Digital Library
Search: "[ keyword: CTI ]" (452)
함수 호출의 안전성 향상을 돕는 스마트 계약 코드 재작성기
이수연,
정형근,
조은선,
Vol. 29, No. 1, pp. 67-75,
1월.
2019
10.13089/JKIISC.2019.29.1.67
주제어: Solidity, Preprocessor, Rewritter, Fallback functions, Solidity, Preprocessor, Rewritter, Fallback functions
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Solidity, Preprocessor, Rewritter, Fallback functions, Solidity, Preprocessor, Rewritter, Fallback functions
거래당사자간 합의에 기반하는 온라인 전자금융 2-WAY 거래인증 모델 제안
이익준,
오재섭,
염흥열,
Vol. 28, No. 6, pp. 1475-1487,
11월.
2018
10.13089/JKIISC.2018.28.6.1475
주제어: authentication, transaction authentication, voice phishing fraud, error remittance, authentication, transaction authentication, voice phishing fraud, error remittance
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: authentication, transaction authentication, voice phishing fraud, error remittance, authentication, transaction authentication, voice phishing fraud, error remittance
웹 크롤러를 이용한 자동 패치 정보 수집 시스템
김용건,
나사랑,
김환국,
원유재,
Vol. 28, No. 6, pp. 1393-1399,
11월.
2018
10.13089/JKIISC.2018.28.6.1393
주제어: Web Crawler, Patch Information, Collection, regular expression, Web Crawler, Patch Information, Collection, regular expression
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Web Crawler, Patch Information, Collection, regular expression, Web Crawler, Patch Information, Collection, regular expression
DLCT를 활용한 향상된 차분선형 분석
김현우,
김성겸,
홍득조,
성재철,
홍석희,
Vol. 28, No. 6, pp. 1379-1392,
11월.
2018
10.13089/JKIISC.2018.28.6.1379
주제어: Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT, Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT, Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT
Filter Method와 Classification 알고리즘을 이용한 전자상거래 블랙컨슈머 탐지에 대한 연구
이태규,
이경호,
Vol. 28, No. 6, pp. 1499-1508,
11월.
2018
10.13089/JKIISC.2018.28.6.1499
주제어: Machine Learning, Supervised Learning, Fraud Detection, User Classification, Feature selection, Machine Learning, Supervised Learning, Fraud Detection, User Classification, Feature selection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Machine Learning, Supervised Learning, Fraud Detection, User Classification, Feature selection, Machine Learning, Supervised Learning, Fraud Detection, User Classification, Feature selection
TF-IDF를 이용한 침입탐지이벤트 유효성 검증 기법
김효석,
김용민,
Vol. 28, No. 6, pp. 1489-1497,
11월.
2018
10.13089/JKIISC.2018.28.6.1489
주제어: Intrusion Detection, Web Traffic Analysis, Text Mining, TF-IDF, Intrusion Detection, Web Traffic Analysis, Text Mining, TF-IDF
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Intrusion Detection, Web Traffic Analysis, Text Mining, TF-IDF, Intrusion Detection, Web Traffic Analysis, Text Mining, TF-IDF
상용 안드로이드 앱 보호 서비스 분석을 통한 강건한 앱 보호 구조 연구
하동수,
오희국,
Vol. 28, No. 5, pp. 1209-1223,
9월.
2018
10.13089/JKIISC.2018.28.5.1209
주제어: Android, Obfuscator, Protector, Packer, App hardening, Runtime protection, Android, Obfuscator, Protector, Packer, App hardening, Runtime protection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Android, Obfuscator, Protector, Packer, App hardening, Runtime protection, Android, Obfuscator, Protector, Packer, App hardening, Runtime protection
악성코드 패킹유형 자동분류 기술 연구
김수정,
하지희,
이태진,
Vol. 28, No. 5, pp. 1119-1127,
9월.
2018
10.13089/JKIISC.2018.28.5.1119
주제어: Packing, Malware classification, Section name, clustering, Deep Learning, Packing, Malware classification, Section name, clustering, Deep Learning
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Packing, Malware classification, Section name, clustering, Deep Learning, Packing, Malware classification, Section name, clustering, Deep Learning
경량 암호 알고리듬 CHAM에 대한 오류 주입 공격
권홍필,
하재철,
Vol. 28, No. 5, pp. 1071-1078,
9월.
2018
10.13089/JKIISC.2018.28.5.1071
주제어: Lightweight Block cipher, CHAM, Fault injection attack, Lightweight Block cipher, CHAM, Fault injection attack
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Lightweight Block cipher, CHAM, Fault injection attack, Lightweight Block cipher, CHAM, Fault injection attack
사전유입 에이전트가 발생하는 이상트래픽 탐지 방안
조영민,
권헌영,
Vol. 28, No. 5, pp. 1169-1177,
9월.
2018
10.13089/JKIISC.2018.28.5.1169
주제어: abnormal traffic, Agent, pre-inflow, Detection, abnormal traffic, Agent, pre-inflow, Detection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: abnormal traffic, Agent, pre-inflow, Detection, abnormal traffic, Agent, pre-inflow, Detection