Digital Library
Search: "[ keyword: TAC ]" (44)
-
Yonghyun Kim, Donghwa Kim, Donghwan Lee, Juyoub Kim, Miyoung Kwon, Myung Kil Ahn, Vol. 25, No. 5, pp. 1-11, Oct. 2024
10.7472/jksii.2024.25.5.1
Keywords: Cyber Attack, cyber M&S, Mission Damage Assessment, Mission Impact Analysis, CyMIA -
Jiyeon Baek, Jiwon Jang, Seongmin Kim, Vol. 25, No. 3, pp. 1-8, Jun. 2024
10.7472/jksii.2024.25.3.1
Keywords: Memory Forensics, Over-The-Air (OTA), ESP32, Attack Scenario -
Si-yeon Jang, Hye-lim Choi, Yun-ju Oh, Vol. 25, No. 2, pp. 21-28, Apr. 2024
10.7472/jksii.2024.25.2.21
Keywords: Automonous driving, Performance prediction, Radar, Stacking Ensemble -
Suchul Lee, Vol. 25, No. 2, pp. 1-9, Apr. 2024
10.7472/jksii.2024.25.2.1
Keywords: Federated learning, adversarial attacks, adversarial training, trade-off relationship -
Seung-Beom Kang, Seung-Gyu Kim, Sae-Yong Park, Tae-ho Im, Vol. 25, No. 1, pp. 17-27, Feb. 2024
10.7472/jksii.2024.25.1.17
Keywords: TAC, Fish Species Identification, Body Length Measurement -
Se-ho Choi, Hang-sup Lim, Jung-young Choi, Oh-jin Kwon, Dong-kyoo Shin, Vol. 24, No. 6, pp. 137-144, Dec. 2023
10.7472/jksii.2023.24.6.137
Keywords: Cyberattack technology, Cyber Assets, Minimize Downtime, Intelligent Self-Recovery Technology -
Si-on Jeong, Tae-hyun Han, Seung-bum Lim, Tae-jin Lee, Vol. 24, No. 4, pp. 25-36, Aug. 2023
10.7472/jksii.2023.24.4.25
Keywords: Artificial intelligence, robustness, Adversarial attack -
Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
10.7472/jksii.2022.23.6.1
Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK -
Min-Gyu Kim, Myung-Mook Han, Vol. 23, No. 5, pp. 79-85, Oct. 2022
10.7472/jksii.2022.23.5.79
Keywords: Extreme Random Forest, Artificial neural network, Anomaly Detection, Anomaly Detection and Attack type Classification, Network intrusion detection -
10. A study on machine learning-based defense system proposal through web shell collection and analysisKi-hwan Kim, Yong-tae Shin, Vol. 23, No. 4, pp. 87-94, Aug. 2022
10.7472/jksii.2022.23.4.87
Keywords: Web Service, WebShell attack, Machine Learning, WebShell collection and analysis, Defense System