Digital Library
Search: "[ keyword: MAC ]" (86)
Hadoop 환경의 기계 학습을 이용한 HTTP 공격 탐지 모델
김형기,
김문현,
Vol. 31, No. 2, pp. 211-220,
4월.
2021
10.13089/JKIISC.2021.31.2.211
주제어: Machine Learning, Word to Vector, SVM, Hadoop, Machine Learning, Word to Vector, SVM, Hadoop

주제어: Machine Learning, Word to Vector, SVM, Hadoop, Machine Learning, Word to Vector, SVM, Hadoop
무선 센서 네트워크에서 클러스터링 기반 Sleep Deprivation Attack 탐지 모델
김숙영,
문종섭,
Vol. 31, No. 1, pp. 83-97,
2월.
2021
10.13089/JKIISC.2021.31.1.83
주제어: Wireless Sensor Network, Sleep deprivation attack, S-MAC, energy efficiency., Wireless Sensor Network, Sleep deprivation attack, S-MAC, energy efficiency.

주제어: Wireless Sensor Network, Sleep deprivation attack, S-MAC, energy efficiency., Wireless Sensor Network, Sleep deprivation attack, S-MAC, energy efficiency.
입력 변이에 따른 딥러닝 모델 취약점 연구 및 검증
김재욱,
박래현,
권태경,
Vol. 31, No. 1, pp. 51-59,
2월.
2021
10.13089/JKIISC.2021.31.1.51
주제어: Deep Learning, Mutation, Adversarial machine learning, Deep Learning, Mutation, Adversarial machine learning

주제어: Deep Learning, Mutation, Adversarial machine learning, Deep Learning, Mutation, Adversarial machine learning
서바이벌 네트워크 개념을 이용한 저자 식별 프레임워크: 의미론적 특징과 특징 허용 범위
황철훈,
신건윤,
김동욱,
한명묵,
Vol. 30, No. 6, pp. 1013-1021,
12월.
2020
10.13089/JKIISC.2020.30.6.1013
주제어: Authorship Atribution, Survial Network, Cal Graph, Cosine Simlarity, Suport Vector Machine, Authorship Atribution, Survial Network, Cal Graph, Cosine Simlarity, Suport Vector Machine

주제어: Authorship Atribution, Survial Network, Cal Graph, Cosine Simlarity, Suport Vector Machine, Authorship Atribution, Survial Network, Cal Graph, Cosine Simlarity, Suport Vector Machine
AI를 통한 BEC (Business Email Compromise) 공격의 효과적인 대응방안 연구
이도경,
장건수,
이경호,
Vol. 30, No. 5, pp. 835-846,
10월.
2020
10.13089/JKIISC.2020.30.5.835
주제어: Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning, Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning

주제어: Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning, Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning
Adaptive Boosting을 사용한 패커 식별 방법 연구
장윤환,
박성준,
박용수,
Vol. 30, No. 2, pp. 169-177,
4월.
2020
10.13089/JKIISC.2020.30.2.169
주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.

주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.