Subject

Subjects : Cyber threats

  • Articles (17)
  • Patents (3)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2024 SITRAN: Self-Supervised IDS With Transferable Techniques for 5G Industrial Environments   Kimhyunjin  IEEE Internet of Things Journal, v.11, no.21, pp.35465-35476 0 원문
Journal 2022 Technological Trends in Intelligent Cyber Range   Yu Jae Hak  전자통신동향분석, v.37, no.4, pp.36-45 원문
Journal 2022 Attack Graph Generation with Machine Learning for Network Security   Koo Ki Jong  Electronics, v.11, no.9, pp.1-25 9 원문
Conference 2021 Network Anomaly Detection based on GAN with Scaling Properties   Kimhyunjin  International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-5 5 원문
Journal 2019 Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles   Jong-Hoon Lee  IEEE Access, v.7, pp.165607-165626 120 원문
Conference 2018 Cyber Threat Analyses of a UAS Traffic Management System   Wang/Kicheoul  Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-8 0
Conference 2017 Building a Big Data Platform for Large-scale Security Data Analysis   Jong-Hoon Lee  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 5 원문
Conference 2015 A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology   Lim Kyung Soo  International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 3 원문
Conference 2014 Cyber Threats and Defence Approaches in SCADA systems   Dong Ho Kang  International Conference on Advanced Communication Technology (ICACT) 2014, pp.324-327 17 원문
Journal 2013 GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection   Kim Hyun Joo  Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 0
Conference 2013 Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis   Lim Sun Hee  International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507
Journal 2013 Cyber Attacks and Security Intelligence   Kim Youngsoo  Research Notes in Information Science, v.14, pp.106-108 0
Conference 2012 Prediction Model for Botnet-based Cyber Threats   Lim Sun Hee  International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.340-341 3 원문
Conference 2012 Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks   김현주  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 6 원문
Journal 2012 A Rule Based Event Correlation Approach for Physical and Logical Security Convergence   Dong Ho Kang  International Journal of Computer Science and Network Security, v.12, no.1, pp.28-31
Conference 2008 Performance Evaluation of TCAM Based Pattern-Matching Algorithm   Sung Jung Sik  Vehicular Technology Conference (VTC) 2008 (Fall), pp.1-5 1 원문
Conference 2005 A Multi-gigabit Rate Deep Packet Inspection Algorithm using TCAM   Sung Jung Sik  GLOBECOM 2005, pp.453-457 28 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2017 보안 이벤트의 연관 분석을 통한 사이버 침해 위협 탐지 방법 및 장치 KOREA KIPRIS
Registered 2022 Method to generate datasets for cyber threat detection using correlation based data feature extraction UNITED STATES
Registered 2018 심층 신경망을 이용한 사이버 위협 탐지 방법 및 장치 KOREA KIPRIS
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.