Browse > Article List

논문
1 A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth
Kim, Jinouk;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.5-14,
2 Power Trace Selection Method in Template Profiling Phase for Improvements of Template Attack
Jin, Sunghyun;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.15-23,
3 Anomaly Detection Using Visualization-based Network Forensics
Jo, Woo-yeon;Kim, Myung-jong;Park, Keun-ho;Hong, Man-pyo;Kwak, Jin;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.25-38,
4 Fingerprint Liveness Detection Using Patch-Based Convolutional Neural Networks
Park, Eunsoo;Kim, Weonjin;Li, Qiongxiu;Kim, Jungmin;Kim, Hakil; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.39-47,
5 Mobile Devices Control System using LSM
Bae, Hee-sung;Kim, So-yeon;Park, Tae-kyou; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.49-57,
6 Program Slicing for Binary code Deobfuscation
Mok, Seong-Kyun;Jeon, Hyeon-gu;Cho, Eun-Sun; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.59-66,
7 A Study on API Wrapping in Themida and Unpacking Technique
Lee, Jae-hwi;Han, Jaehyeok;Lee, Min-wook;Choi, Jae-mun;Baek, Hyunwoo;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.67-77,
8 A Study on the Setting Method of the File System Audit Function of Windows for Enhancing Forensic Readiness
Lee, Myeong-Su;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.79-90,
9 A Study on Malware Clustering Technique Using API Call Sequence and Locality Sensitive Hashing
Goh, Dong Woo;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.91-101,
10 Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention
Park, Sang-min;Lim, Jong-in; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.103-113,
11 A Study on Risk Analysis and Countermeasures of Electronic Financial Fraud
Jeong, Dae Yong;Kim, Gibum;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.115-128,
12 FAIR-Based Loss Measurement Caused by Personal Information Breach of a Company
Kim, Jeong-Gyu;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.129-145,
13 Decision Model of the Effectiveness for Advanced that Security Visualization
Lee, Min-Sun;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.147-162,
14 A Study on Major Countries's Level of Cybersecurity for Critical Infrastructure
Park, Hyang-mi;Yoo, Ji-yeon; / Korea Institute of Information Security and Cryptology , v.27, no.1, pp.163-176,