Browsing "사이버보안학과" byTitle

Jump to:
All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 8 to 27 of 30

Issue DateTitleAuthor(s)Type
2021Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools양대헌Article
2022Data Embedding Scheme for Efficient Program Behavior Modeling With Neural Networks배호Article
2022Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns김종길Article
2022DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification양대헌Article
2021E-PoS: Making Proof-of-Stake Decentralized and Fair양대헌Article
2024Evaluation of Malware Classification Models for Heterogeneous Data배호Article
2020Exploring the Attack Surface of Blockchain: A Comprehensive Survey양대헌Article
2021Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube양대헌Conference Paper
2022Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches양대헌Article
2021Large-scale and Robust Code Authorship Identification with Deep Feature Learning양대헌Article
2020Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation양대헌Article
2023Oracle Indistinguishability and Its Applications윤아람Article
2023PCSF: Privacy-Preserving Content-Based Spam Filter김종길Article
2021Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems양대헌Conference Paper
2022Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions양대헌Article
2021Secure Fully Homomorphic Authenticated Encryption윤아람Article
2021Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey양대헌Article
2022ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation양대헌Article
2021SSD-Assisted Ransomware Detection and Data Recovery Techniques양대헌Article
2023Studies on Inspecting Encrypted Data: Trends and Challenges김종길Article

BROWSE