1 |
Y. Lee, "Design and Analysis of Multiple Intrusion Detection Model," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 619-626.
DOI
|
2 |
Y. Chun, "Hacking Detection Mechanism of Cyber Attacks Modeling," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 9, 2013, pp. 1313-1318.
DOI
|
3 |
S. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, 2014, pp. 261-266.
DOI
|
4 |
W. Li, R. Wu, and H. Huang, "Colored Petri Nets Based Modeling of Information Flow Security," 2009 Second International Workshop on Knowledge Discovery and Data Mining, Moscow, Russia, 23-25 Jan. 2009.
|
5 |
B. Jasiul, M. Szpyrka, and J. Sliwa, "Malware Behavior Modeling with Colored Petri Nets," Computer Information Systems and Industrial Management Volume 8838 of the Series Lecture Notes in Computer Science, 5-7 Nov. 2014, pp 667-679.
|
6 |
B. Jasiul, M. Szpyrka, and J. Sliwa, "Formal Specification of Malware Models in the Form of Colored Petri Nets," Computer Science and its Applications Volume 330 of the series Lecture Notes in Electrical Engineering, 2015, pp 475-482.
|
7 |
K. Jensen and L. Kristensen, "Colored Petri Nets - Modeling and Validation of Concurrent Systems. Berlin: Springer-Verlag, 2009.
|
8 |
Y. Lee and P. Moon, "A Comparison and Analysis of Deep Learning Framework," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 1, 2017, pp. 115-122.
DOI
|