Browsing "사이버보안학과" byTitle

Jump to:
All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 9 to 28 of 30

Issue DateTitleAuthor(s)Type
2022Data Embedding Scheme for Efficient Program Behavior Modeling With Neural Networks배호Article
2022Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns김종길Article
2022DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification양대헌Article
2021E-PoS: Making Proof-of-Stake Decentralized and Fair양대헌Article
2024Evaluation of Malware Classification Models for Heterogeneous Data배호Article
2020Exploring the Attack Surface of Blockchain: A Comprehensive Survey양대헌Article
2021Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube양대헌Conference Paper
2022Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches양대헌Article
2021Large-scale and Robust Code Authorship Identification with Deep Feature Learning양대헌Article
2020Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation양대헌Article
2023Oracle Indistinguishability and Its Applications윤아람Article
2023PCSF: Privacy-Preserving Content-Based Spam Filter김종길Article
2021Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems양대헌Conference Paper
2022Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions양대헌Article
2021Secure Fully Homomorphic Authenticated Encryption윤아람Article
2021Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey양대헌Article
2022ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation양대헌Article
2021SSD-Assisted Ransomware Detection and Data Recovery Techniques양대헌Article
2023Studies on Inspecting Encrypted Data: Trends and Challenges김종길Article
2022Understanding Internet of Things malware by analyzing endpoints in their static artifacts양대헌Article

BROWSE