• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: TAC ]" (42)
  1. 11. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis
    Dong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
    10.7472/jksii.2021.22.3.45
    Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM
  2. 12. A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain
  3. 13. A Profiling Case Study to Phishing Mail Attack Group
    Jae-il Lee, Yong-joon Lee, Hyuk-jin Kwon, Vol. 21, No. 2, pp. 91-97, Apr. 2020
    10.7472/jksii.2020.21.2.91
    Keywords: Phishing mail, hacking, Cyber Attack Group, Profiling
  4. 14. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
    Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
    10.7472/jksii.2020.21.2.1
    Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering
  5. 15. A study on the Application of Effects-based Operation in Cyberspace
    Won-gu Jang, Kyun-ho Lee, Vol. 21, No. 1, pp. 221-230, Feb. 2020
    10.7472/jksii.2020.21.1.221
    Keywords: Effects-based Operation, Cyberspace, Cyber Attack, Five Strategic Rings Model, Parallel Warfare
  6. 16. A Novel Design of Cloud-based Management Solution for Android Containers
    Nam Pham Nguyen Xuan, Hojin Chun, Souhwan Jung, Vol. 20, No. 1, pp. 67-75, Feb. 2019
    10.7472/jksii.2019.20.1.67
    Keywords: Android Container, Openstack, Container Runtime, HW device, Cloud computing
  7. 17. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
    Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
    10.7472/jksii.2019.20.1.01
    Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail
  8. 18. Workflow Process-Aware Data Cubes and Analysis
  9. 19. Detecting code reuse attack using RNN
    Jin-sub Kim, Jong-sub Moon, Vol. 19, No. 3, pp. 15-23, Jun. 2018
    10.7472/jksii.2018.19.3.15
    Keywords: code reuse attack, ROP(Return-Oriented Programming), RNN(Recurrent Neural Network)
  10. 20. A Study on the Characteristics of a series of Autoencoder for Recognizing Numbers used in CAPTCHA
    Jae-seung Jeon, Jong-sub Moon, Vol. 18, No. 6, pp. 25-34, Dec. 2017
    10.7472/jksii.2017.18.6.25
    Keywords: CAPTCHA, Autoencoder, Stacked autoencoder, Denoising, SOFTMAX