Digital Library
Search: "[ keyword: 사이버 공격 ]" (5)
-
Se-ho Choi, Hang-sup Lim, Jung-young Choi, Oh-jin Kwon, Dong-kyoo Shin, Vol. 24, No. 6, pp. 137-144, Dec. 2023
10.7472/jksii.2023.24.6.137
Keywords: Cyberattack technology, Cyber Assets, Minimize Downtime, Intelligent Self-Recovery Technology -
Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
10.7472/jksii.2022.23.6.1
Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK -
Jae-il Lee, Yong-joon Lee, Hyuk-jin Kwon, Vol. 21, No. 2, pp. 91-97, Apr. 2020
10.7472/jksii.2020.21.2.91
Keywords: Phishing mail, hacking, Cyber Attack Group, Profiling -
Won-gu Jang, Kyun-ho Lee, Vol. 21, No. 1, pp. 221-230, Feb. 2020
10.7472/jksii.2020.21.1.221
Keywords: Effects-based Operation, Cyberspace, Cyber Attack, Five Strategic Rings Model, Parallel Warfare -
Hyun-Lock Choo, Jong-Hun Jung, Hwan-Kuk Kim, Vol. 16, No. 4, pp. 51-60, Aug. 2015
10.7472/jksii.2015.16.4.51
Keywords: Malicious JavaScript, Analysis Engine, Static Analysis, Dynamic Analysis, Script-Based Cyber Attack
Category Search
Publications
-
Vol. 25, 2024
-
Vol. 24, 2023
-
Vol. 23, 2022
-
Vol. 22, 2021
-
Vol. 21, 2020
-
Vol. 20, 2019
-
Vol. 19, 2018
-
Vol. 18, 2017
-
Vol. 17, 2016
-
Vol. 16, 2015
-
Vol. 15, 2014
-
Vol. 14, 2013
-
Vol. 13, 2012
-
Vol. 12, 2011
-
Vol. 11, 2010
-
Vol. 10, 2009
-
Vol. 9, 2008
-
Vol. 8, 2007
-
Vol. 7, 2006
-
Vol. 6, 2005
-
Vol. 5, 2004
-
Vol. 4, 2003
-
Vol. 3, 2002
-
Vol. 2, 2001
-
Vol. 1, 2000