Digital Library
Search: "[ keyword: TAC ]" (47)
-
Jung-Sik Lee, Sung-Young Cho, Heang-Rok Oh, Myung-Mook Han, Vol. 22, No. 1, pp. 41-50, Feb. 2021
10.7472/jksii.2021.22.1.41
Keywords: Cyber Command Control System, Cyber Kill Chain Model, Defense Model, attack model, threat classification/analysis/prediction framework -
Jae-il Lee, Yong-joon Lee, Hyuk-jin Kwon, Vol. 21, No. 2, pp. 91-97, Apr. 2020
10.7472/jksii.2020.21.2.91
Keywords: Phishing mail, hacking, Cyber Attack Group, Profiling -
Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
10.7472/jksii.2020.21.2.1
Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering -
Won-gu Jang, Kyun-ho Lee, Vol. 21, No. 1, pp. 221-230, Feb. 2020
10.7472/jksii.2020.21.1.221
Keywords: Effects-based Operation, Cyberspace, Cyber Attack, Five Strategic Rings Model, Parallel Warfare -
Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
10.7472/jksii.2019.20.1.01
Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail -
Nam Pham Nguyen Xuan, Hojin Chun, Souhwan Jung, Vol. 20, No. 1, pp. 67-75, Feb. 2019
10.7472/jksii.2019.20.1.67
Keywords: Android Container, Openstack, Container Runtime, HW device, Cloud computing -
Jin-sub Kim, Jong-sub Moon, Vol. 19, No. 3, pp. 15-23, Jun. 2018
10.7472/jksii.2018.19.3.15
Keywords: code reuse attack, ROP(Return-Oriented Programming), RNN(Recurrent Neural Network)