1 | Á¦¸ñ(Title) | SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation | |
---|---|---|---|
ÀúÀÚ(Author) | Ki-Wan Kang Jung Taek Seo Sung Hoon Baek Chul Woo Kim Ki-Woong Park | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 03 PP. 1063 ~ 1075 2022. 03 | ||
2 | Á¦¸ñ(Title) | Polymorphic Path Transferring for Secure Flow Delivery | |
ÀúÀÚ(Author) | Rongbo Zhang Xin Li Yan Zhan | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 08 PP. 2805 ~ 2826 2021. 08 | ||
3 | Á¦¸ñ(Title) | Methodology for Computer Security Incident Response Teams into IoT Strategy | |
ÀúÀÚ(Author) | Alejandro Enciso Bernal Sergio Mauricio Martínez Monterrubio Javier Parra Fuente Rubén González Crespo Elena Verdú | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 05 PP. 1909 ~ 1928 2021. 05 | ||
4 | Á¦¸ñ(Title) | EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception | |
ÀúÀÚ(Author) | Huanruo Li Yunfei Guo Shumin Huo Yuehang Ding | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 05 PP. 1891 ~ 1908 2021. 05 | ||
5 | Á¦¸ñ(Title) | Defending and Detecting Audio Adversarial Example using Frame Offsets | |
ÀúÀÚ(Author) | Yongkang Gong Diqun Yan Terui Mao Donghua Wang Rangding Wang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 4 PP. 1538 ~ 1552 2021. 04 | ||
6 | Á¦¸ñ(Title) | SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game | |
ÀúÀÚ(Author) | Hao Hu Jing Liu Jinglei Tan Jiang Liu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 10 PP. 4157 ~ 4175 2020. 10 | ||
7 | Á¦¸ñ(Title) | Improvement of ITSM IT Service Efficiency in Military Electronic Service | |
ÀúÀÚ(Author) | Hanchul Woo Suk-Jae Jeong Jun-Ho Huh | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 02 PP. 0246 ~ 0260 2020. 04 | ||
8 | Á¦¸ñ(Title) | Optimal Network Defense Strategy Selection Based on Markov Bayesian Game | |
ÀúÀÚ(Author) | Zengguang Wang Yu Lu Xi Li Wei Nie | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 11 PP. 5631 ~ 5652 2019. 11 | ||
9 | Á¦¸ñ(Title) | Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium | |
ÀúÀÚ(Author) | Liang Liu Cheng Huang Yong Fang Zhenxue Wang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 10 PP. 5260 ~ 5275 2019. 10 | ||
10 | Á¦¸ñ(Title) | Adversarial Detection with Gaussian Process Regression-based Detector | |
ÀúÀÚ(Author) | Sangheon Lee Noo-ri Kim Youngwha Cho Jae-Young Choi Suntae Kim Jeong-Ah Kim Jee-Hyong Lee | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 08 PP. 4285 ~ 4299 2019. 08 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.