Digital Library


Search: "[ keyword: TOE ]" (9)
    Autoencoder-Based Anomaly Detection Method for IoT Device Traffics
    , , , , Vol. 34, No. 2, pp. 281-288, Apr. 2024
    10.13089/JKIISC.2024.34.2.281

    Autoencoder-Based Defense Technique against One-Pixel Adversarial Attacks in Image Classification
    , , Vol. 33, No. 6, pp. 1087-1098, Dec. 2023
    JKIISC.2023.33.6.1087

    An Experimental Study on AutoEncoderto Detect Botnet Traffic Using NetFlow-Timewindow Scheme: Revisited
    , Vol. 33, No. 4, pp. 687-697, Aug. 2023
    10.13089/JKIISC.2023.33.4.687

    A Study on Effective Interpretation of AI Model based on Reference
    , , , , Vol. 33, No. 3, pp. 411-425, Jun. 2023
    10.13089/JKIISC.2023.33.3.411

    Network Anomaly Detection Technologies Using Unsupervised Learning AutoEncoders
    Koohong Kang, Vol. 30, No. 4, pp. 617-629, Aug. 2020
    10.13089/JKIISC.2020.30.4.617
    Keywords: Network Anomaly Detection, NSL-KDD Data Set, Autoencoder, Unsupervised learning

    Stacked Autoencoder Based Malware Feature Refinement Technology Research
    Hong-bi Kim, Tae-jin Lee, Vol. 30, No. 4, pp. 593-603, Aug. 2020
    10.13089/JKIISC.2020.30.4.593
    Keywords: Autoencoder, feature importance, Malware, TF-IDF, variant

    Security Vulnerability Verification for Open Deep Learning Libraries
    정재한, 손태식, Vol. 29, No. 1, pp. 117-125, Jan. 2019
    10.13089/JKIISC.2019.29.1.117
    Keywords: Adversarial attack, MNIST, Deep Learning, Security, Autoencoder, Convolution Neural Network, Adversarial attack, MNIST, Deep Learning, Security, Autoencoder, Convolution Neural Network

    A Method for Field Based Grey Box Fuzzing with Variational Autoencoder
    이수림, 문종섭, Vol. 28, No. 6, pp. 1463-1474, Nov. 2018
    10.13089/JKIISC.2018.28.6.1463
    Keywords: Software Testing, Fuzzing, Vulnerability, Deep Learning, VAE(Variational Autoencoder), Software Testing, Fuzzing, Vulnerability, Deep Learning, VAE(Variational Autoencoder)

    A Study on Cloud Database Management System Protection Profile for the Secure Cloud Environment
    Yukyeong Wi, Jin Kwak, Vol. 24, No. 2, pp. 411-430, Apr. 2014
    10.13089/JKIISC.2014.24.2.411
    Keywords: Protection profile, Cloud Datacenter, Availability, access control, TOE