|
1 |
Implementation of Fixslicing AES-CTR Speed Optimized Using Pre-Computed on 32-Bit RISC-V
Eum, Si-Woo;Kim, Hyun-Jun;Sim, Min-Joo;Song, Gyeong-Ju;Seo, Hwa-Jeong;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.1-9,
|
|
2 |
A Study on Message Acquisition from Electron Apps: Focused on Collaboration Tools such as Jandi, Slack, and Microsoft Teams
Kim, Sung-soo;Lee, Sung-jin;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.11-23,
|
|
3 |
Why Should I Ban You! : X-FDS (Explainable FDS) Model Based on Online Game Payment Log
Lee, Young Hun;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.25-38,
|
|
4 |
Sequence Based Anomaly Detection System for Unmanned Aerial Vehicle
Seo, Kang Uk;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.39-48,
|
|
5 |
Decentralized Identity Based Digital Certificate System for Prevention of Infectious Diseases
Park, Sung-chae;Lee, Ju hyun;Park, Keundug;Youm, Heung Youl;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.49-66,
|
|
6 |
Static Identification of Firmware Linux Kernel Version by using Symbol Table
Kim, Kwang-jun;Cho, Yeo-jeong;Kim, Yun-jeong;Lee, Man-hee;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.67-75,
|
|
7 |
Classification of DJI Drones Based on Flight Log Decryption Method
Lee, Youngwoo;Kim, Juhwan;Yu, Jihyeon;Yun, Joobeom;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.77-88,
|
|
8 |
Generating Audio Adversarial Examples Using a Query-Efficient Decision-Based Attack
Seo, Seong-gwan;Mun, Hyunjun;Son, Baehoon;Yun, Joobeom;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.89-98,
|
|
9 |
Deep Learning-Based Automation Cyber Attack Convergence Trend Analysis Mechanism for Deep Learning-Based Security Vulnerability Analysis
Kim, Jinsu;Park, Namje;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.99-107,
|
|
10 |
A Study on the Efficiency of Auditing for Security Vulnerabilities in the Public Sector
Kim, Hyun-seok;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.109-122,
|
|
11 |
A Study on a Smart City Supply Chain Security Model Based on Zero-Trust
Lee, Hyun-jin;Son, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.123-140,
|
|
12 |
Reinforcing Financial Data Exchange Security Policy with Information Security Issues of Data Broker
Kim, Su-bong;Kwon, Hun-yeong;
/
Korea Institute of Information Security and Cryptology
, v.32, no.1, pp.141-154,
|
|