|
1 |
Implementing M-SIDH: Performance and Efficiency Evaluation
Suhri Kim;Minhye Seo;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.591-599,
|
|
2 |
Analysis of Research Trends in Homomorphic Encryption Using Bibliometric Analysis
Akihiko Yamada;Eunsang Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.601-608,
|
|
3 |
Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model
YeoHoon Yoon;Joobeom Yun;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.609-619,
|
|
4 |
Improving Adversarial Robustness via Attention
Jaeuk Kim;Myung Gyo Oh;Leo Hyun Park;Taekyoung Kwon;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.621-631,
|
|
5 |
A Study On Optimized Drone Forensic Methodology Applied with Open Source Based Drone Live Forensic Tool
Seyoung Baik;Sangwook Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.633-646,
|
|
6 |
Development of Competency Model for Police' Digital Forensic Examiner
Oh SoJung;Jeong JunSeon;Cho EunByul;Kim GiBum;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.647-659,
|
|
7 |
Proxy-Based Scalable Server Access Management Framework Using Reverse Webshell Protocol
Daeun Kim;Sangwook Bae;Seongmin Kim;Eunyoung Jeong;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.661-670,
|
|
8 |
A Forensic Methodology for Detecting Image Manipulations
Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.671-685,
|
|
9 |
An Experimental Study on AutoEncoder to Detect Botnet Traffic Using NetFlow-Timewindow Scheme: Revisited
Koohong Kang;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.687-697,
|
|
10 |
A Study on the Development of DevSecOps through the Combination of Open Source Vulnerability Scanning Tools and the Design of Security Metrics
Yeonghae Choi;Hyeongjun Noh;Seongyun Cho;Hanseong Kang;Dongwan Kim;Suhyun Park;Minjae Cho;Juhyung Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.4, pp.699-707,
|
|