|
1 |
Implementation of Instruction-Level Disassembler Based on Power Consumption Traces Using CNN
Bae, Daehyeon;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.527-536,
|
|
2 |
Compiler Analysis Framework Using SVM-Based Genetic Algorithm : Feature and Model Selection Sensitivity
Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.537-544,
|
|
3 |
A Study of Secure Password Input Method Based on Eye Tracking with Resistance to Shoulder-Surfing Attacks
Kim, Seul-gi;Yoo, Sang-bong;Jang, Yun;Kwon, Tae-kyoung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.545-558,
|
|
4 |
A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache
Lim, Yirang;Chung, Hyunji;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.559-572,
|
|
5 |
Semantics-Preserving Mutation-Based Fuzzing on JavaScript Interpreters
Oh, DongHyeon;Choi, JaeSeung;Cha, SangKil;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.573-582,
|
|
6 |
Study on SNS Application Data Decryption and Artifact
Shin, Sumin;Kang, Soojin;Kim, Giyoon;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.583-592,
|
|
7 |
Stacked Autoencoder Based Malware Feature Refinement Technology Research
Kim, Hong-bi;Lee, Tae-jin;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.593-603,
|
|
8 |
VMProtect Operation Principle Analysis and Automatic Deobfuscation Implementation
Bang, Cheol-ho;Suk, Jae Hyuk;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.605-616,
|
|
9 |
Network Anomaly Detection Technologies Using Unsupervised Learning AutoEncoders
Kang, Koohong;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.617-629,
|
|
10 |
A Study on User Authentication Model Using Device Fingerprint Based on Web Standard
Park, Sohee;Jang, Jinhyeok;Choi, Daeseon;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.631-646,
|
|
11 |
A Study on the Abnormal Behavior Detection Model through Data Transfer Data Analysis
Son, In Jae;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.647-656,
|
|
12 |
Machine Learning Based Automated Source, Sink Categorization for Hybrid Approach of Privacy Leak Detection
Shim, Hyunseok;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.657-667,
|
|
13 |
Web Attack Classification Model Based on Payload Embedding Pre-Training
Kim, Yeonsu;Ko, Younghun;Euom, Ieckchae;Kim, Kyungbaek;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.669-677,
|
|
14 |
A Proposal of Privacy Protection Method for Location Information to Utilize 5G-Based High-Precision Positioning Big Data
Lee, Donghyeok;Park, Namje;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.679-691,
|
|
15 |
FDANT-PCSV: Fast Detection of Abnormal Network Traffic Using Parallel Coordinates and Sankey Visualization
Han, Ki hun;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.693-704,
|
|
16 |
A Study on Strengthening Personal Information Protection in Smart City
Cheong, Hwan-suk;Lee, Sang-joon;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.705-717,
|
|
17 |
A New Scheme for Risk Assessment Based on Data Context for De-Identification of Personal Information
Kim, Dong-hyun;Kim, Soon-seok;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.719-734,
|
|
18 |
Application of Machine Learning Techniques for the Classification of Source Code Vulnerability
Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.735-743,
|
|
19 |
A Study on the Possibility for Incident Investigation Using PLC Logs
Chang, Yeop;Kim, Taeyeon;Kim, Woo-Nyon;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.745-756,
|
|
20 |
A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices
Lee, Jiseop;Park, Kyungmi;Kim, Sinkyu;
/
Korea Institute of Information Security and Cryptology
, v.30, no.4, pp.757-770,
|
|