Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Byoungmo Cho"'
Autor:
Seongyun Seo, Sungmin Han, Janghyeon Park, Shinwoo Shim, Han-Eul Ryu, Byoungmo Cho, Sangkyun Lee
Publikováno v:
IEEE Access, Vol 9, Pp 129635-129647 (2021)
A network intrusion detection (NID) system plays a critical role in cybersecurity. However, the existing machine learning-based NID research has a vital issue that their experimental settings do not reflect real-world situations where unknown attacks
Externí odkaz:
https://doaj.org/article/a02c6c0f41ad43c9a004d71a158edf4d
Publikováno v:
ETRI Journal, Vol 43, Iss 2, Pp 332-343 (2020)
AbstractWith cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection technique
Externí odkaz:
https://doaj.org/article/8a4f131b4ece4d59a1de74bb7f17c9b8
Autor:
Sun-Young Im, Sang-soo Kim, Shinwoo Shim, Sung-mo Koo, Byoungmo Cho, Kwangsoo Kim, Taekyu Kim
Publikováno v:
The Journal of Korean Institute of Communications and Information Sciences. 47:58-65
Autor:
Taekyu Kim, ByoungMo Cho, Sung-mo Koo, Sun-young Im, Kwangsoo Kim, Sang-soo Kim, Shinwoo Shim
Publikováno v:
The Journal of Korean Institute of Communications and Information Sciences. 46:1862-1872
Autor:
Byoungmo Cho, Seongyun Seo, Shinwoo Shim, Janghyeon Park, Sungmin Han, Han-Eul Ryu, Sangkyun Lee
Publikováno v:
IEEE Access, Vol 9, Pp 129635-129647 (2021)
A network intrusion detection (NID) system plays a critical role in cybersecurity. However, the existing machine learning-based NID research has a vital issue that their experimental settings do not reflect real-world situations where unknown attacks
Publikováno v:
ETRI Journal, Vol 43, Iss 2, Pp 332-343 (2020)
With cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection techniques. To co
Autor:
Kyung Ho Park, Hyun Min Song, Jeong Do Yoo, Su-Youn Hong, Byoungmo Cho, Kwangsoo Kim, Huy Kang Kim
Publikováno v:
Computers & Security. 116:102662