Digital Library
Search: "[ keyword: CTI ]" (452)
행위 시간 간격 기반 게임 봇 탐지 기법
강용구,
김휘강,
Vol. 28, No. 5, pp. 1153-1160,
9월.
2018
10.13089/JKIISC.2018.28.5.1153
주제어: Online game, Bot detection, Machine Learning, Online game, Bot detection, Machine Learning
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Online game, Bot detection, Machine Learning, Online game, Bot detection, Machine Learning
N-gram을 활용한 DGA-DNS 유사도 분석 및 APT 공격 탐지
김동현,
김강석,
Vol. 28, No. 5, pp. 1141-1151,
9월.
2018
10.13089/JKIISC.2018.28.5.1141
주제어: Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis, Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis, Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis
Microsoft SQL Server의 원본 수집 방식에 따른 삭제 데이터의 복구 가능성 비교
신지호,
Vol. 28, No. 4, pp. 859-868,
7월.
2018
10.13089/JKIISC.2018.28.4.859
주제어: database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page, database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page, database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page
사이버 공간 내 디지털 증거 수집 시스템에 관한 연구
정효정,
최종현,
이상진,
Vol. 28, No. 4, pp. 869-878,
7월.
2018
10.13089/JKIISC.2018.28.4.869
주제어: Digital Forensics, Digital Evidence, Data Collection, Digital Forensics, Digital Evidence, Data Collection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Digital Forensics, Digital Evidence, Data Collection, Digital Forensics, Digital Evidence, Data Collection
기계학습 알고리즘을 이용한 소프트웨어 취약 여부 예측 시스템
최민준,
김주환,
윤주범,
Vol. 28, No. 3, pp. 635-642,
5월.
2018
10.13089/JKIISC.2018.28.3.635
주제어: Machine Learning, Fuzzing, prediction, Vulnerability, Confusion Matrix, Machine Learning, Fuzzing, prediction, Vulnerability, Confusion Matrix
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Machine Learning, Fuzzing, prediction, Vulnerability, Confusion Matrix, Machine Learning, Fuzzing, prediction, Vulnerability, Confusion Matrix
불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구
정세진,
곽노현,
강병훈,
Vol. 28, No. 3, pp. 717-727,
5월.
2018
10.13089/JKIISC.2018.28.3.717
주제어: Bitcoin address, Illegal bitcoin transaction, Dread Pirate Roberts(DPR), Bitcoin address, Illegal bitcoin transaction, Dread Pirate Roberts(DPR)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Bitcoin address, Illegal bitcoin transaction, Dread Pirate Roberts(DPR), Bitcoin address, Illegal bitcoin transaction, Dread Pirate Roberts(DPR)
SNS의 개인정보와 자기표현정보의 중요도 인지가 정보보호 행동의지에 미치는 영향에 관한 실험연구
임정호,
권순동,
Vol. 28, No. 3, pp. 681-694,
5월.
2018
10.13089/JKIISC.2018.28.3.681
주제어: Personal Information, Self-express information, Non-disclosure of information, Reduction of disclosure scope, Law institutionalization requirement, cognition, conation, Personal Information, Self-express information, Non-disclosure of information, Reduction of disclosure scope, Law institutionalization requirement, cognition, conation
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Personal Information, Self-express information, Non-disclosure of information, Reduction of disclosure scope, Law institutionalization requirement, cognition, conation, Personal Information, Self-express information, Non-disclosure of information, Reduction of disclosure scope, Law institutionalization requirement, cognition, conation
안전한 전자금융거래를 위한 보안등급 기준마련 및 사례연구
장길영,
김인석,
Vol. 28, No. 3, pp. 729-741,
5월.
2018
10.13089/JKIISC.2018.28.3.729
주제어: certificate, Electronic Financial Transactions, authentication, Privacy Protection, Security Review, certificate, Electronic Financial Transactions, authentication, Privacy Protection, Security Review
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: certificate, Electronic Financial Transactions, authentication, Privacy Protection, Security Review, certificate, Electronic Financial Transactions, authentication, Privacy Protection, Security Review
NTRU 서명 시스템 구현에 대한 오류 주입 공격 및 대응 방안 연구
장호철,
오수현,
하재철,
Vol. 28, No. 3, pp. 551-561,
5월.
2018
10.13089/JKIISC.2018.28.3.551
주제어: Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure, Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure, Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure
소셜 트러스트 클러스터 효과를 이용한 견고한 추천 시스템 설계 및 분석
노기섭,
오하영,
이재훈,
Vol. 28, No. 1, pp. 241-248,
2월.
2018
10.13089/JKIISC.2018.28.1.241
주제어: Trust Cluster, Social Relation, Robust Recommender System, Prediction Accuracy, Trust Cluster, Social Relation, Robust Recommender System, Prediction Accuracy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Trust Cluster, Social Relation, Robust Recommender System, Prediction Accuracy, Trust Cluster, Social Relation, Robust Recommender System, Prediction Accuracy