|
1 |
Security Analysis on TiGER KEM in KpqC Round 1 Competition Using Meet-LWE Attack
Joohee Lee;Eun-min Lee;Jiseung Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.709-719,
|
|
2 |
A Study on Tracking Method for Command and Control Framework Tools
Hyeok-Ju Gwon;Jin Kwak;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.721-736,
|
|
3 |
Multi-Behavior Analysis Based on Google Archiving Data
Yeeun Kim;Sara Hong;Seongmin Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.737-751,
|
|
4 |
Decryption of KakaoTalk Database for macOS
Beomjun Park;Sangjin Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.753-760,
|
|
5 |
Masking Exponential-Based Neural Network via Approximated Activation Function
Joonsup Kim;GyuSang Kim;Dongjun Park;Sujin Park;HeeSeok Kim;Seokhie Hong;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.761-773,
|
|
6 |
A Method of Instruction Length Determination Based on Execution Information in Undocumented Instruction Fuzzer
Yoo-seok Lee; Won-jun Song;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.775-785,
|
|
7 |
Detection of Delay Attack in IoT Automation System
Youngduk Kim;Wonsuk Choi;Dong hoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.787-799,
|
|
8 |
A Study on Improving the Act on Information and Communication Network for Enhancing the Effectiveness of Cyber Incident Reporting
Tae-seung Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.801-811,
|
|
9 |
Effects of Cyberloafing on Cybersecurity Risks of Organizations: The Case of a Financial Institute
Hyunwoo Oh;Beomsoo Kim;Jaeyoung Park;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.813-826,
|
|
10 |
A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development
Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.827-846,
|
|
11 |
A Study on Establishment of Evaluation Criteria for Anti-Virus Performance Test
Jeongho Lee;Kangsik Shin;Youngrak Ryu;Dong-Jae Jung;Ho-Mook Cho;
/
Korea Institute of Information Security and Cryptology
, v.33, no.5, pp.847-859,
|
|