Browse > Article List

논문
1 Implementation of Instruction-Level Disassembler Based on Power Consumption Traces Using CNN
Bae, Daehyeon;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.527-536,
2 Compiler Analysis Framework Using SVM-Based Genetic Algorithm : Feature and Model Selection Sensitivity
Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.537-544,
3 A Study of Secure Password Input Method Based on Eye Tracking with Resistance to Shoulder-Surfing Attacks
Kim, Seul-gi;Yoo, Sang-bong;Jang, Yun;Kwon, Tae-kyoung; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.545-558,
4 A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache
Lim, Yirang;Chung, Hyunji;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.559-572,
5 Semantics-Preserving Mutation-Based Fuzzing on JavaScript Interpreters
Oh, DongHyeon;Choi, JaeSeung;Cha, SangKil; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.573-582,
6 Study on SNS Application Data Decryption and Artifact
Shin, Sumin;Kang, Soojin;Kim, Giyoon;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.583-592,
7 Stacked Autoencoder Based Malware Feature Refinement Technology Research
Kim, Hong-bi;Lee, Tae-jin; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.593-603,
8 VMProtect Operation Principle Analysis and Automatic Deobfuscation Implementation
Bang, Cheol-ho;Suk, Jae Hyuk;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.605-616,
9 Network Anomaly Detection Technologies Using Unsupervised Learning AutoEncoders
Kang, Koohong; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.617-629,
10 A Study on User Authentication Model Using Device Fingerprint Based on Web Standard
Park, Sohee;Jang, Jinhyeok;Choi, Daeseon; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.631-646,
11 A Study on the Abnormal Behavior Detection Model through Data Transfer Data Analysis
Son, In Jae;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.647-656,
12 Machine Learning Based Automated Source, Sink Categorization for Hybrid Approach of Privacy Leak Detection
Shim, Hyunseok;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.657-667,
13 Web Attack Classification Model Based on Payload Embedding Pre-Training
Kim, Yeonsu;Ko, Younghun;Euom, Ieckchae;Kim, Kyungbaek; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.669-677,
14 A Proposal of Privacy Protection Method for Location Information to Utilize 5G-Based High-Precision Positioning Big Data
Lee, Donghyeok;Park, Namje; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.679-691,
15 FDANT-PCSV: Fast Detection of Abnormal Network Traffic Using Parallel Coordinates and Sankey Visualization
Han, Ki hun;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.693-704,
16 A Study on Strengthening Personal Information Protection in Smart City
Cheong, Hwan-suk;Lee, Sang-joon; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.705-717,
17 A New Scheme for Risk Assessment Based on Data Context for De-Identification of Personal Information
Kim, Dong-hyun;Kim, Soon-seok; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.719-734,
18 Application of Machine Learning Techniques for the Classification of Source Code Vulnerability
Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.735-743,
19 A Study on the Possibility for Incident Investigation Using PLC Logs
Chang, Yeop;Kim, Taeyeon;Kim, Woo-Nyon; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.745-756,
20 A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices
Lee, Jiseop;Park, Kyungmi;Kim, Sinkyu; / Korea Institute of Information Security and Cryptology , v.30, no.4, pp.757-770,