Browse > Article List

논문
1 A Study on the BIL Bitstream Reverse-Engineering Tool-Chain Analysis
Yoon, Junghwan;Seo, Yezee;Kim, Hoonkyu;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.287-293,
2 The Analysis of Smartphone Backup Method through PC
Kim, Sangwho;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.295-301,
3 Bitcoin Mining Profitability Model and Analysis
Lee, Jinwoo;Cho, Kookrae;Yum, Dae Hyun; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.303-310,
4 A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest
Son, Dongyeol;Kim, Jimin;Ji, Cheongmin;Kim, Kangseok;Kim, Kihyung;Hong, Manpyo; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.311-326,
5 On-Line/Off-Line Signature Schemes with Tight Security Reduction to the RSA Problem
Choi, Kyung-yong;Park, Jong Hwan; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.327-338,
6 Study on Cryptographic Analysis of Erebus Ransomware
Kim, Soram;Kim, Jihun;Park, Myungseo;Kim, Daeun;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.339-346,
7 A Study on a Method of Identifying a Block Cipher Algorithm to Increase Ransomware Detection Rate
Yoon, Se-won;Jun, Moon-seog; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.347-355,
8 Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring
Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.357-367,
9 Distance-Based Keystroke Dynamics Smartphone Authentication and Threshold Formula Model
Lee, Shincheol;Hwang, Jung Yeon;Lee, Hyungu;Kim, Dong In;Lee, Sung-Hoon;Shin, Ji Sun; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.369-383,
10 A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning
Shin, Iksoo;Song, Jungsuk;Choi, Jangwon;Kwon, Taewoong; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.385-395,
11 A Method to Collect Trusted Processes for Application Whitelisting in macOS
Youn, Jung-moo;Ryu, Jae-cheol; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.397-405,
12 Instagram Users Behavior Analysis in a Digital Forensic Perspective
Seo, Seunghee;Kim, Yeog;Lee, Changhoon; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.407-416,
13 A Study on COP-Transformation Based Metadata Security Scheme for Privacy Protection in Intelligent Video Surveillance
Lee, Donghyeok;Park, Namje; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.417-428,
14 BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment
Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.429-436,
15 VR Threat Analysis for Information Assurance of VR Device and Game System
Kang, Tae Un;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.437-447,
16 Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment
Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.449-456,
17 A Study on Detection Method of Multi-Homed Host and Implementation of Automatic Detection System for Multi-Homed Host
Lee, Mi-hwa;Yoon, Ji-won; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.457-469,
18 A Study on ICS Security Information Collection Method Using CTI Model
Choi, Jongwon;Kim, Yesol;Min, Byung-gil; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.471-484,
19 An Attack Graph Model for Dynamic Network Environment
Moon, Joo Yeon;Kim, Taekyu;Kim, Insung;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.485-500,
20 Deriving Performance Evaluation Indicator of Program for Developing the Next Generation of Top Security Leaders
Park, Sung-Kyu;Kim, Tae-Sung;Kim, Jin-Seog;Yu, Seong-Jae; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.501-511,
21 Study of Security Requirement of Smart Home Hub through Threat Modeling Analysis and Common Criteria
Park, Jae-Hyeon;Kang, Soo-young;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.28, no.2, pp.513-528,