Subject

Subjects : Cyber attacks

  • Articles (42)
  • Patents (1)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Conference 2024 Event-Triggered Attitude Controller Design for Unmanned Aerial Vehicles under Cyber Attacks   한승용  International Symposium on Industrial Electronics (ISIE) 2024, pp.1-7 0 원문
Conference 2022 Vulnerability Risk Score Recalculation for the Devices in Critical Infrastructure   Choi Yangseo  International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2179-2181 2 원문
Journal 2019 Mobile Network Security Issues regarding 5G Security   Park Jong Geun  전자통신동향분석, v.34, no.1, pp.36-48 원문
Conference 2019 신뢰기반 네트워크 접속 제어 및 보호 시스템   Yoo Yoon Sik  International Conference on Platform Technology and Service (PlatCon) 2019, pp.71-75 1 원문
Journal 2017 네트워크 주소 이동 기술 동향   Kyungmin Park  전자통신동향분석, v.32, no.6, pp.73-82 원문
Conference 2017 A Retransmission Method for Improving Transmission Reliability in One-way Transmission   Boo-Sun Jeon  International Conference on Communication and Network Security (ICCNS) 2017, pp.1-5 0 원문
Journal 2017 DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks   Moon Dae Sung  Journal of Supercomputing, v.73, no.7, pp.2881-2895 119 원문
Conference 2017 Development of Unidirectional Security Gateway satisfying Security Functional Requirements   Seon-Gyoung Sohn  World Congress on Information Technology Applications and Services (World IT Congress) 2017, pp.1-6
Conference 2016 Visualization of Malware Detection Based on API Call Sequence Alignment   Kim Jonghyun  International Conference on Internet (ICONI) 2016, pp.175-178
Conference 2016 Traffic Storing and Related Information Generation System for Cyber Attack Analysis   Choi Yangseo  International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 1 원문
Conference 2016 Development of Unidirectional Security Gateway Appliance using Intel 82580EB NIC Interface   Youngjun Heo  International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1194-1196 3 원문
Journal 2016 Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call   Kim Hyun Joo  IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 6 원문
Conference 2016 A Platform of Processing and Visualizing Multi-Source Data for Analyzing Symptoms of Cyber Attacks   Kim Youngsoo  International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.318-322
Journal 2016 An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation   Choi Yong-Je  Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363 7 원문
Journal 2016 Secure Firmware Validation and Update for Consumer Devices in Home Networking   Choi Byeong Cheol  IEEE Transactions on Consumer Electronics, v.62, no.1, pp.39-44 54 원문
Conference 2016 Abnormal Traffic Filtering Mechanism for Protecting ICS Networks   Byoung Koo Kim  International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 7 원문
Conference 2015 Behavior-Based Anomaly Detection on Big Data   Kim Hyun Joo  SRI Security Congress 2015, pp.73-80
Conference 2015 Implementation of Netflow based Interactive Connection Traceback System   Jung Tae Kim  International Conference on Systems and Networks Communications (ICSNC) 2015, pp.21-26
Conference 2014 Cyber Incident Forensics as a Forward Lean Security   Jooyoung Lee  International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.872-873 1 원문
Journal 2014 Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks   Dong Ho Kang  Journal of Applied Mathematics, v.2014, pp.1-7 13 원문
Conference 2014 Cyber Threats and Defence Approaches in SCADA systems   Dong Ho Kang  International Conference on Advanced Communication Technology (ICACT) 2014, pp.324-327 17 원문
Conference 2014 Design of Industrial Firewall System based on Multiple Access Control Filter   Byoung Koo Kim  International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 1 원문
Conference 2014 Abnormal Behavior Detection Technique based on Big Data   Kim Hyun Joo  International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.553-563 6 원문
Conference 2014 Whitelist Generation Technique for Industrial Firewall in SCADA Networks   Dong Ho Kang  International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.525-534 4 원문
Conference 2013 Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis   Lim Sun Hee  International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507
Journal 2013 Cyber Attacks and Security Intelligence   Kim Youngsoo  Research Notes in Information Science, v.14, pp.106-108 0
Conference 2013 A Study on Multi-Control Working Position Authentication System in Aviation Security   Lee Deok Gyu  International Conference on Advanced IT, engineering Management (AIM) 2013, pp.226-230
Conference 2011 For Aviation Security Using Surveillance System   Lee Deok Gyu  FTRA International Workshop on Convergence Security in Pervasive Environments (IWCS) / International Workshop on STAVE / Conference on Secure and Trust Computing, Data Management, and Applications (STA) 2011 (CCIS 187), v.187, pp.103-115 0 원문
Conference 2010 Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm   송재구  International Conference on Future Generation Communication and Networking (FGCN) 2010 (CCIS 120), v.120, pp.268-275 0 원문
Conference 2010 Design of Cyber Attack Precursor Symptom Detection Algorithm through System base Behavior Analysis and Memory Monitoring   정성모  International Conference on Future Generation Communication and Networking (FGCN) 2010 (CCIS 120), v.120, pp.276-283 2 원문
Conference 2010 Context-based Remote Security Control for Mobile Communication Device   An Gaeil  International Symposium on Communications and Information Technologies (ISCIT) 2010, pp.815-820 2 원문
Conference 2010 An Efficient Anti-DDoS Mechanism using Flow-based Forwarding Technology   Namseok Ko  International Conference on Optical Internet (COIN) 2010, pp.1-3 4 원문
Journal 2009 Security Policy Specification for Home Network   Kim Geonwoo  International Journal Ad Hoc and Ubiquitous Computing, v.4, no.6, pp.372-378 1 원문
Journal 2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Kim Ik Kyun  International Journal of Computers, v.1, no.3, pp.104-114
Conference 2009 Intelligent Pervasive Network Authentication: S/Key Based Device Authentication   Lee Deok Gyu  Consumer Communications and Networking Conference (CCNC) 2009, pp.1-5 5 원문
Conference 2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Kim Ik Kyun  International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference 2008 Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network   Lee Deok Gyu  International Symposium on Ubiquitous Multimedia Computing (UMC) 2008, pp.99-104 3 원문
Conference 2008 Security Requirement for Cyber Attack Traceback   Ryu Jong Ho  International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.653-658 3 원문
Other 2008 Handbook of Research on Information Security and Assurance   An Gaeil  Handbook of Research on Information Security and Assurance [Book], pp.29-41 0 원문
Conference 2007 Security Framework for Home Network: Authentication, Authorization, and Security Policy   Kim Geonwoo  Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2007 (LNCS 4819), v.4819, pp.621-628 7 원문
Conference 2007 Memory-efficient content filtering hardware for high-speed intrusion detection systems   Yi Sungwon  Symposium on Applied Computing (SAC) 2007, pp.264-269 15 원문
Conference 2006 Return on Security Investment Against Cyber Attacks on Availability   민병준  International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3981), v.3981, pp.270-278 0 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2021 주의 기반 사이버 공격 경로 추론 장치, 지능형 공격 경로 예측 모델 학습 장치 및 방법 KOREA
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.