|
1 |
How to Generate Lightweight S-Boxes by Using AND Gate Accumulation
Jeon, Yongjin;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.465-475,
|
|
2 |
Preventing Mobile Game Client Memory Manipulation Based on Event Sourcing Patterns and Blockchain
Park, Jihun;Park, Young-Ho;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.477-486,
|
|
3 |
TPMP: A Privacy-Preserving Technique for DNN Prediction Using ARM TrustZone
Song, Suhyeon;Park, Seonghwan;Kwon, Donghyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.487-499,
|
|
4 |
Deobfuscation Processing and Deep Learning-Based Detection Method for PowerShell-Based Malware
Jung, Ho-jin;Ryu, Hyo-gon;Jo, Kyu-whan;Lee, Sangkyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.501-511,
|
|
5 |
Redactable Blockchain Based Authority Alteration and Accessn Control System
Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.513-525,
|
|
6 |
Implementation of an APT Attack Detection System through ATT&CK-Based Attack Chain Reconstruction
Cho, Sungyoung;Park, Yongwoo;Lee, Kyeongsik;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.527-545,
|
|
7 |
P2P Based Telemedicine System Using Thermographic Camera
Kim, Kyoung Min;Ryu, Jae Hyun;Hong, Sung Jun;Kim, Hongjun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.547-554,
|
|
8 |
Machine Learning-Based Malicious URL Detection Technique
Han, Chae-rim;Yun, Su-hyun;Han, Myeong-jin;Lee, Il-Gu;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.555-564,
|
|
9 |
An Analysis of Security Vulnerabilities Using 5G NAS COUNT
Kim, Min-Jae;Park, Jong-Geun;Shin, Ji-Soo;Moon, Dae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.565-573,
|
|
10 |
A Study on the Effects of IS Organization Justice and Positive Psychological Capital on Mitigation of Role Stress
Hwang, Inho;Lee, Yunsock;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.575-590,
|
|
11 |
A Study of Security Evaluation Criteria for Reconnaissance Drone
Gu, Do-hyung;Kim, Seung-joo;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.32, no.3, pp.591-605,
|
|