关注
Jiyeon Kim
Jiyeon Kim
Assistant Professor at Daegu University
在 daegu.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
CNN-Based Network Intrusion Detection against Denial-of-Service Attacks
J Kim, J Kim, H Kim, M Shim, E Choi
Electronics 9 (6), 916 (1-21), 2020
2922020
An Intrusion Detection Model based on a Convolutional Neural Network
J Kim, Y Shin, E Choi
Journal of Multimedia Information System (KCI indexed) 6 (4), 165-172, 2019
1152019
Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning
J Kim, M Shim, S Hong, Y Shin, E Choi
Applied Sciences 10 (19), 7009, 2020
632020
클라우드 컴퓨팅 환경의 가상화 기술 취약점 분석연구(A Study on the Analysis of Virtualization Techniques Vulnerability in Cloud Computing Environment)
JY Kim, HJ Kim, CS Park, MJ Kim
The Journal of Korea Institute of Informaion Security and Crypthology 19 (4 …, 2009
26*2009
A StyleGAN Image Detection Model Based on Convolutional Neural Network
J Kim, SA Hong, H Kim
Journal of Korea Multimedia Society 22 (12), 1447-1456, 2019
192019
Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks
J Kim, HS Kim
Electronics 9 (3), 460 (1-23), 2020
92020
PBAD: Perception-based anomaly detection system for cloud datacenters
J Kim, HS Kim
2015 IEEE 8th International Conference on Cloud Computing (IEEE CLOUD 2015 …, 2015
92015
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective
J Kim, H Kim
KSII Transactions on Internet and Information Systems 14 (5), 2186-2203, 2020
82020
Defining security primitives for eliciting flexible attack scenarios through CAPEC analysis
JY Kim, HJ Kim
Information Security Applications, 370-382, 2015
72015
Abstracted CPS model: a model for interworking between physical system and simulator for CPS simulation (WIP)
JY Kim, DN Choi, HJ Kim, JM Kim, WT Kim
Proceedings of the 2012 Symposium on Theory of Modeling and Simulation-DEVS …, 2012
72012
DDoS 공격 피해 규모 및 대응기법 비용분석을 위한 모델링 및 시뮬레이션 기술연구(A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism …
JY Kim, JL Lee, EJ Park, EY Jang, HJ Kim
Journal of the Korea Society for Simulation 18 (4), 39-47, 2009
7*2009
Feature Analysis of IoT Botnet Attacks based on RNN and LSTM
J Kim, H Won, M Shim, S Hong, E Choi
International Journal of Engineering Trends and Technology 68 (4), 43-47, 2020
62020
Research on the Users' Inquiries on the Easy Payment Services using Text Mining Method
MS Kim, J Kim
Journal of Korea Multimedia Society 25 (2), 269-279, 2022
4*2022
악성코드의 이미지 기반 딥러닝을 위한 전처리 방법 설계 및 개발
박지현, 김태옥, 신유림, 김지연, 최은정
멀티미디어학회논문지 23 (5), 650-657, 2020
3*2020
Network Intrusion Detection using Machine Learning Techniques
J Kim, Y Ahn, E Choi
International Conference on Culture Technology 2019, (Best Presentation Awards), 2019
32019
A Study on Server Security for Secure Smartphone-based Work Environment of Government Bodies
JY Kim, HJ Kim
Journal of Security Engineering 7 (6), 683-691, 2010
3*2010
정보보호를 고려한 행정기관 FMC 도입 및 활성화방안 연구(A Study on FMC Installation and Vitalization Considering Information Security for the Government)
JY Kim, JH Kim, HJ Kim, JH Yang, JK Lee
Internet and Information Security 1 (1), 126-145, 2010
3*2010
A Study on the Expansion of Workflow for the Collection of Surface Web-based OSINT (Open Source Intelligence)
SG Lee, E Choi, J Kim, I Lee, S Lee, M Kim
Journal of Digital Convergence 20 (4), 367-376, 2022
2*2022
NoSQL Database Design for SNS Profiling in Criminal Investigations
J Kim, M Shim, S Jin, SH Lee, IS Lee, MJ Kim
International Journal of Engineering Trends and Technology 68 (11), 105-112, 2020
22020
Poster: Modeling of APT Attacks through Transforming Attack Scenarios into DEVS Models
JY Kim, HJ Kim
IEEE Security and Privacy 2015, 2015
22015
系统目前无法执行此操作,请稍后再试。
文章 1–20