Digital Library
Search: "[ keyword: CTI ]" (452)
NIST 소수 P-256에서 효율적인 모듈러 감산 방법
장남수,
Vol. 29, No. 3, pp. 511-514,
5월.
2019
10.13089/JKIISC.2019.29.3.511
주제어: Elliptic Curve Cryptosystem, Fast reduction, finite field arithmetic, Elliptic Curve Cryptosystem, Fast reduction, finite field arithmetic
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Elliptic Curve Cryptosystem, Fast reduction, finite field arithmetic, Elliptic Curve Cryptosystem, Fast reduction, finite field arithmetic
프로세스 가상 메모리 데이터 유사성을 이용한 프로세스 할로윙 공격 탐지
임수민,
임을규,
Vol. 29, No. 2, pp. 431-438,
3월.
2019
10.13089/JKIISC.2019.29.2.431
주제어: Fileless malware, Malware, Process hollowing, Malware detection, Process memory, Memory similarity, Fileless malware, Malware, Process hollowing, Malware detection, Process memory, Memory similarity
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Fileless malware, Malware, Process hollowing, Malware detection, Process memory, Memory similarity, Fileless malware, Malware, Process hollowing, Malware detection, Process memory, Memory similarity
Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지
김용준,
손태식,
Vol. 29, No. 2, pp. 331-346,
3월.
2019
10.13089/JKIISC.2019.29.2.331
주제어: ICS/SCADA, Legacy ICS, CTI, Sysmon, ELK, ICS/SCADA, Legacy ICS, CTI, Sysmon, ELK
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: ICS/SCADA, Legacy ICS, CTI, Sysmon, ELK, ICS/SCADA, Legacy ICS, CTI, Sysmon, ELK
사이버 효과 지표를 활용한 사이버 전투 피해평가 시뮬레이션 도구의 설계 및 구현
박진호,
김두회,
신동일,
신동규,
Vol. 29, No. 2, pp. 465-472,
3월.
2019
10.13089/JKIISC.2019.29.2.465
주제어: Cyber battle, Simulation, Network Security, MOCE(Measure of Cyber Effectiveness), Cyber battle, Simulation, Network Security, MOCE(Measure of Cyber Effectiveness)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Cyber battle, Simulation, Network Security, MOCE(Measure of Cyber Effectiveness), Cyber battle, Simulation, Network Security, MOCE(Measure of Cyber Effectiveness)
PLC용 uC/OS 운영체제의 보안성 강화를 위한 실행코드 새니타이저
최광준,
유근하,
조성제,
Vol. 29, No. 2, pp. 365-375,
3월.
2019
10.13089/JKIISC.2019.29.2.365
주제어: Execution code sanitizer, Programmable logic controller, uC/OS, Vulnerable function, Pointer misuse, Execution code sanitizer, Programmable logic controller, uC/OS, Vulnerable function, Pointer misuse
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Execution code sanitizer, Programmable logic controller, uC/OS, Vulnerable function, Pointer misuse, Execution code sanitizer, Programmable logic controller, uC/OS, Vulnerable function, Pointer misuse
제조공정 단말PC 작업자 접속 로그를 통한 이상 징후 탐지 모델 연구
안종성,
이경호,
Vol. 29, No. 2, pp. 321-330,
3월.
2019
10.13089/JKIISC.2019.29.2.321
주제어: Machine Learning, Anomaly Detection, Feature selection, Machine Learning, Anomaly Detection, Feature selection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Machine Learning, Anomaly Detection, Feature selection, Machine Learning, Anomaly Detection, Feature selection
SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선
오정민,
정익래,
변진욱,
Vol. 29, No. 1, pp. 29-43,
1월.
2019
10.13089/JKIISC.2019.29.1.29
주제어: Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor, Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor, Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor
전투기 데이터 변조 공격행위에 대한 탐지모듈 제안
홍병진,
김완주,
김호근,
임재성,
Vol. 29, No. 1, pp. 5-16,
1월.
2019
10.13089/JKIISC.2019.29.1.5
주제어: RTOS, Data Modulation Attack, True-Airspeed, Air Data Computer, Detection Module, RTOS, Data Modulation Attack, True-Airspeed, Air Data Computer, Detection Module
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: RTOS, Data Modulation Attack, True-Airspeed, Air Data Computer, Detection Module, RTOS, Data Modulation Attack, True-Airspeed, Air Data Computer, Detection Module
전기통신금융사기 사고에 대한 이상징후 지능화(AI) 탐지 모델 연구
정의석,
임종인,
Vol. 29, No. 1, pp. 149-164,
1월.
2019
10.13089/JKIISC.2019.29.1.149
주제어: AI, Fraud Detection System, AI, Fraud Detection System
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: AI, Fraud Detection System, AI, Fraud Detection System
기계학습 기반 비트코인 채굴 난이도 예측 연구
이준원,
권태경,
Vol. 29, No. 1, pp. 225-234,
1월.
2019
10.13089/JKIISC.2019.29.1.225
주제어: Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning, Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning, Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning