IoT 관점에서의 차량 위협 탐지 방안
Vol. 25, No. 2, pp. 411-422,
4월.
2015
10.13089/JKIISC.2015.25.2.411, Full Text:
Keywords: IoT, Car Security, Hacking scenario, Data Mining, Anomaly Detection
Abstract Statistics
Cite this article
10.13089/JKIISC.2015.25.2.411, Full Text:
Keywords: IoT, Car Security, Hacking scenario, Data Mining, Anomaly Detection
Abstract Statistics
Cite this article
[IEEE Style]
B. I. Kwak, M. R. Han, A. R. Kang, H. K. Kim, "A study on detection methodology of threat on cars from the viewpoint of IoT," Journal of The Korea Institute of Information Security and Cryptology, vol. 25, no. 2, pp. 411-422, 2015. DOI: 10.13089/JKIISC.2015.25.2.411.
[ACM Style]
Byung Il Kwak, Mi Ran Han, Ah Reum Kang, and Huy Kang Kim. 2015. A study on detection methodology of threat on cars from the viewpoint of IoT. Journal of The Korea Institute of Information Security and Cryptology, 25, 2, (2015), 411-422. DOI: 10.13089/JKIISC.2015.25.2.411.