Browse > Article List

논문
1 Security Analysis on TiGER KEM in KpqC Round 1 Competition Using Meet-LWE Attack
Joohee Lee;Eun-min Lee;Jiseung Kim; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.709-719,
2 A Study on Tracking Method for Command and Control Framework Tools
Hyeok-Ju Gwon;Jin Kwak; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.721-736,
3 Multi-Behavior Analysis Based on Google Archiving Data
Yeeun Kim;Sara Hong;Seongmin Kim; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.737-751,
4 Decryption of KakaoTalk Database for macOS
Beomjun Park;Sangjin Lee; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.753-760,
5 Masking Exponential-Based Neural Network via Approximated Activation Function
Joonsup Kim;GyuSang Kim;Dongjun Park;Sujin Park;HeeSeok Kim;Seokhie Hong; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.761-773,
6 A Method of Instruction Length Determination Based on Execution Information in Undocumented Instruction Fuzzer
Yoo-seok Lee; Won-jun Song; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.775-785,
7 Detection of Delay Attack in IoT Automation System
Youngduk Kim;Wonsuk Choi;Dong hoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.787-799,
8 A Study on Improving the Act on Information and Communication Network for Enhancing the Effectiveness of Cyber Incident Reporting
Tae-seung Lee; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.801-811,
9 Effects of Cyberloafing on Cybersecurity Risks of Organizations: The Case of a Financial Institute
Hyunwoo Oh;Beomsoo Kim;Jaeyoung Park; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.813-826,
10 A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development
Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.827-846,
11 A Study on Establishment of Evaluation Criteria for Anti-Virus Performance Test
Jeongho Lee;Kangsik Shin;Youngrak Ryu;Dong-Jae Jung;Ho-Mook Cho; / Korea Institute of Information Security and Cryptology , v.33, no.5, pp.847-859,