|
1 |
A Study on the BIL Bitstream Reverse-Engineering Tool-Chain Analysis
Yoon, Junghwan;Seo, Yezee;Kim, Hoonkyu;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.287-293,
|
|
2 |
The Analysis of Smartphone Backup Method through PC
Kim, Sangwho;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.295-301,
|
|
3 |
Bitcoin Mining Profitability Model and Analysis
Lee, Jinwoo;Cho, Kookrae;Yum, Dae Hyun;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.303-310,
|
|
4 |
A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest
Son, Dongyeol;Kim, Jimin;Ji, Cheongmin;Kim, Kangseok;Kim, Kihyung;Hong, Manpyo;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.311-326,
|
|
5 |
On-Line/Off-Line Signature Schemes with Tight Security Reduction to the RSA Problem
Choi, Kyung-yong;Park, Jong Hwan;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.327-338,
|
|
6 |
Study on Cryptographic Analysis of Erebus Ransomware
Kim, Soram;Kim, Jihun;Park, Myungseo;Kim, Daeun;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.339-346,
|
|
7 |
A Study on a Method of Identifying a Block Cipher Algorithm to Increase Ransomware Detection Rate
Yoon, Se-won;Jun, Moon-seog;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.347-355,
|
|
8 |
Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring
Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.357-367,
|
|
9 |
Distance-Based Keystroke Dynamics Smartphone Authentication and Threshold Formula Model
Lee, Shincheol;Hwang, Jung Yeon;Lee, Hyungu;Kim, Dong In;Lee, Sung-Hoon;Shin, Ji Sun;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.369-383,
|
|
10 |
A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning
Shin, Iksoo;Song, Jungsuk;Choi, Jangwon;Kwon, Taewoong;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.385-395,
|
|
11 |
A Method to Collect Trusted Processes for Application Whitelisting in macOS
Youn, Jung-moo;Ryu, Jae-cheol;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.397-405,
|
|
12 |
Instagram Users Behavior Analysis in a Digital Forensic Perspective
Seo, Seunghee;Kim, Yeog;Lee, Changhoon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.407-416,
|
|
13 |
A Study on COP-Transformation Based Metadata Security Scheme for Privacy Protection in Intelligent Video Surveillance
Lee, Donghyeok;Park, Namje;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.417-428,
|
|
14 |
BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment
Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.429-436,
|
|
15 |
VR Threat Analysis for Information Assurance of VR Device and Game System
Kang, Tae Un;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.437-447,
|
|
16 |
Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment
Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.449-456,
|
|
17 |
A Study on Detection Method of Multi-Homed Host and Implementation of Automatic Detection System for Multi-Homed Host
Lee, Mi-hwa;Yoon, Ji-won;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.457-469,
|
|
18 |
A Study on ICS Security Information Collection Method Using CTI Model
Choi, Jongwon;Kim, Yesol;Min, Byung-gil;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.471-484,
|
|
19 |
An Attack Graph Model for Dynamic Network Environment
Moon, Joo Yeon;Kim, Taekyu;Kim, Insung;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.485-500,
|
|
20 |
Deriving Performance Evaluation Indicator of Program for Developing the Next Generation of Top Security Leaders
Park, Sung-Kyu;Kim, Tae-Sung;Kim, Jin-Seog;Yu, Seong-Jae;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.501-511,
|
|
21 |
Study of Security Requirement of Smart Home Hub through Threat Modeling Analysis and Common Criteria
Park, Jae-Hyeon;Kang, Soo-young;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.28, no.2, pp.513-528,
|
|