|
Journal
|
2017 |
DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks
Moon Dae Sung Journal of Supercomputing, v.73, no.7, pp.2881-2895 |
125 |
원문
|
|
Conference
|
2016 |
Real-time Abnormal Behavior Detection by Online Data Collection
Myungcheol Lee 한국정보처리학회 학술 발표 대회 (추계) 2016, pp.208-209 |
|
|
|
Journal
|
2016 |
Host-based Intrusion Detection System for Secure Human-centric Computing
Moon Dae Sung Journal of Supercomputing, v.72, no.7, pp.2520-2536 |
36 |
원문
|
|
Conference
|
2015 |
Cyber Black Box: Network Intrusion Forensics System for Collecting and Preserving Evidence of Attack
Kim Jonghyun SRI Security Congress 2015, pp.104-110 |
|
|
|
Conference
|
2015 |
Behavior-Based Anomaly Detection on Big Data
Kim Hyun Joo SRI Security Congress 2015, pp.73-80 |
|
|
|
Journal
|
2015 |
Cyber Genome Technology for Countering Malware
Kim Jonghyun 전자통신동향분석, v.30, no.5, pp.118-128 |
|
원문
|
|
Journal
|
2015 |
Real-Time Abnormal Behavior Detection System Based on Fast Data
Myungcheol Lee 정보보호학회논문지, v.25, no.5, pp.1027-1041 |
|
원문
|
|
Journal
|
2015 |
Technical Trends of the Cyber Targeted Attack Traceback - Connection Chain & Traceback
Jung Tae Kim 전자통신동향분석, v.30, no.4, pp.120-128 |
|
원문
|
|
Journal
|
2014 |
MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats
Moon Dae Sung Symmetry, v.6, no.4, pp.997-1010 |
34 |
원문
|
|
Conference
|
2014 |
The Phased Classification of Attacking Methods used for Advanced Persistent Threat
Kim Youngsoo International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014, pp.1-7 |
|
|
|
Journal
|
2013 |
Cyber Attacks and Security Intelligence
Kim Youngsoo Research Notes in Information Science, v.14, pp.106-108 |
0 |
|
|
Conference
|
2013 |
Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis
Lim Sun Hee International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507 |
|
|
|
Journal
|
2013 |
Technical Trends of Cyber Security with Big Data
Kim Jonghyun 전자통신동향분석, v.28, no.3, pp.19-29 |
|
원문
|