Ajou University repository

Browsing "Department of Cyber Security" by Title :

All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
전체
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 1 to 20 of 233

6in4 수동 터널링 기반 네트워크에서 Snort IDS의 보안성과 성능 분석
  • 2025-06
  • 디지털콘텐츠학회논문지, Vol.26 No.6, pp.1663-1673
  • 한국디지털콘텐츠학회
A Common Architecture-Based Smart Home Tools and Applications Forensics for Scalable Investigationsoa mark
  • 2025-01-01
  • Computers, Materials and Continua, Vol.83 No.1, pp.661-683
  • Tech Science Press
A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospectsoa mark
  • Aslam, Muhammad Muzamil;
  • Tufail, Ali;
  • Kim, Ki Hyung;
  • Apong, Rosyzie Anna Awg Haji Mohd;
  • Raza, Muhammad Taqi
  • 2023-09-01
  • Sensors, Vol.23 No.18
  • Multidisciplinary Digital Publishing Institute (MDPI)
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detectionoa mark
  • Dunmore, Aeryn;
  • Jang-Jaccard, Julian;
  • Sabrina, Fariza;
  • Kwak, Jin
  • 2023-01-01
  • IEEE Access, Vol.11, pp.76071-76094
  • Institute of Electrical and Electronics Engineers Inc.
A framework for preventing illegitimate e-prescribing practices
  • 2018-01-01
  • Lecture Notes in Electrical Engineering, Vol.474, pp.648-653
  • Springer Verlag
A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networksoa mark
  • 2018-04-01
  • International Journal of Distributed Sensor Networks, Vol.14 No.4
  • SAGE Publications Ltd
A novel security framework for industrial iot based on isa 100.11a
  • Kim, Hyunjin;
  • Kim, Sungjin;
  • Kwon, Sungmoon;
  • Jo, Wooyeon;
  • Shon, Taeshik
  • 2019-01-01
  • Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Vol.272, pp.61-72
  • Springer Verlag
A real-time fall detection system based on the acceleration sensor of smartphoneoa mark
  • 2018-01-01
  • International Journal of Engineering Business Management, Vol.10
  • SAGE Publications Inc.
A study on analysis of malicious code behavior information for predicting security threats in new environmentsoa mark
  • 2019-03-31
  • KSII Transactions on Internet and Information Systems, Vol.13 No.3, pp.1611-1625
  • Korean Society for Internet Information
A Study on IoT Device Authentication Protocol for High Speed and Lightweight
  • 2019-03-18
  • 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings
  • Institute of Electrical and Electronics Engineers Inc.
A Subject-Centric Credential Management Method based on the Verifiable Credentials
  • 2021-01-13
  • International Conference on Information Networking, Vol.2021-January, pp.508-510
  • IEEE Computer Society
A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain
  • 2018-08-14
  • International Conference on Ubiquitous and Future Networks, ICUFN, Vol.2018-July, pp.817-819
  • IEEE Computer Society
A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC)
  • 2023-01-01
  • International Conference on Information Networking, Vol.2023-January, pp.801-805
  • IEEE Computer Society
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance
  • 2020-06-01
  • Multimedia Tools and Applications, Vol.79 No.23-24, pp.16077-16091
  • Springer
AI-enabled device digital forensics for smart cities
  • 2022-02-01
  • Journal of Supercomputing, Vol.78 No.2, pp.3029-3044
  • Springer
An anonymous device to device authentication protocol using ecc and self certified public keys usable in internet of things based autonomous devicesoa mark
  • Alzahrani, Bander A.;
  • Chaudhry, Shehzad Ashraf;
  • Barnawi, Ahmed;
  • Al-Barakati, Abdullah;
  • Shon, Taeshik
  • 2020-03-01
  • Electronics (Switzerland), Vol.9 No.3
  • MDPI AG
An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDS
  • 2024-02
  • KSII Transactions on Internet and Information Systems, Vol.18 No.2, pp.494-510
  • 한국인터넷정보학회
An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDSoa mark
  • 2024-02-29
  • KSII Transactions on Internet and Information Systems, Vol.18 No.2, pp.494-510
  • Korean Society for Internet Information
An Efficient Domain-Adaptation Method using GAN for Fraud Detectionoa mark
  • 2020-01-01
  • International Journal of Advanced Computer Science and Applications, Vol.11 No.11, pp.94-103
  • Science and Information Organization
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
  • Chaudhry, Shehzad Ashraf;
  • Naqvi, Husnain;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik;
  • Sher, Muhammad
  • 2018-08-01
  • Journal of Supercomputing, Vol.74 No.8, pp.3504-3520
  • Springer New York LLC
1 2 3 4 5 6 7 8 9 10 12