CS-Conference Papers(학술회의논문)

Recent Items

Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 5552

1

Simulated Attack on DNP3 Protocol in SCADA System

Lee, Dongsoo; Kim, HakJu; Kim, Kwangjoresearcher; Yoo, Paul D.The Institute of Electronics, Information and Communication Engineers (IEICE)SCIS2014, v.0, 2014-01-22

2

Semi-supervised Botnet Detection Using Ant Colony Clustering

Huseynov, Khalid; Kim, Kwangjoresearcher; Yoo, Paul D.The Institute of Electronics, Information and Communication Engineers (IEICE)SCIS2014, v.0, 2014-01-22

3

Large-Scale Network Intrusion Detection

Al-Jarrah, O. Y.; Yoo, P. D.; Kim, KwangjoresearcherKhalifa UniversityUAE Forum on Information and Communication Technology Research (ICTRF) 2014, v.0, 2014-05-13

4

Design and microfabrication of an artificial compound eye inspired by vision mechanism of Xenos peckii

Keum, Dong Min; Choi, Inchang; Kim, Min-Hyukresearcher; Jeong, Ki-HunresearcherSPIEPhotonics West 2015, 2015-02-07

5

Lattice-based Multi-signature with Linear Homomorphism

Choi, Rakyong; Kim, KwangjoresearcherThe Institute of Electronics, Information and Communication Engineers (IEICE)2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, 2016-01-19

6

An Approach to Spam Comment Detection through Domain-independent Features

Kim, Jong Myoung; Kim, Zae Myung; Kim, KwangjoresearcherKorean Institute of Information Scientists and Engineers (KIISE)2016 International Conference on Big Data and Smart Computing (BigComp2016), v.1, 2016-01-19

7

Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm

Aminanto, Erza; Kim, HakJu; Kim, Kyungmin; Kim, KwangjoresearcherThe Institute of Electronics, Information and Communication Engineers (IEICE)2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, 2016-01-20

8

Evaluation of ACA-based Intrusion Detection Systems for Unknown-attacks

Kim, Kyung Min; Hong, Jina; Kim, Kwangjoresearcher; Yoo, PaulThe Institute of Electronics, Information and Communication Engineers (IEICE)2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, 2016-01-20

9

A Countermeasure against Spoofing and DoS Attacks based on Message Sequence and Temporary ID in CAN

Ahn, Soohyun; Kim, Hakju; Jeong, Jeseong; Kim, KwangjoresearcherThe Institute of Electronics, Information and Communication Engineers (IEICE)2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, 2016-01-22

10

피처-요구사항 간 플랫폼 추적성 구축 관리 도구

Shim, Jason; Ahn, Hwi; Han, Younghun; Kang, Sungwonresearcher한국정보과학회한국컴퓨터종합학술대회, pp.637 - 638, 2016-06

11

Deep Learning in Intrusion Detection System: An Overview

Aminanto, Erza; Kim, KwangjoresearcherHigher Education Forum2016 International Research Conference on Engineering and Technology (2016 IRCET), v.0, 2016-06

12

Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-KyuresearcherACMACM Workshop on Information Hiding and Multimedia Security, v.1, no.1, pp.169 - 174, 2016-06-20

13

Weight-bearing 3D foot reconstruction from standing radiograph using deformable surface fitting

Seo, Sang Gyo; Kim, Jaeil; Ryu, Chang Hyun; Lee, Dong Yeon; Park, Jinahresearcheri-FABFoot International (i-FAB) 2016, 2016-06-24

14

SIMM: Scalable and Interoperable Mobility Management

Han, Sang Yup; PARK, JAE HYUN; Kim, Hae Un; Ha, Jae Hee; Kim, Myung-Chulresearcher한국정보과학회2016 한국컴퓨터종합학술대회, 2016-06-29

15

성분파 보간을 이용한 부드러운 해상 상태 변화 시뮬레이션

박세길; 오재용; 박진아researcher한국정보과학회한국정보과학회 2016 한국컴퓨터종합학술대회, 2016-06-30

16

Multi-armed Bandit을 이용한 요격 무장 할당 문제의 확률적인 접근

홍택규; 김건형; 이병준; 김기응researcher한국정보과학회2016 한국컴퓨터종합학술대회 (KCC), 2016-07-01

17

대규모 가상군의 POMDP 행동계획 및 학습 사례연구

홍정표; 이종민; 이강훈; 한상규; 김기응researcher; 문일철researcher; 박재현한국정보과학회2016 한국컴퓨터종합학술대회 (KCC), pp.983 - 985, 2016-07-01

18

Bayesian Reinforcement Learning with Behavioral Feedback

Hong, Teakgyu; Lee, Jongmin; Kim, Kee-Eungresearcher; Ortega, Pedro A.; Lee, DanielInternational Joint Conference on Artificial Intelligence25th International Joint Conference on Artificial Intelligence, 2016-07-14

19

Weight-Bearing 3D Foot Model Reconstruction From Standing Radiographs Using Deformable Surface Fitting Method

Seo, Sang Gyo; Kim, Jaeil; Ryu, Chang Hyun; Kim, Eo Jin; Lee, Doojae; Lee, Dong Yeon; Park, JinahresearcherAOFASAOFAS Annual Meeting 2016, 2016-07-22

20

PIkit: A New Kernel-Independent Processor-Interconnect Rootkit

Song, Wonjun; Choi, Hyunwoo; Kim, Junhong; Kim, Eunsoo; Kim, Yongdaeresearcher; Kim, JohnresearcherUSENIX25th USENIX Security Symposium, 2016-08-10

rss_1.0 rss_2.0 atom_1.0