Browse > Article List

논문
1 Implementation of Fixslicing AES-CTR Speed Optimized Using Pre-Computed on 32-Bit RISC-V
Eum, Si-Woo;Kim, Hyun-Jun;Sim, Min-Joo;Song, Gyeong-Ju;Seo, Hwa-Jeong; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.1-9,
2 A Study on Message Acquisition from Electron Apps: Focused on Collaboration Tools such as Jandi, Slack, and Microsoft Teams
Kim, Sung-soo;Lee, Sung-jin; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.11-23,
3 Why Should I Ban You! : X-FDS (Explainable FDS) Model Based on Online Game Payment Log
Lee, Young Hun;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.25-38,
4 Sequence Based Anomaly Detection System for Unmanned Aerial Vehicle
Seo, Kang Uk;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.39-48,
5 Decentralized Identity Based Digital Certificate System for Prevention of Infectious Diseases
Park, Sung-chae;Lee, Ju hyun;Park, Keundug;Youm, Heung Youl; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.49-66,
6 Static Identification of Firmware Linux Kernel Version by using Symbol Table
Kim, Kwang-jun;Cho, Yeo-jeong;Kim, Yun-jeong;Lee, Man-hee; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.67-75,
7 Classification of DJI Drones Based on Flight Log Decryption Method
Lee, Youngwoo;Kim, Juhwan;Yu, Jihyeon;Yun, Joobeom; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.77-88,
8 Generating Audio Adversarial Examples Using a Query-Efficient Decision-Based Attack
Seo, Seong-gwan;Mun, Hyunjun;Son, Baehoon;Yun, Joobeom; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.89-98,
9 Deep Learning-Based Automation Cyber Attack Convergence Trend Analysis Mechanism for Deep Learning-Based Security Vulnerability Analysis
Kim, Jinsu;Park, Namje; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.99-107,
10 A Study on the Efficiency of Auditing for Security Vulnerabilities in the Public Sector
Kim, Hyun-seok; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.109-122,
11 A Study on a Smart City Supply Chain Security Model Based on Zero-Trust
Lee, Hyun-jin;Son, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.123-140,
12 Reinforcing Financial Data Exchange Security Policy with Information Security Issues of Data Broker
Kim, Su-bong;Kwon, Hun-yeong; / Korea Institute of Information Security and Cryptology , v.32, no.1, pp.141-154,