Digital Library
Search: "[ keyword: TAC ]" (42)
-
11. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection AnalysisDong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
10.7472/jksii.2021.22.3.45
Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM -
Jung-Sik Lee, Sung-Young Cho, Heang-Rok Oh, Myung-Mook Han, Vol. 22, No. 1, pp. 41-50, Feb. 2021
10.7472/jksii.2021.22.1.41
Keywords: Cyber Command Control System, Cyber Kill Chain Model, Defense Model, attack model, threat classification/analysis/prediction framework -
Jae-il Lee, Yong-joon Lee, Hyuk-jin Kwon, Vol. 21, No. 2, pp. 91-97, Apr. 2020
10.7472/jksii.2020.21.2.91
Keywords: Phishing mail, hacking, Cyber Attack Group, Profiling -
Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
10.7472/jksii.2020.21.2.1
Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering -
Won-gu Jang, Kyun-ho Lee, Vol. 21, No. 1, pp. 221-230, Feb. 2020
10.7472/jksii.2020.21.1.221
Keywords: Effects-based Operation, Cyberspace, Cyber Attack, Five Strategic Rings Model, Parallel Warfare -
Nam Pham Nguyen Xuan, Hojin Chun, Souhwan Jung, Vol. 20, No. 1, pp. 67-75, Feb. 2019
10.7472/jksii.2019.20.1.67
Keywords: Android Container, Openstack, Container Runtime, HW device, Cloud computing -
Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
10.7472/jksii.2019.20.1.01
Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail -
Min-hyuck Jin, Kwang-hoon Pio Kim, Vol. 19, No. 6, pp. 83-89, Dec. 2018
10.7472/jksii.2018.19.6.83
Keywords: process-aware datacubes, workflow process mining, workflow process analytics, temporal workcase, temporal worktransference, XES format, workflow event log data center -
Jin-sub Kim, Jong-sub Moon, Vol. 19, No. 3, pp. 15-23, Jun. 2018
10.7472/jksii.2018.19.3.15
Keywords: code reuse attack, ROP(Return-Oriented Programming), RNN(Recurrent Neural Network) -
20. A Study on the Characteristics of a series of Autoencoder for Recognizing Numbers used in CAPTCHAJae-seung Jeon, Jong-sub Moon, Vol. 18, No. 6, pp. 25-34, Dec. 2017
10.7472/jksii.2017.18.6.25
Keywords: CAPTCHA, Autoencoder, Stacked autoencoder, Denoising, SOFTMAX