Ajou University repository

1. Journal Papers188

or browse

Subscribe to this collection to receive daily e-mail notification of new additions

An Efficient Domain-Adaptation Method using GAN for Fraud Detectionoa mark
  • 2020-01-01
  • International Journal of Advanced Computer Science and Applications, Vol.11 No.11, pp.94-103
  • Science and Information Organization
GAN based augmentation for improving anomaly detection accuracy in host-based intrusion detection systems
  • 2020-01-01
  • International Journal of Engineering Research and Technology, Vol.13 No.11, pp.3987-3996
  • International Research Publication House
Private key recovery on bitcoin with duplicated signaturesoa mark
  • 2020-01-01
  • KSII Transactions on Internet and Information Systems, Vol.14 No.3, pp.1280-1300
  • Korean Society for Internet Information
Reducing operational time complexity of k-NN algorithms using clustering in wrist-activity recognitionoa mark
  • 2020-01-01
  • Intelligent Automation and Soft Computing, Vol.26 No.4, pp.679-691
  • Tech Science Press
IEEE 1815.1-Based power system security with bidirectional RNN-Based network anomalous attack detection for cyber-physical systemoa mark
  • 2020-01-01
  • IEEE Access, Vol.8, pp.77572-77586
  • Institute of Electrical and Electronics Engineers Inc.
Fast k-NN based Malware Analysis in a Massive Malware Environmentoa mark
  • 2019-12-31
  • KSII Transactions on Internet and Information Systems, Vol.13 No.12, pp.6145-6158
  • Korean Society for Internet Information
ISA 100.11a 및 WirelessHART 기반 보안위협 식별 및 보안요구사항 도출 연구
  • 2019-10
  • 정보보호학회논문지, Vol.29 No.5, pp.1063-1075
  • 한국정보보호학회
RANSAC 알고리즘을 활용한 효율적인 사용자 관심 영역 정합 방법
  • 2019-10
  • 정보과학회논문지, Vol.46 No.10, pp.1025-1034
  • 한국정보과학회
Digital Forensic Practices and Methodologies for AI Speaker Ecosystemsoa mark
  • Jo, Wooyeon;
  • Shin, Yeonghun;
  • Kim, Hyungchan;
  • Yoo, Dongkyun;
  • Kim, Donghyun;
  • Kang, Cheulhoon;
  • Jin, Jongmin;
  • Oh, Jungkyung;
  • Na, B.;
  • Shon, Taeshik
  • 2019-07-01
  • Digital Investigation, Vol.29, pp.S80-S93
  • Elsevier Ltd
STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme
  • 2019-06
  • 정보보호학회논문지, Vol.29 No.3, pp.599-612
  • 한국정보보호학회
스마트시티의 보안을 위한 사이버보안위협정보 활용 연구
  • 2019-06
  • 디지털콘텐츠학회논문지, Vol.20 No.6, pp.1173-1180
  • 한국디지털콘텐츠학회
신뢰성 있는 스마트팩토리를 위한 사이버보안 아키텍처
  • 김현진;
  • 김성진;
  • 김예솔;
  • 김신규;
  • 손태식
  • 2019-06
  • 정보보호학회논문지, Vol.29 No.3, pp.629-643
  • 한국정보보호학회
On-line shared platform evaluation framework for advanced persistent threatsoa mark
  • 2019-05-31
  • KSII Transactions on Internet and Information Systems, Vol.13 No.5, pp.2610-2628
  • Korean Society for Internet Information
블록체인을 활용한 인터넷 사기 정보 수집 및 공유방안에 관한 연구
  • 김기형;
  • 김종현;
  • 황동엽;
  • 신운섭;
  • 이성빈;
  • 최정용
  • 2019-04
  • 금융감독연구, Vol.6 No.1, pp.75-99
Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지
  • 2019-04
  • 정보보호학회논문지, Vol.29 No.2, pp.331-346
  • 한국정보보호학회
A study on analysis of malicious code behavior information for predicting security threats in new environmentsoa mark
  • 2019-03-31
  • KSII Transactions on Internet and Information Systems, Vol.13 No.3, pp.1611-1625
  • Korean Society for Internet Information
Visualization for internet of things: power system and financial network cases
  • 2019-02-01
  • Multimedia Tools and Applications, Vol.78 No.3, pp.3241-3265
  • Springer New York LLC
리눅스 커널에 따른 메타데이터 기반 파일 복원 연구
  • 2019-02
  • 정보보호학회논문지, Vol.29 No.1, pp.77-91
  • 한국정보보호학회
공개 딥러닝 라이브러리에 대한 보안 취약성 검증
  • 2019-02
  • 정보보호학회논문지, Vol.29 No.1, pp.117-125
  • 한국정보보호학회
An improved anonymous authentication scheme for distributed mobile cloud computing services
  • Chaudhry, Shehzad Ashraf;
  • Kim, I. Luk;
  • Rho, Seungmin;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik
  • 2019-01-16
  • Cluster Computing, Vol.22, pp.1595-1609
  • Springer New York LLC
1 2 3 4 5 6 7 8 9 10