Zobrazeno 1 - 10
of 87
pro vyhledávání: '"Kyungroul Lee"'
Publikováno v:
Sensors, Vol 24, Iss 4, p 1229 (2024)
In computer systems, user authentication technology is required to identify users who use computers. In modern times, various user authentication technologies, including strong security features based on ownership, such as certificates and security c
Externí odkaz:
https://doaj.org/article/40c546daf1074642b128b280b9151c87
Autor:
Kyungroul Lee, Kangbin Yim
Publikováno v:
Digital Communications and Networks, Vol 8, Iss 2, Pp 124-131 (2022)
With the growth of the scale of the market for Internet banking and e-commerce, the number of Internet-based financial markets has been increasing. Meanwhile, hacking incidents continuously affect Internet-banking services. For this reason, a counter
Externí odkaz:
https://doaj.org/article/1e27ab20ac4b4d73979212100e71a49d
Autor:
Kyungroul Lee, Kangbin Yim
Publikováno v:
Applied Sciences, Vol 13, Iss 11, p 6510 (2023)
During the implementation of a crypto system, distributed cryptographic libraries are unable to endure situations where the execution environment rapidly changes because of a structural vulnerability that is by design. For this reason, Microsoft anno
Externí odkaz:
https://doaj.org/article/3539d74e6fec4ad9b644d7adce1136ca
Publikováno v:
Sensors, Vol 23, Iss 10, p 4728 (2023)
Ransomware is one type of malware that involves restricting access to files by encrypting files stored on the victim’s system and demanding money in return for file recovery. Although various ransomware detection technologies have been introduced,
Externí odkaz:
https://doaj.org/article/1bba5a7040ec470184cc4eec636d4f79
Autor:
Kyungroul Lee, Kangbin Yim
Publikováno v:
Sensors, Vol 23, Iss 7, p 3501 (2023)
Online security threats have arisen through Internet banking hacking cases, and highly sensitive user information such as the ID, password, account number, and account password that is used for online payments has become vulnerable. Many security com
Externí odkaz:
https://doaj.org/article/b2db36254389453086d8fe6de9a6cfa3
Publikováno v:
Sensors, Vol 23, Iss 6, p 3023 (2023)
A variety of data-based services such as cloud services and big data-based services have emerged in recent times. These services store data and derive the value of the data. The reliability and integrity of the data must be ensured. Unfortunately, at
Externí odkaz:
https://doaj.org/article/b58c0b8284104649bf23f0db7de288e2
Publikováno v:
Applied Sciences, Vol 13, Iss 5, p 2894 (2023)
According to the Fire-eye’s M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks. As APT attacks continu
Externí odkaz:
https://doaj.org/article/d949e11601ac4ac4a2a8e85893853691
Publikováno v:
IEEE Access, Vol 9, Pp 10925-10939 (2021)
In this paper, to increase the attack success rate, we analyzed the distribution of all collected keyboard data based on the distance of time and keyboard scancode data, which presents the crucial data from the previous study. To achieve this, we der
Externí odkaz:
https://doaj.org/article/5d57da8278a54d08968536a5f85faeee
Publikováno v:
IEEE Access, Vol 7, Pp 177241-177253 (2019)
With the change from the pre-internet era to online society, user authentication technology is required, and for that, password-based authentication technology is generally used. However, the technology has vulnerabilities and security threats that c
Externí odkaz:
https://doaj.org/article/c4499a60e8664a98b4821d542b533d9b
Publikováno v:
IEEE Access, Vol 7, Pp 110205-110215 (2019)
With the advent of big data and cloud services, user data has become an important issue. Although a variety of detection and prevention technologies are used to protect user data, ransomware that demands money in exchange for one's data has emerged.
Externí odkaz:
https://doaj.org/article/dbfd053576c24f3aa89ff2e5c3ee3176