|
1 |
A Survey on Unsupervised Anomaly Detection for Multivariate Time Series
Juwan Lim;Jaekoo Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.1-12,
|
|
2 |
Analysis of the Cryptosystem of the Korean Government Public-Key Infrastructure and Ways to Improve It
Younghoon Jung;Dongyoung Roh;Bonwook Koo;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.13-31,
|
|
3 |
A Study on Performance Improvement of Non-Profiling Based Power Analysis Attack against CRYSTALS-Dilithium
Sechang Jang;Minjong Lee;Hyoju Kang;Jaecheol Ha;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.33-43,
|
|
4 |
A Steganography-Based Covert Communication Method in Roblox Metaverse Environment
Dokyung Yun;Youngho Cho;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.45-50,
|
|
5 |
Study on The Data Decryption and Artifacts Analysis of KakaoTalk in Windows Environment
Minuook Jo;Nam Su Chang;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.51-61,
|
|
6 |
Invasion of Pivacy of Federated Learning by Data Reconstruction Attack with Technique for Converting Pixel Value
Yoon-ju Oh;Dae-seon Choi;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.63-74,
|
|
7 |
Enhancing Security of Transaction Session in Financial Open API Environment Using Hybrid Session Protection Protocol Combined with NTRU
Sujin Kwon;Deoksang Kim;Yeongjae Park;Jieun Ryu;Ju-Sung Kang;Yongjin Yeom;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.75-86,
|
|
8 |
Analysis of the Impact of Host Resource Exhaustion Attacks in a Container Environment
Jun-hee Lee;Jae-hyun Nam;Jin-woo Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.87-97,
|
|
9 |
Improvement Plan to Expand the Role of Expert Data Combination Agency
GiBum Kim;Hun-Yeong Kwon;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.99-116,
|
|
10 |
A Study on Preferences and Utilities of Digital Signature Certificate Choice Factors Using Conjoint Analysis
Whanchul Kang;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.117-128,
|
|
11 |
A Study on Implementing an Automated Tool for De-Obfuscating a ConfuserEx
Jae-hwi Lee;Young-seok Park;Dong-hyeon Kim;Gyu Heo;
/
Korea Institute of Information Security and Cryptology
, v.33, no.1, pp.129-137,
|
|