Browse > Article List

논문
1 Implementing M-SIDH: Performance and Efficiency Evaluation
Suhri Kim;Minhye Seo; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.591-599,
2 Analysis of Research Trends in Homomorphic Encryption Using Bibliometric Analysis
Akihiko Yamada;Eunsang Lee; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.601-608,
3 Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model
YeoHoon Yoon;Joobeom Yun; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.609-619,
4 Improving Adversarial Robustness via Attention
Jaeuk Kim;Myung Gyo Oh;Leo Hyun Park;Taekyoung Kwon; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.621-631,
5 A Study On Optimized Drone Forensic Methodology Applied with Open Source Based Drone Live Forensic Tool
Seyoung Baik;Sangwook Lee; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.633-646,
6 Development of Competency Model for Police' Digital Forensic Examiner
Oh SoJung;Jeong JunSeon;Cho EunByul;Kim GiBum; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.647-659,
7 Proxy-Based Scalable Server Access Management Framework Using Reverse Webshell Protocol
Daeun Kim;Sangwook Bae;Seongmin Kim;Eunyoung Jeong; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.661-670,
8 A Forensic Methodology for Detecting Image Manipulations
Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.671-685,
9 An Experimental Study on AutoEncoder to Detect Botnet Traffic Using NetFlow-Timewindow Scheme: Revisited
Koohong Kang; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.687-697,
10 A Study on the Development of DevSecOps through the Combination of Open Source Vulnerability Scanning Tools and the Design of Security Metrics
Yeonghae Choi;Hyeongjun Noh;Seongyun Cho;Hanseong Kang;Dongwan Kim;Suhyun Park;Minjae Cho;Juhyung Lee; / Korea Institute of Information Security and Cryptology , v.33, no.4, pp.699-707,