Digital Library
Search: "[ keyword: IR ]" (184)
-
Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
10.7472/jksii.2022.23.6.27
Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement -
142. Adaptive Control Scheme of Air Tanker Ground Waiting Time Based on a Multi-Server Queuing ModelYong-Sik Sohn, Jong-Moon Chung, Vol. 23, No. 5, pp. 33-46, Oct. 2022
10.7472/jksii.2022.23.5.33
Keywords: Air Tanker, Queuing, M/G/c, M/M/c, Logistic Support -
143. Modified Deep Reinforcement Learning Agent for Dynamic Resource Placement in IoT Network SlicingSeyha Ros, Prohim Tam, Seokhoon Kim, Vol. 23, No. 5, pp. 17-23, Oct. 2022
10.7472/jksii.2022.23.5.17
Keywords: Deep Reinforcement Learning, Network Slicing, Software-Defined Networking, Network Functions Virtualization, Edge Computing -
Jung-jae Lee, Vol. 23, No. 5, pp. 1-7, Oct. 2022
10.7472/jksii.2022.23.5.1
Keywords: Wireless Body Area Network(WBAN), Resource Sensor Node(RSN), Link Energy Efficient Routing Straregy(LEERS), Path Cost Function, multi-hop routing -
Seung-hoo Hong, KangYoon Lee, Vol. 23, No. 3, pp. 97-110, Jun. 2022
10.7472/jksii.2022.23.3.97
Keywords: federated-learning, Framework, Open Source, effective development environment, MLOps -
Cheong-Hyeon Choi, Vol. 23, No. 3, pp. 21-33, Jun. 2022
10.7472/jksii.2022.23.3.21
Keywords: Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication -
Kwangyull Lee, Taeho Yong, Seungbeom Ahn, Kyeongsoo An, Indong Jang, Chulhee Han, Vol. 23, No. 1, pp. 113-124, Feb. 2022
10.7472/jksii.2022.23.1.113
Keywords: Next Generation aircraft, Jamming, anti-jamming, Radio Communication, Frequency Hopping, Aircraft modification -
148. Bidirectional LSTM based light-weighted malware detection modelusing Windows PE format binary dataKwang-Yun PARK, Soo-Jin LEE, Vol. 23, No. 1, pp. 87-93, Feb. 2022
10.7472/jksii.2022.23.1.87
Keywords: Bidirectional LSTM, Windows PE malware, Detection, EMBER2018 -
Up Chung, Jongsub Moon, Vol. 23, No. 1, pp. 49-68, Feb. 2022
10.7472/jksii.2022.23.1.49
Keywords: Shipping company, Threat modeling, STRIDE, Security requirement -
Prohim Tam, Sa Math, Seokhoon Kim, Vol. 22, No. 6, pp. 1-8, Dec. 2021
10.7472/jksii.2021.22.6.1
Keywords: Deep Learning, Deep Packet Inspection, Network Functions Virtualization, Software-Defined Networking, Traffic Steering