Digital Library
Search: "[ author: Gun-Yoon Shin ]" (8)
-
Jiyoung Yun, Dong-Wook Kim, Gun-Yoon Shin, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 4, pp. 1-11, Aug. 2021
10.7472/jksii.2021.22.4.1
Keywords: Lateral Movement, Pagerank Algorithm, Explainable AI, Remote Desktop Protocol, feature extraction -
2. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection AnalysisDong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
10.7472/jksii.2021.22.3.45
Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM -
Gun-Yoon Shin, Dong-Wook Kim, Jiyoung Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 27-35, Jun. 2021
10.7472/jksii.2021.22.3.27
Keywords: Unknown Threat, Hybrid Intrusion Detection, Classification based on Association Rule, One-class SVM -
4. An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern MiningJiyoung Yun, Gun-Yoon Shin, Dong-Wook Kim, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 2, pp. 77-87, Apr. 2021
10.7472/jksii.2021.22.2.77
Keywords: Explainable AI, Log anomaly detection, Bayesian Probability, Rule Extraction -
Cheol-hun Hwang, Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 6, pp. 13-21, Dec. 2020
10.7472/jksii.2020.21.6.13
Keywords: Android Authorship Attribution, Authorship Attribution, Remove duplicate features, Survival network -
Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
10.7472/jksii.2020.21.2.1
Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering -
Gun-Yoon Shin, Dong-Wook Kim, Sung-sam Hong, Myung-Mook Han, Vol. 19, No. 5, pp. 33-41, Oct. 2018
10.7472/jksii.2018.19.5.33
Keywords: Author Identification, Authorship Analysis, Convolutional Neural Network, Machine Learning, Code Analysis -
Sung-Sam Hong, Gun-Yoon Shin, Myung-Mook Han, Vol. 18, No. 6, pp. 35-46, Dec. 2017
10.7472/jksii.2017.18.6.35
Keywords: Text Mining, Machine Learning, Classification, Authorship Analysis, Attacker Identification