Browse > Article List

논문
1 Proposal of Detection Module for Fighter Aircraft Data Modulation Attack
Hong, Byoung-jin;Kim, Wan-ju;Kim, Ho-keun;Lim, Jae-sung; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.5-16,
2 Secure 6LoWPAN Neighbor Discovery Address Registration Protocol
Han, Sang-woo;Park, Chang-seop; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.17-28,
3 An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN
Oh, Jeong Min;Jeong, Ik Rae;Byun, Jin Wook; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.29-43,
4 Android Application Call Relationship Analysis Based on DEX and ELF Binary Reverse Engineering
Ahn, Jinung;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.45-55,
5 Design of Context-Aware-Based Drone Control Mechanism by Using Two-Factor
Oh, Yoon-Seok;Kim, Aeyoung;Seo, Seung-Hyun; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.57-66,
6 Smart Contract Code Rewritter for Improving Safety of Function Calls
Lee, Sooyeon;Jung, Hyungkun;Cho, Eun-Sun; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.67-75,
7 Study on File Recovery Based on Metadata Accoring to Linux Kernel
Shin, Yeonghun;Jo, Woo-yeon;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.77-91,
8 A Study on Characteristic Analysis and Countermeasure of Malicious Web Site
Kim, Hong-seok;Kim, In-seok; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.93-103,
9 Design and Implementation of API Extraction Method for Android Malicious Code Analysis Using Xposed
Kang, Seongeun;Yoon, Hongsun;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.105-115,
10 Security Vulnerability Verification for Open Deep Learning Libraries
Jeong, JaeHan;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.117-125,
11 A Study of User Perception on Features Used in Behavior-Based Authentication
Lee, Youngjoo;Ku, Yeeun;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.127-137,
12 A Study on Classification and Recovery Method of Damaged Electronic Records
Kim, Jihun;Choi, Wonhyok; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.139-147,
13 Study on Intelligence (AI) Detection Model about Telecommunication Finance Fraud Accident
Jeong, Eui-seok;Lim, Jong-in; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.149-164,
14 A Security Vulnerability Analysis for Printer Kiosks
Ji, Woojoong;Kim, Hyoungshick; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.165-174,
15 A Study on Effective Security Control Model Based on Characteristic of Web Service
Lee, Jae-heon;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.175-185,
16 Secure Distributed Cryptocurrency Transaction Model Through Personal Cold Wallet
Lee, Chang Keun;Kim, In-Seok; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.187-194,
17 Mobile Application Privacy Leak Detection and Security Enhancement Research
Kim, Sungjin;Hur, Junbeom; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.195-203,
18 A Practical Design and Implementation of Android App Cache Manipulation Attacks
Hong, Seok;Kim, Dong-uk;Kim, Hyoungshick; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.205-214,
19 A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks
Kim, Mookjung;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.215-223,
20 Machine Learning Based Prediction of Bitcoin Mining Difficulty
Lee, Joon-won;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.225-234,
21 Analysis of Security Requirements for Session-Oriented Cross Play Using X-box
Kim, Dong-woo;Kang, Soo-young;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.29, no.1, pp.235-255,