Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Gyungmin Lee"'
Publikováno v:
ETRI Journal, Vol 43, Iss 2, Pp 332-343 (2020)
AbstractWith cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection technique
Externí odkaz:
https://doaj.org/article/8a4f131b4ece4d59a1de74bb7f17c9b8
Autor:
Jeong Do Yoo, Eunji Park, Gyungmin Lee, Myung Kil Ahn, Donghwa Kim, Seongyun Seo, Huy Kang Kim
Publikováno v:
Applied Sciences, Vol 10, Iss 6, p 2140 (2020)
As the scale of the system and network grows, IT infrastructure becomes more complex and hard to be managed. Many organizations have a serious problem to manage their system and network security. In addition, vulnerabilities of hardware and software
Externí odkaz:
https://doaj.org/article/88939f3e7e8446188cdfb48ba5c34c81
Autor:
Gyungmin Lee
Publikováno v:
Korean Studies of Modern Chinese History. 92:139-158
Publikováno v:
ETRI Journal, Vol 43, Iss 2, Pp 332-343 (2020)
With cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection techniques. To co
Autor:
GyungMin Lee, Huy Kang Kim, Donghwa Kim, Jeong Do Yoo, Seongyun Seo, Eunji Park, Myung Kil Ahn
Publikováno v:
Applied Sciences, Vol 10, Iss 6, p 2140 (2020)
Applied Sciences
Volume 10
Issue 6
Applied Sciences
Volume 10
Issue 6
As the scale of the system and network grows, IT infrastructure becomes more complex and hard to be managed. Many organizations have a serious problem to manage their system and network security. In addition, vulnerabilities of hardware and software