Browse > Article List

논문
1 Detecting Daily-Driven Game-Bot Based on Online Game Play Log Clustering
Kim, Joo Hwan;Choi, Jin-Young; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1097-1104,
2 Behavior and Script Similarity-Based Cryptojacking Detection Framework Using Machine Learning
Lim, EunJi;Lee, EunYoung;Lee, IlGu; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1105-1114,
3 Implementation and Utilization of Decentralized Identity-Based Mobile Student ID
Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1115-1126,
4 Non-Profiling Power Analysis Attacks Using Continuous Wavelet Transform Method
Bae, Daehyeon;Lee, Jaewook;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1127-1136,
5 On the Use of Radical Isogenies for CSIDH Implementation
Kim, Suhri; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1137-1148,
6 Quantum Cryptanalysis for DES Through Attack Cost Estimation of Grover's Algorithm
Jang, Kyung-bae;Kim, Hyun-Ji;Song, Gyeong-Ju;Sim, Min-Ju;Woo, Eum-Si;Seo, Hwa-Jeong; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1149-1156,
7 User-Centric Disaster Recovery System Based on Proxy Re-Encryption Using Blockchain and Distributed Storage
Park, Junhoo;Kim, Geunyoung;Kim, Junseok;Ryou, Jaecheol; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1157-1169,
8 Forgery Detection Scheme Using Enhanced Markov Model and LBP Texture Operator in Low Quality Images
Agarwal, Saurabh;Jung, Ki-Hyun; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1171-1179,
9 A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment
Lee, Heewoong;Hong, Dowon;Nam, Kihyo; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1181-1191,
10 A Study on Evaluation Methods for Interpreting AI Results in Malware Analysis
Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1193-1204,
11 A Study on Integrity Protection of Edge Computing Application Based on Container Technology
Lee, Changhoon;Shin, Youngjoo; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1205-1214,
12 An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm
Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1215-1225,
13 Adversarial Example Detection and Classification Model Based on the Class Predicted by Deep Learning Model
Ko, Eun-na-rae;Moon, Jong-sub; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1227-1236,
14 ATM Cell Security Techniques Using OFB Mode on AES Block Cipher
Im, Sung-Yeal; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1237-1246,
15 A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting
Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1247-1260,
16 A study for Cybersecurity Risk Management by Blockade and Defense Level Analysis
Han, Choong-Hee;Han, ChangHee; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1261-1266,
17 An Effective Counterattack System for the Voice Spam
Park, Haeryong;Park, Sujeong;Park, Kangil;Jung, Chanwoo;KIM, Jongpyo;Choi, KeunMo;Mo, Yonghun; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1267-1277,
18 GAN Based Adversarial CAN Frame Generation Method for Physical Attack Evading Intrusion Detection System
Kim, Dowan;Choi, Daeseon; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1279-1290,
19 A Study on the Cyber Attack Severity Assessment Methodology
Bae, Sunha;You, Young-in;KIM, SoJeong; / Korea Institute of Information Security and Cryptology , v.31, no.6, pp.1291-1307,