CS-Conference Papers(학술회의논문)

Recent Items

Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 5533

1

Simulated Attack on DNP3 Protocol in SCADA System

Lee, D[Lee, Dongsoo]; Kim, H[Kim, HakJu]; Kim, K[Kim, Kwangjo]researcher; Yoo, P. D.[Yoo, Paul D.]
The Institute of Electronics, Information and Communication Engineers (IEICE)SCIS2014, v.0, 2014-01-22

2

Semi-supervised Botnet Detection Using Ant Colony Clustering

Huseynov, K[Huseynov, Khalid]; Kim, K[Kim, Kwangjo]researcher; Yoo, P. D.[Yoo, Paul D.]
The Institute of Electronics, Information and Communication Engineers (IEICE)SCIS2014, v.0, 2014-01-22

3

Large-Scale Network Intrusion Detection

Al-Jarrah, O. Y.; Yoo, P. D.; Kim, K[Kim, Kwangjo]researcher
Khalifa UniversityUAE Forum on Information and Communication Technology Research (ICTRF) 2014, v.0, 2014-05-13

4

Design and microfabrication of an artificial compound eye inspired by vision mechanism of Xenos peckii

Keum, DM[Keum, Dong Min]; Choi, IC[Choi, Inchang]; Kim, MH[Kim, Min-Hyuk]researcher; Jeong, KH[Jeong, Ki-Hun]
SPIEPhotonics West 2015, 2015-02-07

5

Lattice-based Multi-signature with Linear Homomorphism

Choi, R[Choi, Rakyong]; Kim, K[Kim, Kwangjo]researcher
The Institute of Electronics, Information and Communication Engineers (IEICE)2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, 2016-01-19

6

An Approach to Spam Comment Detection through Domain-independent Features

Kim, JM[Kim, Jong Myoung]; Kim, ZM[Kim, Zae Myung]; Kim, K[Kim, Kwangjo]researcher
Korean Institute of Information Scientists and Engineers (KIISE)2016 International Conference on Big Data and Smart Computing (BigComp2016), v.1, 2016-01-19

7

Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm

Aminanto, E[Aminanto, Erza]; Kim, HJ[Kim, HakJu]; Kim, K[Kim, Kyungmin]; Kim, K[Kim, Kwangjo]researcher
The Institute of Electronics, Information and Communication Engineers (IEICE)2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, 2016-01-20

8

Evaluation of ACA-based Intrusion Detection Systems for Unknown-attacks

Kim, KM[Kim, Kyung Min]; Hong, J[Hong, Jina]; Kim, K[Kim, Kwangjo]researcher; Yoo, P[Yoo, Paul]
The Institute of Electronics, Information and Communication Engineers (IEICE)2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, 2016-01-20

9

A Countermeasure against Spoofing and DoS Attacks based on Message Sequence and Temporary ID in CAN

Ahn, S[Ahn, Soohyun]; Kim, H[Kim, Hakju]; Jeong, J[Jeong, Jeseong]; Kim, K[Kim, Kwangjo]researcher
The Institute of Electronics, Information and Communication Engineers (IEICE)2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, 2016-01-22

10

피처-요구사항 간 플랫폼 추적성 구축 관리 도구

Shim, JS[Shim, Jason ]; Ahn, H[Ahn, Hwi]; Han, YH[Han, Younghun]; Kang, S[Kang, Sungwon]researcher
한국정보과학회한국컴퓨터종합학술대회, pp.637 - 638, 2016-06

11

Deep Learning in Intrusion Detection System: An Overview

Aminanto, E[Aminanto, Erza]; Kim, K[Kim, Kwangjo]researcher
Higher Education Forum2016 International Research Conference on Engineering and Technology (2016 IRCET), v.0, 2016-06

12

Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

Hou, JU[Hou, Jong-Uk ]; Kim, DK[Kim, Dongkyu]; Song, HJ[Song, Hyunji]; Lee, HK[Lee, Heung-Kyu]researcher
ACMACM Workshop on Information Hiding and Multimedia Security, v.1, no.1, pp.169 - 174, 2016-06-20

13

Weight-bearing 3D foot reconstruction from standing radiograph using deformable surface fitting

Seo, SG[Seo, Sang Gyo]; Kim, JI[Kim, Jaeil]; Ryu, CH[Ryu, Chang Hyun]; Lee, DY[Lee, Dong Yeon]; Park, J[Park, Jinah]researcher
i-FABFoot International (i-FAB) 2016, 2016-06-24

14

SIMM: Scalable and Interoperable Mobility Management

Han, SY[Han, Sang Yup]; Park, JH[PARK, JAE HYUN]; Kim, HU[Kim, Hae Un]; Ha, JH[Ha, Jae Hee]; Kim, MC[Kim, Myung-Chul]researcher
한국정보과학회2016 한국컴퓨터종합학술대회, 2016-06-29

15

성분파 보간을 이용한 부드러운 해상 상태 변화 시뮬레이션

박세길; 오재용; 박진아researcher
한국정보과학회한국정보과학회 2016 한국컴퓨터종합학술대회, 2016-06-30

16

Multi-armed Bandit을 이용한 요격 무장 할당 문제의 확률적인 접근

홍택규; 김건형; 이병준; 김기응researcher
한국정보과학회2016 한국컴퓨터종합학술대회 (KCC), 2016-07-01

17

대규모 가상군의 POMDP 행동계획 및 학습 사례연구

홍정표; 이종민; 이강훈; 한상규; 김기응researcher; 문일철; 박재현
한국정보과학회2016 한국컴퓨터종합학술대회 (KCC), pp.983 - 985, 2016-07-01

18

Bayesian Reinforcement Learning with Behavioral Feedback

Hong, TG[Hong, Teakgyu]; Lee, JM[Lee, Jongmin]; Kim, KE[Kim, Kee-Eung]researcher; Ortega, PA[Ortega, Pedro A. ]; LEE, D[Lee, Daniel ]
International Joint Conference on Artificial Intelligence25th International Joint Conference on Artificial Intelligence, 2016-07-14

19

Weight-Bearing 3D Foot Model Reconstruction From Standing Radiographs Using Deformable Surface Fitting Method

Seo, SG[Seo, Sang Gyo]; Kim, JI[Kim, Jaeil]; Ryu, CH[Ryu, Chang Hyun]; Kim, EJ[Kim, Eo Jin]; Lee, D[Lee, Doojae ]; Lee, DY[Lee, Dong Yeon]; Park, J[Park, Jinah]researcher
AOFASAOFAS Annual Meeting 2016, 2016-07-22

20

PIkit: A New Kernel-Independent Processor-Interconnect Rootkit

Song, WJ[Song, Wonjun]; Choi, HW[Choi, Hyunwoo]; Kim, JH[Kim, Junhong]; Kim, ES[Kim, Eunsoo]; Kim, Y[Kim, Yongdae]researcher; Kim, J[Kim, John]
USENIX25th USENIX Security Symposium, 2016-08-10

rss_1.0 rss_2.0 atom_1.0