Digital Library
Search: "[ keyword: CTI ]" (452)
스레드 기반 모니터링을 통한 악의적인 행위 주체 추적 및 차단에 관한 연구
고보승,
최원혁,
정다정,
Vol. 30, No. 1, pp. 75-86,
2월.
2020
10.13089/JKIISC.2020.30.1.75
주제어: Process behavior, Remotethread, DLL/Code injection, Process behavior, Remotethread, DLL/Code injection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Process behavior, Remotethread, DLL/Code injection, Process behavior, Remotethread, DLL/Code injection
API Call Time Interval을 활용한 머신러닝 기반의 악성코드 탐지
조영민,
권헌영,
Vol. 30, No. 1, pp. 51-58,
2월.
2020
10.13089/JKIISC.2020.30.1.51
주제어: Machine Learning, Malware detection, Time Interval, AI, Machine Learning, Malware detection, Time Interval, AI
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Machine Learning, Malware detection, Time Interval, AI, Machine Learning, Malware detection, Time Interval, AI
IoT 환경에서 네트워크 코딩의 위장패킷 탐지와 유효한 복구의 식별 알고리즘
이용,
Vol. 30, No. 1, pp. 29-37,
2월.
2020
10.13089/JKIISC.2020.30.1.29
주제어: Network coding, IoT, Disguised Packet, Valid Reconstruction, Network coding, IoT, Disguised Packet, Valid Reconstruction
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Network coding, IoT, Disguised Packet, Valid Reconstruction, Network coding, IoT, Disguised Packet, Valid Reconstruction
개인정보 오남용 예방을 위한 정보보호정책 개선에 관한연구 : 금융회사의 개인정보 오남용 모니터링 결과 중심으로
김영호,
김인석,
Vol. 29, No. 6, pp. 1437-1446,
12월.
2019
10.13089/JKIISC.2019.29.6.1437
주제어: Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies, Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies, Privacy, personal information misuse monitoring, performance of information protection, deterrence theory, information protection policies
사이버 공격 대비 가동 물리장치에 대한 실시간 간접 상태감시시스템 설계 및 구현
김홍준,
Vol. 29, No. 6, pp. 1403-1412,
12월.
2019
10.13089/JKIISC.2019.29.6.1403
주제어: PHM (Prognostics and Health Management), failure prediction, indirect sensing, real-time surveillance, PHM (Prognostics and Health Management), failure prediction, indirect sensing, real-time surveillance
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: PHM (Prognostics and Health Management), failure prediction, indirect sensing, real-time surveillance, PHM (Prognostics and Health Management), failure prediction, indirect sensing, real-time surveillance
바이너리 패턴 분석을 이용한 멜트다운, 스펙터 악성코드 탐지 방법
김문선,
이만희,
Vol. 29, No. 6, pp. 1365-1373,
12월.
2019
10.13089/JKIISC.2019.29.6.1365
주제어: Meltdown, Spectre, Binary Pattern Analysis, Malware detection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Meltdown, Spectre, Binary Pattern Analysis, Malware detection
함수암호를 이용한 인증정보 Template 보호 기술
박동희,
박영호,
Vol. 29, No. 6, pp. 1319-1326,
12월.
2019
10.13089/JKIISC.2019.29.6.1319
주제어: Function encryption, Biometric Authentication, Authentication template protection, Function encryption, Biometric Authentication, Authentication template protection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Function encryption, Biometric Authentication, Authentication template protection, Function encryption, Biometric Authentication, Authentication template protection
BOGI 전략으로 설계된 블록 암호의 차분 공격에 대한 안전성 분석
이상협,
김성겸,
홍득조,
성재철,
홍석희,
Vol. 29, No. 6, pp. 1259-1270,
12월.
2019
10.13089/JKIISC.2019.29.6.1259
주제어: BOGI, differential cryptanalysis, Active S-box, GIFT, MILP, BOGI, differential cryptanalysis, Active S-box, GIFT, MILP
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: BOGI, differential cryptanalysis, Active S-box, GIFT, MILP, BOGI, differential cryptanalysis, Active S-box, GIFT, MILP
IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선
탁금지,
정익래,
변진욱,
Vol. 29, No. 6, pp. 1243-1257,
12월.
2019
10.13089/JKIISC.2019.29.6.1243
주제어: Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution, Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution, Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution
안드로이드 악성코드 분류를 위한 Flow Analysis기반의 API 그룹화 및 빈도 분석 기법
심현석,
박정수,
단티엔북,
정수환,
Vol. 29, No. 6, pp. 1235-1242,
12월.
2019
10.13089/JKIISC.2019.29.6.1235
주제어: Android Malware, Malware classification, Feature selection, API grouping, flow analysis, Android Malware, Malware classification, Feature selection, API grouping, flow analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Android Malware, Malware classification, Feature selection, API grouping, flow analysis, Android Malware, Malware classification, Feature selection, API grouping, flow analysis