Digital Library
Search: "[ keyword: TAC ]" (43)
-
11. Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger FabricYong-bae Kim, Juyong Back, Jongweon Kim, Vol. 23, No. 3, pp. 47-56, Jun. 2022
10.7472/jksii.2022.23.3.47
Keywords: Blockchain, DTG(Digital Tacho-Graph), Hyperledger Fabric, lightweight blockchain, Random Seed, SDRS(Safe Driving Reward System), SDCN(Safe Driving Channel Network), SDRCN(Safe Driving Reward Channel Network) -
12. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection AnalysisDong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
10.7472/jksii.2021.22.3.45
Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM -
Jung-Sik Lee, Sung-Young Cho, Heang-Rok Oh, Myung-Mook Han, Vol. 22, No. 1, pp. 41-50, Feb. 2021
10.7472/jksii.2021.22.1.41
Keywords: Cyber Command Control System, Cyber Kill Chain Model, Defense Model, attack model, threat classification/analysis/prediction framework -
Jae-il Lee, Yong-joon Lee, Hyuk-jin Kwon, Vol. 21, No. 2, pp. 91-97, Apr. 2020
10.7472/jksii.2020.21.2.91
Keywords: Phishing mail, hacking, Cyber Attack Group, Profiling -
Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
10.7472/jksii.2020.21.2.1
Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering -
Won-gu Jang, Kyun-ho Lee, Vol. 21, No. 1, pp. 221-230, Feb. 2020
10.7472/jksii.2020.21.1.221
Keywords: Effects-based Operation, Cyberspace, Cyber Attack, Five Strategic Rings Model, Parallel Warfare -
Nam Pham Nguyen Xuan, Hojin Chun, Souhwan Jung, Vol. 20, No. 1, pp. 67-75, Feb. 2019
10.7472/jksii.2019.20.1.67
Keywords: Android Container, Openstack, Container Runtime, HW device, Cloud computing -
Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
10.7472/jksii.2019.20.1.01
Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail -
Min-hyuck Jin, Kwang-hoon Pio Kim, Vol. 19, No. 6, pp. 83-89, Dec. 2018
10.7472/jksii.2018.19.6.83
Keywords: process-aware datacubes, workflow process mining, workflow process analytics, temporal workcase, temporal worktransference, XES format, workflow event log data center -
Jin-sub Kim, Jong-sub Moon, Vol. 19, No. 3, pp. 15-23, Jun. 2018
10.7472/jksii.2018.19.3.15
Keywords: code reuse attack, ROP(Return-Oriented Programming), RNN(Recurrent Neural Network)