Digital Library
Search: "[ keyword: Threat ]" (13)
-
Kyu-min Cho, Jae-il Lee, Dong-kyoo Shin, Vol. 25, No. 1, pp. 167-176, Feb. 2024
10.7472/jksii.2024.25.1.167
Keywords: Chatbot, AI Security, Artificial intelligence, Security Requirements, implementation model, security threat analysis, security evaluation criteria -
2. Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic DataDae-kyeong Park, Woo-jin Lee, Byeong-jin Kim, Jae-yeon Lee, Vol. 25, No. 1, pp. 147-155, Feb. 2024
10.7472/jksii.2024.25.1.147
Keywords: Unmanned Aerial Vehicle, Radio Frequency, Signal Characteristic, Threat Detection, Unsupervised learning, Drone -
Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
10.7472/jksii.2022.23.6.27
Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement -
Kibeom Kim, Youngho Cho, Vol. 23, No. 5, pp. 103-110, Oct. 2022
10.7472/jksii.2022.23.5.103
Keywords: Bitcoin Network, Botnet C&C Communication, Encryption, Cyber Threat -
Hyukjin Kwon, Donggyu Shin, Youngjoo Shin, Vol. 23, No. 1, pp. 105-112, Feb. 2022
10.7472/jksii.2022.23.1.105
Keywords: online business system, non-traditional threats, information system availability, business continuity plan(BCP) -
Up Chung, Jongsub Moon, Vol. 23, No. 1, pp. 49-68, Feb. 2022
10.7472/jksii.2022.23.1.49
Keywords: Shipping company, Threat modeling, STRIDE, Security requirement -
Gun-Yoon Shin, Dong-Wook Kim, Jiyoung Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 27-35, Jun. 2021
10.7472/jksii.2021.22.3.27
Keywords: Unknown Threat, Hybrid Intrusion Detection, Classification based on Association Rule, One-class SVM -
Jung-Sik Lee, Sung-Young Cho, Heang-Rok Oh, Myung-Mook Han, Vol. 22, No. 1, pp. 41-50, Feb. 2021
10.7472/jksii.2021.22.1.41
Keywords: Cyber Command Control System, Cyber Kill Chain Model, Defense Model, attack model, threat classification/analysis/prediction framework -
Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
10.7472/jksii.2019.20.2.9
Keywords: Malware, Detection rule, SNORT, LDA, network threat -
Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
10.7472/jksii.2018.19.1.1
Keywords: LDA, network threat detection, Intrusion Detection System, signature