|
1 |
Detecting Daily-Driven Game-Bot Based on Online Game Play Log Clustering
Kim, Joo Hwan;Choi, Jin-Young;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1097-1104,
|
|
2 |
Behavior and Script Similarity-Based Cryptojacking Detection Framework Using Machine Learning
Lim, EunJi;Lee, EunYoung;Lee, IlGu;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1105-1114,
|
|
3 |
Implementation and Utilization of Decentralized Identity-Based Mobile Student ID
Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1115-1126,
|
|
4 |
Non-Profiling Power Analysis Attacks Using Continuous Wavelet Transform Method
Bae, Daehyeon;Lee, Jaewook;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1127-1136,
|
|
5 |
On the Use of Radical Isogenies for CSIDH Implementation
Kim, Suhri;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1137-1148,
|
|
6 |
Quantum Cryptanalysis for DES Through Attack Cost Estimation of Grover's Algorithm
Jang, Kyung-bae;Kim, Hyun-Ji;Song, Gyeong-Ju;Sim, Min-Ju;Woo, Eum-Si;Seo, Hwa-Jeong;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1149-1156,
|
|
7 |
User-Centric Disaster Recovery System Based on Proxy Re-Encryption Using Blockchain and Distributed Storage
Park, Junhoo;Kim, Geunyoung;Kim, Junseok;Ryou, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1157-1169,
|
|
8 |
Forgery Detection Scheme Using Enhanced Markov Model and LBP Texture Operator in Low Quality Images
Agarwal, Saurabh;Jung, Ki-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1171-1179,
|
|
9 |
A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment
Lee, Heewoong;Hong, Dowon;Nam, Kihyo;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1181-1191,
|
|
10 |
A Study on Evaluation Methods for Interpreting AI Results in Malware Analysis
Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1193-1204,
|
|
11 |
A Study on Integrity Protection of Edge Computing Application Based on Container Technology
Lee, Changhoon;Shin, Youngjoo;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1205-1214,
|
|
12 |
An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm
Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1215-1225,
|
|
13 |
Adversarial Example Detection and Classification Model Based on the Class Predicted by Deep Learning Model
Ko, Eun-na-rae;Moon, Jong-sub;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1227-1236,
|
|
14 |
ATM Cell Security Techniques Using OFB Mode on AES Block Cipher
Im, Sung-Yeal;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1237-1246,
|
|
15 |
A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting
Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1247-1260,
|
|
16 |
A study for Cybersecurity Risk Management by Blockade and Defense Level Analysis
Han, Choong-Hee;Han, ChangHee;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1261-1266,
|
|
17 |
An Effective Counterattack System for the Voice Spam
Park, Haeryong;Park, Sujeong;Park, Kangil;Jung, Chanwoo;KIM, Jongpyo;Choi, KeunMo;Mo, Yonghun;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1267-1277,
|
|
18 |
GAN Based Adversarial CAN Frame Generation Method for Physical Attack Evading Intrusion Detection System
Kim, Dowan;Choi, Daeseon;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1279-1290,
|
|
19 |
A Study on the Cyber Attack Severity Assessment Methodology
Bae, Sunha;You, Young-in;KIM, SoJeong;
/
Korea Institute of Information Security and Cryptology
, v.31, no.6, pp.1291-1307,
|
|