Digital Library
Search: "[ keyword: LEA ]" (160)
CNN을 이용한 소비 전력 파형 기반 명령어 수준 역어셈블러 구현
배대현,
하재철,
Vol. 30, No. 4, pp. 527-536,
8월.
2020
10.13089/JKIISC.2020.30.4.527
주제어: Side-Channel Attack, power analysis, Deep Learning, Convolutional Neural Network(CNN), Disassembl, Side-Channel Attack, power analysis, Deep Learning, Convolutional Neural Network(CNN), Disassembl
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Side-Channel Attack, power analysis, Deep Learning, Convolutional Neural Network(CNN), Disassembl, Side-Channel Attack, power analysis, Deep Learning, Convolutional Neural Network(CNN), Disassembl
근거이론을 통한 아동 개인정보 유출에 대한 질적연구
전창욱,
유진호,
Vol. 30, No. 2, pp. 263-277,
4월.
2020
10.13089/JKIISC.2020.30.2.263
주제어: Children Personal Information, Leakage, Ground Theory, qualitative Research, Children Personal Information, Leakage, Ground Theory, qualitative Research
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Children Personal Information, Leakage, Ground Theory, qualitative Research, Children Personal Information, Leakage, Ground Theory, qualitative Research
오프라인 거래에서 개인정보 보호방안 : 주택임대차계약을 중심으로
김효석,
박순태,
김용민,
Vol. 30, No. 2, pp. 243-252,
4월.
2020
10.13089/JKIISC.2020.30.2.243
주제어: Privacy, personal information processing, housing lease agreement, Electronic contract, IRTS, Privacy, personal information processing, housing lease agreement, Electronic contract, IRTS
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Privacy, personal information processing, housing lease agreement, Electronic contract, IRTS, Privacy, personal information processing, housing lease agreement, Electronic contract, IRTS
Adaptive Boosting을 사용한 패커 식별 방법 연구
장윤환,
박성준,
박용수,
Vol. 30, No. 2, pp. 169-177,
4월.
2020
10.13089/JKIISC.2020.30.2.169
주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.