|
1 |
SITM Attacks on GIFT-128: Application to NIST Lightweight Cryptography Finalist GIFT-COFB
Park, Jonghyun;Kim, Hangi;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.607-615,
|
|
2 |
A Quantum Free-Start Collision Attack on the Ascon-Hash
Cho, Sehee;Baek, Seungjun;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.617-628,
|
|
3 |
Malware Detection Technology Based on API Call Time Section Characteristics
Kim, Dong-Yeob;Choi, Sang-Yong;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.629-635,
|
|
4 |
Implementation of Opensource-Based Automatic Monitoring Service Deployment and Image Integrity Checkers for Cloud-Native Environment
Gwak, Songi;Nguyen-Vu, Long;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.637-645,
|
|
5 |
Abnormal Data Augmentation Method Using Perturbation Based on Hypersphere for Semi-Supervised Anomaly Detection
Jung, Byeonggil;Kwon, Junhyung;Min, Dongjun;Lee, Sangkyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.647-660,
|
|
6 |
A Study on IKE v2 Analysis Method for RealTime
Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.661-671,
|
|
7 |
An APT Attack Scoring Method Using MITRE ATT&CK
Cho, Sungyoung;Park, Yongwoo;Lee, Kunho;Choi, Changhee;Shin, Chanho;Lee, Kyeongsik;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.673-689,
|
|
8 |
Research on Data Tuning Methods to Improve the Anomaly Detection Performance of Industrial Control Systems
JUN, SANGSO;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.691-708,
|
|
9 |
A Study on the Development and Application of Efficient Evaluation Criteria for Performance Testing of Commercial Open Source Vulnerability Scanning Tools
Shin, Kangsik;Jung, Dong-Jae;Choe, Min-Ji;Cho, Ho-Mook;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.709-722,
|
|
10 |
Analysis of Steganography and Countermeasures for Criminal Laws in National Security Offenses
Oh, SoJung;Joo, JiYeon;Park, HyeonMin;Park, JungHwan;Shin, SangHyun;Jang, EungHyuk;Kim, GiBum;
/
Korea Institute of Information Security and Cryptology
, v.32, no.4, pp.723-736,
|
|