Zobrazeno 1 - 10
of 187
pro vyhledávání: '"Huy Kang Kim"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-20 (2024)
Abstract The expansion of the cloud computing market has provided a breakthrough in efficiently storing and managing data for individuals and companies. As personal and corporate data move to the cloud, diverse attacks targeting the cloud have also i
Externí odkaz:
https://doaj.org/article/e4a004f28b4f4e95b35fac2f8dd49924
Publikováno v:
IEEE Access, Vol 12, Pp 123716-123730 (2024)
Attackers are known to utilize domain generation algorithms (DGAs) to generate domain names for command and control (C&C) servers and facilitate the distribution of uniform resource locators within malicious software. DGAs pose a significant threat t
Externí odkaz:
https://doaj.org/article/f2685c6a03484fd5bf75468bfe7a02dd
HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis
Publikováno v:
IEEE Access, Vol 12, Pp 936-948 (2024)
Enterprises typically install firewalls at communication points to their internal networks with the primary objective of protecting their core assets from external cyber attackers. This ensures unauthorized access is controlled and prevented. However
Externí odkaz:
https://doaj.org/article/0946ff25af354fe6abc6ae79fe23e978
Publikováno v:
Heliyon, Vol 10, Iss 3, Pp e24891- (2024)
This study assessed how matchmaking and match results affect player churn in a multiplayer competitive game. In competitive games, matchmaking is crucial in gathering players with similar skills and creating balanced player-versus-player matches. Pla
Externí odkaz:
https://doaj.org/article/2c3b45519be74b72972980c47ee096d9
Autor:
Yong Goo Kang, Huy Kang Kim
Publikováno v:
ETRI Journal, Vol 45, Iss 4, Pp 713-723 (2023)
Game bots are illegal programs that facilitate account growth and goods acquisition through continuous and automatic play. Early detection is required to minimize the damage caused by evolving game bots. In this study, we propose a game bot detection
Externí odkaz:
https://doaj.org/article/0e1ec19ab14a4055a886ffd30b9257c2
Publikováno v:
ETRI Journal, Vol 44, Iss 6, Pp 991-1003 (2022)
Industrial control systems (ICSs) used to be operated in closed networks, that is, separated physically from the Internet and corporate networks, and independent protocols were used for each manufacturer. Thus, their operation was relatively safe fro
Externí odkaz:
https://doaj.org/article/f1ae899c5e4540af9bafd754a5ea4fc6
Publikováno v:
IEEE Access, Vol 10, Pp 124821-124834 (2022)
As the importance of cyberspace grows, malicious software (malware) is threatening not only individuals but also countries. In addition, numerous malware is still circulating in cyberspace, and as technology advances, new or advanced malware are emer
Externí odkaz:
https://doaj.org/article/39f05d146c54409c8b70122fe72c9b6f
Publikováno v:
IEEE Access, Vol 10, Pp 49050-49063 (2022)
Recently, despite massively multiplayer online role-playing game (MMORPG) based on the PC implementation environment in mobile games, related fraudulent and illegal activities are still prevalent in response to the extension and diversity of the onli
Externí odkaz:
https://doaj.org/article/097337883bb34503a380938d3041ace2
Publikováno v:
IEEE Access, Vol 10, Pp 90408-90428 (2022)
Fuzzing is widely utilized as a practical test method to determine unknown vulnerabilities in software. Although fuzzing shows excellent results for code coverage and crash count, it is not easy to apply these effects to library fuzzing. A library ca
Externí odkaz:
https://doaj.org/article/5746407ed3ad45838d8fc51d7988dcd7
Autor:
Hyunjun Kim, Sunwoo Ahn, Whoi Ree Ha, Hyunjae Kang, Dong Seong Kim, Huy Kang Kim, Yunheung Paek
Publikováno v:
IEEE Access, Vol 9, Pp 111853-111864 (2021)
Recently, using artificial neural networks (ANNs) for network intrusion detection systems (NIDSs) has drawn much attention from security researchers. The capability of ANNs to learn patterns from numerous data helps detect attacks on networked system
Externí odkaz:
https://doaj.org/article/feb2c0585bf54aeeaf7f90f7221a682c