design of Cloud-based Management Solution for Android Containers
    Nam Pham Nguyen Xuan, Hojin Chun, Souhwan Jung, Vol. 20, No. 1, pp. 67-75, Feb. 2019
    10.7472/jksii.2019.20.1.67
    Keywords: Android Container, Openstack, Container Runtime, HW device, Cloud computing
  9. 49. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
    Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
    10.7472/jksii.2019.20.1.01
    Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail