|
1 |
Proposal of Detection Module for Fighter Aircraft Data Modulation Attack
Hong, Byoung-jin;Kim, Wan-ju;Kim, Ho-keun;Lim, Jae-sung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.5-16,
|
|
2 |
Secure 6LoWPAN Neighbor Discovery Address Registration Protocol
Han, Sang-woo;Park, Chang-seop;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.17-28,
|
|
3 |
An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN
Oh, Jeong Min;Jeong, Ik Rae;Byun, Jin Wook;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.29-43,
|
|
4 |
Android Application Call Relationship Analysis Based on DEX and ELF Binary Reverse Engineering
Ahn, Jinung;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.45-55,
|
|
5 |
Design of Context-Aware-Based Drone Control Mechanism by Using Two-Factor
Oh, Yoon-Seok;Kim, Aeyoung;Seo, Seung-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.57-66,
|
|
6 |
Smart Contract Code Rewritter for Improving Safety of Function Calls
Lee, Sooyeon;Jung, Hyungkun;Cho, Eun-Sun;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.67-75,
|
|
7 |
Study on File Recovery Based on Metadata Accoring to Linux Kernel
Shin, Yeonghun;Jo, Woo-yeon;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.77-91,
|
|
8 |
A Study on Characteristic Analysis and Countermeasure of Malicious Web Site
Kim, Hong-seok;Kim, In-seok;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.93-103,
|
|
9 |
Design and Implementation of API Extraction Method for Android Malicious Code Analysis Using Xposed
Kang, Seongeun;Yoon, Hongsun;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.105-115,
|
|
10 |
Security Vulnerability Verification for Open Deep Learning Libraries
Jeong, JaeHan;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.117-125,
|
|
11 |
A Study of User Perception on Features Used in Behavior-Based Authentication
Lee, Youngjoo;Ku, Yeeun;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.127-137,
|
|
12 |
A Study on Classification and Recovery Method of Damaged Electronic Records
Kim, Jihun;Choi, Wonhyok;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.139-147,
|
|
13 |
Study on Intelligence (AI) Detection Model about Telecommunication Finance Fraud Accident
Jeong, Eui-seok;Lim, Jong-in;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.149-164,
|
|
14 |
A Security Vulnerability Analysis for Printer Kiosks
Ji, Woojoong;Kim, Hyoungshick;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.165-174,
|
|
15 |
A Study on Effective Security Control Model Based on Characteristic of Web Service
Lee, Jae-heon;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.175-185,
|
|
16 |
Secure Distributed Cryptocurrency Transaction Model Through Personal Cold Wallet
Lee, Chang Keun;Kim, In-Seok;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.187-194,
|
|
17 |
Mobile Application Privacy Leak Detection and Security Enhancement Research
Kim, Sungjin;Hur, Junbeom;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.195-203,
|
|
18 |
A Practical Design and Implementation of Android App Cache Manipulation Attacks
Hong, Seok;Kim, Dong-uk;Kim, Hyoungshick;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.205-214,
|
|
19 |
A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks
Kim, Mookjung;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.215-223,
|
|
20 |
Machine Learning Based Prediction of Bitcoin Mining Difficulty
Lee, Joon-won;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.225-234,
|
|
21 |
Analysis of Security Requirements for Session-Oriented Cross Play Using X-box
Kim, Dong-woo;Kang, Soo-young;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.29, no.1, pp.235-255,
|
|