Digital Library
Search: "[ keyword: SVM ]" (13)
HTTP Intrusion Detection Model Using Machine Learning in Hadoop Environment
김형기,
김문현,
Vol. 31, No. 2, pp. 211-220,
Apr.
2021
10.13089/JKIISC.2021.31.2.211
Keywords: Machine Learning, Word to Vector, SVM, Hadoop, Machine Learning, Word to Vector, SVM, Hadoop
10.13089/JKIISC.2021.31.2.211
Keywords: Machine Learning, Word to Vector, SVM, Hadoop, Machine Learning, Word to Vector, SVM, Hadoop
Machine Learning-Based Detection of Cache Side Channel Attack Using Performance Counter Monitor of CPU
황종배,
배대현,
하재철,
Vol. 30, No. 6, pp. 1237-1246,
Dec.
2020
10.13089/JKIISC.2020.30.6.1237
Keywords: Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP, Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP
10.13089/JKIISC.2020.30.6.1237
Keywords: Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP, Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP
Implementation and Analysis of Power Analysis Attack Using Multi-Layer Perceptron Method
권홍필,
배대현,
하재철,
Vol. 29, No. 5, pp. 997-1006,
Oct.
2019
10.13089/JKIISC.2019.29.5.997
Keywords: Side-Channel Analysis, Power Analysis Attack, Deep Learning MLP, Machine Learning SVM, Side-Channel Analysis, Power Analysis Attack, Deep Learning MLP, Machine Learning SVM
10.13089/JKIISC.2019.29.5.997
Keywords: Side-Channel Analysis, Power Analysis Attack, Deep Learning MLP, Machine Learning SVM, Side-Channel Analysis, Power Analysis Attack, Deep Learning MLP, Machine Learning SVM
A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning
Iksoo Shin,
Jungsuk Song,
Jangwon Choi,
Taewoong Kwon,
Vol. 28, No. 2, pp. 385-395,
Apr.
2018
10.13089/JKIISC.2018.28.2.385
Keywords: Network Security, IDS, False Alarm, Machine Learning, SVM, Network Security, IDS, False Alarm, Machine Learning, SVM
10.13089/JKIISC.2018.28.2.385
Keywords: Network Security, IDS, False Alarm, Machine Learning, SVM, Network Security, IDS, False Alarm, Machine Learning, SVM
Breaking character and natural image based CAPTCHA using feature classification
Jaehwan Kim,
Suah Kim,
Hyoung Joong Kim,
Vol. 25, No. 5, pp. 1011-1020,
Oct.
2015
10.13089/JKIISC.2015.25.5.1011
Keywords: CAPTCHA, Breaking CAPTCHA, SVM, CNN, HSV color space
10.13089/JKIISC.2015.25.5.1011
Keywords: CAPTCHA, Breaking CAPTCHA, SVM, CNN, HSV color space
New feature and SVM based advanced classification of Computer Graphics and Photographic Images
DooWon Jeong,
Hyunji Chung,
Ilyoung Hong,
Sangjin Lee,
Vol. 24, No. 2, pp. 311-318,
Apr.
2014
10.13089/JKIISC.2014.24.2.311
Keywords: jpeg, Computer graphics, Photographic images, Features, SVM
10.13089/JKIISC.2014.24.2.311
Keywords: jpeg, Computer graphics, Photographic images, Features, SVM
Detecting Rogue AP using k-SVM method
Jae-Wook Lee,
Si-Young Lee,
Jong-Sub Moon,
Vol. 24, No. 1, pp. 87-96,
Feb.
2014
10.13089/JKIISC.2014.24.1.87
Keywords: rogue AP, Network, SVM, LTE
10.13089/JKIISC.2014.24.1.87
Keywords: rogue AP, Network, SVM, LTE
Anomaly Detection for IEC 61850 Substation Network
Yong-Hun Lim,
Hyunguk Yoo,
Taeshik Shon,
Vol. 23, No. 5, pp. 939-946,
Oct.
2013
10.13089/JKIISC.2013.23.5.939
Keywords: Anomaly Detection, IEC 61850 Substation, MMS/GOOSE, Normal Behavior Profiling, One-class SVM
10.13089/JKIISC.2013.23.5.939
Keywords: Anomaly Detection, IEC 61850 Substation, MMS/GOOSE, Normal Behavior Profiling, One-class SVM
Analysis of Naver CAPTCHA with Effective Segmentation
Dae Hun Nyang,
Yong Heon Choi,
Seok Jun Hong,
Kyunghee Lee,
Vol. 23, No. 5, pp. 909-918,
Oct.
2013
10.13089/JKIISC.2013.23.5.909
Keywords: CAPTCHA, Breaking CAPTCHA, SVM, Character Separation
10.13089/JKIISC.2013.23.5.909
Keywords: CAPTCHA, Breaking CAPTCHA, SVM, Character Separation
Relaying Rogue AP detection scheme using SVM
Sung-Bae Kang,
Dae-Hun Nyang,
Jin-Chun Choi,
Sok-Joon Lee,
Vol. 23, No. 3, pp. 431-444,
Jun.
2013
10.13089/JKIISC.2013.23.3.431
Keywords: rogue AP, SVM, wireless network, Network Security
10.13089/JKIISC.2013.23.3.431
Keywords: rogue AP, SVM, wireless network, Network Security